Use standard OIDC scopes for local browser sign-in; do not request offline tokens without an explicit feature need
Use this when a local or demo OIDC provider rejects offline_access during an interactive browser login, especially with Keycloak.
openid profile unless a product requirement explicitly needs offline sessions.offline_access is required.offline_access is not just another scope; it enables longer-lived credentials that outlive the normal SSO session.src/UmbracoPrism.Core/Models/PrismOidcConfiguration.cs sets the generic OIDC browser/token-exchange scopes to openid profile while leaving the Entra path unchanged.keycloak/realm-export.json removes offline_access from the local prism-client optional scopes so repo takers do not inherit unnecessary offline-token capability.