To register the application with your Azure AD tenant, you can either: Clone or download this repositoryįrom your shell or command line, enter this command: git clone The majority of the logic in this sample shows how to achieve this connection flow by using the identity platform's admin consent endpoint.įor more information on the concepts used in this sample, read the client credentials protocol documentation for the identity platform. During the connection flow, a Global Administrator first grants application permissions directly to the app so that it can access company data in a non-interactive fashion, without the presence of a signed-in user. NET to acquire an access token for Microsoft Graph.īecause the app is a multi-tenant app for Microsoft business customers, it must provide a way for customers to "sign up" or "connect" the application to their company data. It uses the Microsoft Authentication Library (MSAL) for. SyncController.cs is triggered by an AJAX call in the web application. When the controller is called, it pulls in a list of users in the customer's Azure Active Directory (Azure AD) tenant from Microsoft Graph. The "daemon" component in this sample is an API controller, SyncController.cs. It uses the OWIN OpenID Connect middleware to sign in users. The app is built as an ASP.NET MVC application. If you signed in to the Azure portal with a Microsoft account and have never created a user account in your directory, do that now. This sample won't work with a Microsoft account. One or more user accounts in your Azure AD tenant.For more information, see How to get an Azure AD tenant. If you don’t have an Azure subscription, create a free account before you begin. Get an access token to call the Microsoft Graph API.Grant application permissions directly to the app by an admin.Integrate a daemon app with the Microsoft identity platform.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |