大佬教程收集整理的这篇文章主要介绍了Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?,大佬教程大佬觉得挺不错的,现在分享给大家,也给大家做个参考。
MSAL for Python 支持 ROPC 流(资源所有者密码凭据授予)supports 公共应用程序的令牌检索,我们可以在 MSAL for python 中类似地使用机密客户端类吗?以下链接似乎说不--> https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Username-Password-Authentication
另外,如果我们可以同时使用公共和机密客户端,从安全角度推荐这样做吗?
该应用程序是在我们的服务器后台运行的服务应用程序,出于安全原因,在注册应用程序时,应用程序权限被授予委派权限,因此需要 ROPC 流来访问令牌。
感谢任何帮助
使用 PublicclIEntApplication 类的代码,我希望将下面的代码更改为使用 ConfIDentialClIEntApplication 但该类没有“acquire_token_by_username_password”属性,因此,我正在寻找一种使用 ROPC 的方法,并且是 ConfIDentiaClIEntApplication。
"""
The configuration file would look like this:
{
"authority": "https://login.microsoftonline.com/organizations","clIEnt_ID": "your_clIEnt_ID","username": "your_username@your_tenant.com","password": "This is a sample only. You better NOT persist your password.","scope": ["User.ReadBasic.All"],// You can find the other permission names from this document
// https://docs.microsoft.com/en-us/graph/permissions-reference
"endpoint": "https://graph.microsoft.com/v1.0/users"
// You can find more Microsoft Graph API endpoints from Graph Explorer
// https://developer.microsoft.com/en-us/graph/graph-explorer
}
You can then run this sample with a JsON configuration file:
python sample.py parameters.Json
"""
import sys # For simplicity,we'll read config file from 1st Cli param sys.argv[1]
import Json
import logging
import requests
import msal
# Optional logging
# logging.basicConfig(level=logging.DEBUG) # Enable DEBUG log for entire script
# logging.getLogger("msal").setLevel(logging.INFO) # Optionally disable MSAL DEBUG logs
config = Json.load(open(sys.argv[1]))
# Create a preferably long-lived app instance which maintains a token cache.
app = msal.PublicclIEntApplication(
config["clIEnt_ID"],authority=config["authority"],# token_cache=... # Default cache is in memory only.
# You can learn how to use SerializabletokenCache from
# https://msal-python.rtfd.io/en/latest/#msal.SerializabletokenCache
)
# The pattern to acquire a token looks like this.
result = None
# Firstly,check the cache to see if this end user has signed in before
accounts = app.get_accounts(username=config["username"])
if accounts:
logging.info("Account(s) exists in cache,probably with token too. Let's try.")
result = app.acquire_token_silent(config["scope"],account=accounts[0])
if not result:
logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
# See this page for constraints of Username Password Flow.
# https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Username-Password-Authentication
result = app.acquire_token_by_username_password(
config["username"],config["password"],scopes=config["scope"])
if "access_token" in result:
# Calling graph using the access token
graph_data = requests.get( # Use token to call downstream service
config["endpoint"],headers={'Authorization': 'Bearer ' + result['access_token']},).Json()
print("Graph API call result: %s" % Json.dumps(graph_data,indent=2))
else:
print(result.get("error"))
print(result.get("error_description"))
print(result.get("correlation_ID")) # You may need this when reporting a BUG
if 65001 in result.get("error_codes",[]): # Not mean to be coded programatically,but...
# AAD requires user consent for U/P flow
print("Visit this to consent:",app.get_authorization_request_url(config["scope"]))
暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!
如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。
小编邮箱:dio#foxmail.com (将#修改为@)
以上是大佬教程为你收集整理的Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?全部内容,希望文章能够帮你解决Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?所遇到的程序开发问题。
如果觉得大佬教程网站内容还不错,欢迎将大佬教程推荐给程序员好友。
本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。
如您有任何意见或建议可联系处理。小编QQ:384754419,请注明来意。