| title | Configure desktop apps that call web APIs |
|---|---|
| description | Learn how to configure the code of a desktop app that calls web APIs |
| author | OwenRichards1 |
| manager | pmwongera |
| ms.author | owenrichards |
| ms.date | 04/09/2024 |
| ms.reviewer | jmprieur |
| ms.service | identity-platform |
| ms.subservice | workforce |
| ms.topic | how-to |
| ms.custom | sfi-image-nochange |
[!INCLUDE applies-to-workforce-only]
This article contains instructions to help you configure the code with the application's coordinates.
- Register a new app in the Microsoft Entra admin center, configured for Accounts in this organizational directory only. Refer to Register an application for more details. Record the following values from the application Overview page for later use:
- Application (client) ID
- Directory (tenant) ID
To specify your app type to your app registration, follow these steps:
- Under Manage, select Authentication > Add a platform > Mobile and desktop applications
- Depending on the authentication method you're using, choose one of the following options:
- For apps using embedded browsers, use the exact value:
https://login.microsoftonline.com/common/oauth2/nativeclient - For apps using system browsers, use the exact value:
http://localhost - Objective-C or Swift apps for macOS:
msauth.<your.app.bundle.id>://auth. - Node.js Electron apps:
msal{Your_Application/Client_Id}://auth
- For apps using embedded browsers, use the exact value:
Note
For Web Authentication Manager (WAM) apps, no redirect URI is needed in MSAL.
To distinguish device code flow, integrated Windows authentication, and a username and a password from a confidential client application using a client credential flow used in daemon applications, none of which requires a redirect URI, configure it as a public client application. To achieve this configuration
[!INCLUDE Enable public client]
The following Microsoft libraries support desktop apps:
[!INCLUDE active-directory-develop-libraries-desktop]
From a code point of view, desktop applications are public client applications. The configuration will be a bit different based on whether you use interactive authentication or not.
You'll need to build and manipulate MSAL.NET IPublicClientApplication.
The following code instantiates a public client application and signs in users in the Microsoft Azure public cloud with a work or school account or a personal Microsoft account.
IPublicClientApplication app = PublicClientApplicationBuilder.Create(clientId)
.Build();If you intend to use interactive authentication or device code flow, as seen previously, use the .WithRedirectUri modifier.
IPublicClientApplication app;
app = PublicClientApplicationBuilder.Create(clientId)
.WithDefaultRedirectUri()
.Build();The following code instantiates a public client application from a configuration object, which could be filled in programmatically or read from a configuration file.
PublicClientApplicationOptions options = GetOptions(); // your own method
IPublicClientApplication app = PublicClientApplicationBuilder.CreateWithApplicationOptions(options)
.WithDefaultRedirectUri()
.Build();You can elaborate the application building by adding a number of modifiers. For instance, if you want your application to be a multitenant application in a national cloud, such as US Government shown here, you could write:
IPublicClientApplication app;
app = PublicClientApplicationBuilder.Create(clientId)
.WithDefaultRedirectUri()
.WithAadAuthority(AzureCloudInstance.AzureUsGovernment,
AadAuthorityAudience.AzureAdMultipleOrgs)
.Build();MSAL.NET also contains a modifier for Active Directory Federation Services 2019:
IPublicClientApplication app;
app = PublicClientApplicationBuilder.Create(clientId)
.WithAdfsAuthority("https://consoso.com/adfs")
.Build();Finally, if you want to acquire tokens for an Azure Active Directory (Azure AD) B2C tenant, specify your tenant as shown in the following code snippet:
IPublicClientApplication app;
app = PublicClientApplicationBuilder.Create(clientId)
.WithB2CAuthority("https://fabrikamb2c.b2clogin.com/tfp/{tenant}/{PolicySignInSignUp}")
.Build();To learn more about how to configure an MSAL.NET desktop application:
- For a list of all modifiers available on
PublicClientApplicationBuilder, see the reference documentation PublicClientApplicationBuilder. - For a description of all the options exposed in
PublicClientApplicationOptions, see PublicClientApplicationOptions in the reference documentation.
