Demo app repo to demonstrate the different OAuth 2.0 flows as implemented by the Microsoft Identity Platform.
- Create an app registration
- Sign in to the Azure portal.
- If you have access to multiple tenants, use the Directory + subscription filter in the top menu to select the tenant in which you want to register an application.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations > New registration.
- When the Register an application page appears, enter your application's registration information:
- Enter a Name for your application, for example AspNetCore-WebApp. Users of your app might see this name, and you can change it later.
- Choose the supported account types for your application. (See Supported account types.)
- For Redirect URI, enter http://localhost:3000/?implicit.
- Select Register.
- Click on Authentication and then add the following information:
- In the Web section, add https://jwt.ms as a Redirect URI.
- Click Add a platform.
- Click on Single-page application.
- For Redirect Uris enter http://localhost:3000
- Click Configure.
- In the Single-page application section, add http://localhost:3000/?msal as a Redirect URI.
- Under Implicit grant and hybrid flows, select Access Tokens and ID tokens.
- Click Save.
- Click on Certificates & secrets.
- Click on New client secret.
- Enter Default for description.
- Click Add.
- Be sure to save the generated value somewhere and make sure you do not check it into a repo 😉
- demotastic - React JS App that demonstrates OIDC, the implicit flow, and the auth code flow.
- clientcreds - .NET Console App that demonstrates the client credentials flow, the device code flow, and the on-behalf-of flow.