Connected Apps UI Additions and Label Updates

The connected apps user interface has changes for clarity, consistency, and better usability.
The connected apps user interface updates include the following.
  • When managing mobile connected apps, the Session Timeout field under Mobile Integration has been renamed to Require PIN after. At the specified time, the connected app locks itself and requires the user to enter a PIN to unlock it. This policy is only enforced if a corresponding Pin Length is configured.
    Note

    Note

    This setting does not directly invalidate a user's session. While the session may also expire due to inactivity, this policy simply requires the user to enter their PIN in order to continue using their current session.

  • The Expire Refresh Token field has been renamed Refresh Token Policy, and the options for this field are the following.
    • Refresh Token is valid until revoked
    • Immediately expire refresh token
    • Expire refresh token if not used for n
    • Expire refresh token after n
  • New Actions column in the list of connected apps.

    From Setup, click Create | Apps. The list of connected apps includes an Actions column for shortcuts to Edit or Manage individual connected apps.

  • New Manage button on individual connected app pages.

    From Setup, click Create | Apps. Click the name of an existing connected app to see the app’s setup settings. From that page, you can select Manage to see the usage settings.

  • The IP Restrictions field has been renamed IP Relaxation.

    From Setup, click Manage | Connected Apps. Click Edit to change an existing app’s usage settings. The IP Relaxation setting enforces or bypasses the organization’s IP restrictions when a user tries to use the current connected app.

  • The Require Users to Log In option has been renamed Expire Refresh Tokens.

    From Setup, click Manage | Connected Apps. Click Edit to change an existing app’s usage settings. The Expire Refresh Tokens setting controls how often a user needs to re-authenticate for the current connected app.

  • The IP Ranges related list has been renamed Trusted IP Range for OAuth Web server flow.

    From Setup, click Manage | Connected Apps. Click the name of an existing connected app to see the detail page that includes the Trusted IP Range for OAuth Web server flow. This setting applies to OAuth web server flow authentication only, and shows the allowed web server IP range. Use this value to bypass the organization’s IP restriction policy for the current connected app.