adal

How can I use MS Graph to list Azure AD instances for a given LiveID account?

我们两清 提交于 2019-12-01 08:14:20
问题 I have a customer who is using a liveID account to manage 20+ different Azure AD directories. How can I get a list of all the Azure AD instances associated with this account? I tried using this graph explorer to figure out which query was correct, however every time I tried to consent to a Directory Read consent, the tool didn't accept it. (it would run, but the checkbox would be cleared upon inspection ) My goal is to determine at runtime, which instances have had "administrative consent" to

multiple_matching_tokens_detected with ADAL

孤街醉人 提交于 2019-12-01 07:32:51
I have a service that uses Azure access tokens that we retrieve using ADAL. We have several hundred customers, but for some reason there are two of them that sporadically generate this error when we try to retrieve an AuthenticationResult for them: multiple_matching_tokens_detected: The cache contains multiple tokens satisfying the requirements. Call AcquireToken again providing more requirements (e.g. UserId). I have no idea why only these two folks out of hundreds have this issue and really can't find much about it on the net. Our code to acquire a token looks like this (simplified):

How to debug/trace ADAL authentication?

余生颓废 提交于 2019-12-01 05:37:22
问题 I was trying one of the Azure Active Directory samples Microsoft has published here: https://github.com/AzureADSamples/WebApp-WebAPI-OpenIDConnect-DotNet I managed to screw up the audience value in the web.config for the TodoListService and got a 401 Unauthorized response when calling the service. The problem is, it took me way too long to figure out what was wrong. Running it in the debugger did not produce any helpful trace statements in the output window. There were also no events in the

Entity Framework connection to SQL Azure DB using access token

别来无恙 提交于 2019-12-01 05:36:06
问题 We have web application which connects to SQL Azure DB. I have configured my application with Application ID and certificate. We would like to make use of Access Token Approach for connecting to SQL Server, As per below link, connecting through token approach to SQL Server is not a reliable approach. Any recommended way of connecting instead of User ID and Password. Connect to Azure SQL using Azure Active Directory from an Azure Website? Can anyone let me know if they have implemented SQL

Authenticate against an Azure Mobile Service App with ADAL.js acquired token

馋奶兔 提交于 2019-12-01 05:18:24
I'm trying to authenticate a HTML app against an Azure Mobile Service app. The Setup Both apps use AAD as authentication backend, so both apps have an application registered in the Active Directory: Azure Mobile Service app: configured as described in https://azure.microsoft.com/en-gb/documentation/articles/mobile-services-how-to-register-active-directory-authentication/ I edited the manifest to enable the client flow Enable "single sign-on and read users profiles" under "permissions to other applications" for "Windows Azure Active Directory" HTML app: in "permissions to other applications" i

Authenticate against an Azure Mobile Service App with ADAL.js acquired token

这一生的挚爱 提交于 2019-12-01 02:22:27
问题 I'm trying to authenticate a HTML app against an Azure Mobile Service app. The Setup Both apps use AAD as authentication backend, so both apps have an application registered in the Active Directory: Azure Mobile Service app: configured as described in https://azure.microsoft.com/en-gb/documentation/articles/mobile-services-how-to-register-active-directory-authentication/ I edited the manifest to enable the client flow Enable "single sign-on and read users profiles" under "permissions to other

ADAL: The request body must contain the following parameter: client_secret

二次信任 提交于 2019-12-01 00:00:21
I wrote the authentication code below with ADAL for android: mAuthContext = new AuthenticationContext(MainActivity.this, Constants.AUTHORITY_URL,false); mAuthContext.acquireToken(MainActivity.this, Constants.RESOURCE_ID, Constants.CLIENT_ID,Constants.REDIRECT_URL, Constants.USER_HINT, getCallback()); Windows Azure China version(localized version) has not yet supported to register an app as "native client app", no option at all. So I continue seeing the error below when running the code above. Server error message: {"error":"invalid_request","error_description":"AADSTS90014: The request body

ADAL: The request body must contain the following parameter: client_secret

半城伤御伤魂 提交于 2019-11-30 18:56:10
问题 I wrote the authentication code below with ADAL for android: mAuthContext = new AuthenticationContext(MainActivity.this, Constants.AUTHORITY_URL,false); mAuthContext.acquireToken(MainActivity.this, Constants.RESOURCE_ID, Constants.CLIENT_ID,Constants.REDIRECT_URL, Constants.USER_HINT, getCallback()); Windows Azure China version(localized version) has not yet supported to register an app as "native client app", no option at all. So I continue seeing the error below when running the code above.

AcquireTokenSilent always Failed to acquire token silently

杀马特。学长 韩版系。学妹 提交于 2019-11-30 17:43:09
Using ADAL I have two AuthenticationContext using a Token Cache persisted in SQL. Using AcquireTokenByAuthorizationCode it writes the Token in database, but when using AcquireTokenSilent I always get Failed to acquire token silently. Call method AcquireToken Here are the details for replication the issue: I create a Context AuthenticationContext authContext = new AuthenticationContext(_authority, new AzureAdalCache(companyId, _entries, _unitOfWork)); Then I AcquireToken By Authorization authContext.AcquireTokenByAuthorizationCode(authorizationCode, new Uri(redirectUri), _clientCredential); At

How can I configure the expiration time of an Azure AD access token (using ADAL)?

淺唱寂寞╮ 提交于 2019-11-30 17:11:10
问题 We use Azure AD to authenticate users into our WPF application, using their Office 365 accounts. This is done using the Active Directory Authentication Library (ADAL). Currently, they are prompted to log in every time they open the app. We want to change this to allow logging in to the app via a cached token. This works but we want to shorten the expiration time of the token to 24 hours or less, requiring another sign in after that time has passed. I don't see a way to manipulate the