Imagine a .NET console application that has the following appsettings.json configuration file:
{
"Authentication": {
"AzureCloudInstance": "AzurePublic",
"AadAuthorityAudience": "AzureAdMultipleOrgs",
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444"
},
"WebAPI": {
"MicrosoftGraphBaseEndpoint": "https://graph.microsoft.com"
}
}You have little code to read in this file by using the .NET-provided configuration framework:
public class SampleConfiguration
{
/// <summary>
/// Authentication options
/// </summary>
public PublicClientApplicationOptions PublicClientApplicationOptions { get; set; }
/// <summary>
/// Base URL for Microsoft Graph (it varies depending on whether the application runs
/// in Microsoft Azure public clouds or national or sovereign clouds)
/// </summary>
public string MicrosoftGraphBaseEndpoint { get; set; }
/// <summary>
/// Reads the configuration from a JSON file
/// </summary>
/// <param name="path">Path to the configuration json file</param>
/// <returns>SampleConfiguration as read from the json file</returns>
public static SampleConfiguration ReadFromJsonFile(string path)
{
// .NET configuration
IConfigurationRoot Configuration;
var builder = new ConfigurationBuilder()
.SetBasePath(Directory.GetCurrentDirectory())
.AddJsonFile(path);
Configuration = builder.Build();
// Read the auth and graph endpoint configuration
SampleConfiguration config = new SampleConfiguration()
{
PublicClientApplicationOptions = new PublicClientApplicationOptions()
};
Configuration.Bind("Authentication", config.PublicClientApplicationOptions);
config.MicrosoftGraphBaseEndpoint =
Configuration.GetValue<string>("WebAPI:MicrosoftGraphBaseEndpoint");
return config;
}
}Now, to create your application, write the following code:
SampleConfiguration config = SampleConfiguration.ReadFromJsonFile("appsettings.json");
var app = PublicClientApplicationBuilder.CreateWithApplicationOptions(config.PublicClientApplicationOptions)
.WithDefaultRedirectUri()
.Build();Before the call to the .Build() method, you can override your configuration with calls to .WithXXX methods, as seen previously.
Here's the class used in MSAL Java development samples to configure the samples: TestData.
PublicClientApplication pca = PublicClientApplication.builder(CLIENT_ID)
.authority(AUTHORITY)
.build();The following code instantiates a public client application and signs in users in the Microsoft Azure public cloud with a work or school account or a personal Microsoft account.
Objective-C:
NSError *msalError = nil;
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"];
MSALPublicClientApplication *application = [[MSALPublicClientApplication alloc] initWithConfiguration:config error:&msalError];Swift:
let config = MSALPublicClientApplicationConfig(clientId: "<your-client-id-here>")
if let application = try? MSALPublicClientApplication(configuration: config){ /* Use application */}You can elaborate the application building by adding a number of modifiers. For instance, if you want your application to be a multitenant application in a national cloud, such as US Government shown here, you could write:
Objective-C:
MSALAADAuthority *aadAuthority =
[[MSALAADAuthority alloc] initWithCloudInstance:MSALAzureUsGovernmentCloudInstance
audienceType:MSALAzureADMultipleOrgsAudience
rawTenant:nil
error:nil];
MSALPublicClientApplicationConfig *config =
[[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"
redirectUri:@"<your-redirect-uri-here>"
authority:aadAuthority];
NSError *applicationError = nil;
MSALPublicClientApplication *application =
[[MSALPublicClientApplication alloc] initWithConfiguration:config error:&applicationError];Swift:
let authority = try? MSALAADAuthority(cloudInstance: .usGovernmentCloudInstance, audienceType: .azureADMultipleOrgsAudience, rawTenant: nil)
let config = MSALPublicClientApplicationConfig(clientId: "<your-client-id-here>", redirectUri: "<your-redirect-uri-here>", authority: authority)
if let application = try? MSALPublicClientApplication(configuration: config) { /* Use application */}Configuration parameters can be loaded from many sources, like a JavaScript file or from environment variables. Below, an authConfig.js file is used.
:::code language="js" source="~/../ms-identity-JavaScript-nodejs-desktop/App/authConfig.js":::
Import the configuration object from authConfig.js file. MSAL Node can be initialized minimally as below. See the available configuration options.
const { PublicClientApplication } = require('@azure/msal-node');
const { msalConfig } = require('./authConfig')
/**
* Initialize a public client application. For more information, visit:
* https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-node/docs/initialize-public-client-application.md
*/
clientApplication = new PublicClientApplication(msalConfig);config = json.load(open(sys.argv[1]))
app = msal.PublicClientApplication(
config["client_id"], authority=config["authority"],
# token_cache=... # Default cache is in memory only.
# You can learn how to use SerializableTokenCache from
# https://msal-python.rtfd.io/en/latest/#msal.SerializableTokenCache
)Move on to the next article in this scenario, Acquire a token for the desktop app.
