程序问答   发布时间:2022-06-01  发布网站:大佬教程  code.js-code.com
大佬教程收集整理的这篇文章主要介绍了Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?大佬教程大佬觉得挺不错的,现在分享给大家,也给大家做个参考。

如何解决Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌??

开发过程中遇到Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?的问题如何解决?下面主要结合日常开发的经验,给出你关于Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?的解决方法建议,希望对你解决Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?有所启发或帮助;

MSAL for Python 支持 ROPC 流(资源所有者密码凭据授予)supports 公共应用程序的令牌检索,我们可以在 MSAL for python 中类似地使用机密客户端类吗?以下链接似乎说不--> https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Username-Password-Authentication

另外,如果我们可以同时使用公共和机密客户端,从安全角度推荐这样做吗?

该应用程序是在我们的服务器后台运行的服务应用程序,出于安全原因,在注册应用程序时,应用程序权限被授予委派权限,因此需要 ROPC 流来访问令牌。

感谢任何帮助

使用 PublicclIEntApplication 类的代码,我希望将下面的代码更改为使用 ConfIDentialClIEntApplication 但该类没有“acquire_token_by_username_password”属性,因此,我正在寻找一种使用 ROPC 的方法,并且是 ConfIDentiaClIEntApplication。

"""
The configuration file would look like this:
{
    "authority": "https://login.microsoftonline.com/organizations","clIEnt_ID": "your_clIEnt_ID","username": "your_username@your_tenant.com","password": "This is a sample only. You better NOT persist your password.","scope": ["User.ReadBasic.All"],// You can find the other permission names from this document
        // https://docs.microsoft.com/en-us/graph/permissions-reference
    "endpoint": "https://graph.microsoft.com/v1.0/users"
        // You can find more Microsoft Graph API endpoints from Graph Explorer
        // https://developer.microsoft.com/en-us/graph/graph-explorer
}
You can then run this sample with a JsON configuration file:
    python sample.py parameters.Json
"""

import sys  # For simplicity,we'll read config file from 1st Cli param sys.argv[1]
import Json
import logging

import requests
import msal


# Optional logging
# logging.basicConfig(level=logging.DEBUG)  # Enable DEBUG log for entire script
# logging.getLogger("msal").setLevel(logging.INFO)  # Optionally disable MSAL DEBUG logs

config = Json.load(open(sys.argv[1]))

# Create a preferably long-lived app instance which maintains a token cache.
app = msal.PublicclIEntApplication(
    config["clIEnt_ID"],authority=config["authority"],# token_cache=...  # Default cache is in memory only.
                       # You can learn how to use SerializabletokenCache from
                       # https://msal-python.rtfd.io/en/latest/#msal.SerializabletokenCache
    )

# The pattern to acquire a token looks like this.
result = None

# Firstly,check the cache to see if this end user has signed in before
accounts = app.get_accounts(username=config["username"])
if accounts:
    logging.info("Account(s) exists in cache,probably with token too. Let's try.")
    result = app.acquire_token_silent(config["scope"],account=accounts[0])

if not result:
    logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
    # See this page for constraints of Username Password Flow.
    # https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Username-Password-Authentication
    result = app.acquire_token_by_username_password(
        config["username"],config["password"],scopes=config["scope"])

if "access_token" in result:
    # Calling graph using the access token
    graph_data = requests.get(  # Use token to call downstream service
        config["endpoint"],headers={'Authorization': 'Bearer ' + result['access_token']},).Json()
    print("Graph API call result: %s" % Json.dumps(graph_data,indent=2))
else:
    print(result.get("error"))
    print(result.get("error_description"))
    print(result.get("correlation_ID"))  # You may need this when reporting a BUG
    if 65001 in result.get("error_codes",[]):  # Not mean to be coded programatically,but...
        # AAD requires user consent for U/P flow
        print("Visit this to consent:",app.get_authorization_request_url(config["scope"]))

解决方法

暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!

如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。

小编邮箱:dio#foxmail.com (将#修改为@)

大佬总结

以上是大佬教程为你收集整理的Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?全部内容,希望文章能够帮你解决Microsoft MSAL Resource Owner Password Credentials(ROPC) 授予授权是否支持 ClientConfidentialAppplicaton 类获取令牌?所遇到的程序开发问题。

如果觉得大佬教程网站内容还不错,欢迎将大佬教程推荐给程序员好友。

本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。
如您有任何意见或建议可联系处理。小编QQ:384754419,请注明来意。
标签: