page_type | description | languages | products | urlFragment | ||
---|---|---|---|---|---|---|
sample |
A sample demonstrating how to use the Microsoft Authentication Library for JavaScript to get an access token and call an API secured by Azure AD B2C. |
|
|
active-directory-b2c-javascript-msal-singlepageapp |
Warning: Silent renewing of access tokens is not supported by all social identity providers.
This simple sample demonstrates how to use the Microsoft Authentication Library for JavaScript (msal.js) to get an access token and call an API secured by Azure AD B2C.
Note: A quickstart guide covering this sample can be found here.
Note: A more detailed tutorial covering this sample can be found here.
File/folder | Description |
---|---|
JavaScriptSPA |
Contains sample source files. |
authPopup.js |
Main authentication logic resides here (using Popup flow). |
authRedirect.js |
Use this instead of authPopup.js for authentication with redirect flow. |
authConfig.js |
Contains configuration parameters for the sample. |
api.js |
Provides a helper function for calling the web API. |
apiConfig.js |
Contains API endpoint and scope. |
ui.js |
Contains UI logic. |
policies.js |
Contains policies and authority strings. |
index.html |
Contains the UI of the sample. |
.gitignore |
Defines what to ignore at commit time. |
CHANGELOG.md |
List of changes to the sample. |
CODE_OF_CONDUCT.md |
Code of Conduct information. |
CONTRIBUTING.md |
Guidelines for contributing to the sample. |
LICENSE |
The license for the sample. |
package.json |
Package manifest for npm. |
README.md |
This README file. |
SECURITY.md |
Security disclosures. |
server.js |
Implements a simple Node server to serve index.html. |
- Node must be installed to run this sample.
- A modern web browser. This sample uses ES6 conventions and will not run on Internet Explorer.
There are two ways to run this sample:
- Using the demo environment - The sample is already configured to use a demo environment and can be run simply by downloading this repository and running the app on your machine. See steps below for Running with demo environment.
- Using your own Azure AD B2C tenant - If you would like to use your own Azure AD B2C configuration, follow the steps listed below for using your own Azure AD B2C tenant.
This sample demonstrates how to sign in or sign up for an account at "Fabrikam B2C" - the demo environment for this sample. Once signed-in, clicking on the Call Web API button shows the display name you used when you created your account.
From your shell or command line:
git clone https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp.git
Make sure you've installed Node.
From your shell or command line:
cd active-directory-b2c-javascript-msal-singlepageapp
npm install && npm update
npm start
The console window shows the port number for the web application
Listening on port 6420...
You can visit http://localhost:6420
and perform the following actions:
- Click the Login button to start the Azure AD B2C sign in, sign up or password reset user-flows.
- Once signed in, you can click on the Call Web API button to have your display name returned from the Web API call as a JSON object.
- Once signed in, you can click the Edit Profile button to edit your profile information.
- Click Logout to logout from the application.
In the previous section, you learned how to run the sample application using the demo environment. In this section, you'll learn how to configure this single page application sample and the related Node.js Web API with Azure AD B2C sample to work with your own Azure AD B2C Tenant. This will be covered in two parts.
Follow the instructions on the Node.js Web API with Azure AD B2C sample. Once you are done, you should have a Node.js web API running on the port 5000. While it runs, continue with Part II below.
Next, you need to register your single page application in your B2C tenant.
Provide the following values for the Single Page Application registration:
- Provide a descriptive Name for the single page application, for example,
My Test SPA
. You will identify this application by its Name whenever working in the Azure portal. - Mark Yes for the Web App/Web API setting for your application.
- Set the Reply URL for your app to
http://localhost:6420
. This sample provided in this repository is configured to run on port 6420. - Create the application.
- Once the application is created, click on the API Permissions blade (in the left nav menu). Click Add a Permission and select the name of the Node.js Web API you registered previously (under My APIs tab). Select the scope(s) you defined previously, for example,
demo.read
and hit Save.
Now in the sample code, you can replace the single page application's demo environment configuration with your own tenant.
- Open the
authConfig.js
file. - Find the assignment for
clientId
and replace the value with the Application ID for the single page application you registered earlier, for example the Application ID found inMy Test SPA
application in the Azure portal. - Open the
policies.js
file. - Find the entries for
names
andauthorities
and replacing, as appropriate, with the names of the policies you created in Step 2, andfabrikamb2c.onmicrosoft.com
by the name of your Azure AD B2C tenant, for examplehttps://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>
- Open the
apiConfig.js
file. - Find the assignment for the scopes
b2cScopes
replacing the URL by the scope URL you created for the Web API, e.g.b2cScopes: ["https://<your-tenant-name>.onmicrosoft.com/helloapi/demo.read"]
- Find the assignment for API URL
webApi
replacing the current URL by the URL where you deployed your Web API in Step 4, e.g.webApi: http://localhost:5000/hello
Your resulting code should look as follows:
const msalConfig = {
auth: {
clientId: "e760cab2-b9a1-4c0d-86fb-ff7084abd902",
authority: b2cPolicies.authorities.signUpSignIn.authority,
validateAuthority: false
},
cache: {
cacheLocation: "localStorage",
storeAuthStateInCookie: true
}
};
const loginRequest = {
scopes: ["openid", "profile"],
};
const tokenRequest = {
scopes: apiConfig.b2cScopes // i.e. ["https://fabrikamb2c.onmicrosoft.com/helloapi/demo.read"]
};
const b2cPolicies = {
names: {
signUpSignIn: "b2c_1_susi",
forgotPassword: "b2c_1_reset",
editProfile: "b2c_1_edit_profile"
},
authorities: {
signUpSignIn: {
authority: "https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_susi",
},
forgotPassword: {
authority: "https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_reset",
},
editProfile: {
authority: "https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_edit_profile"
}
},
}
const apiConfig = {
b2cScopes: ["https://fabrikamb2c.onmicrosoft.com/helloapi/demo.read"],
webApi: "https://fabrikamb2chello.azurewebsites.net/hello"
};
-
Install the node dependencies if this is your first time running the app (e.g. if you skipped running in the demo environment):
cd active-directory-b2c-javascript-msal-singlepageapp npm install && npm update
-
Run the Web application:
npm start
-
Go to
http://localhost:6420
. -
Click the login button at the top of the application screen. The sample works exactly in the same way regardless of the account type you choose, apart from some visual differences in the authentication and consent experience. Upon successful sign in, the application screen will show buttons that allow you to call an API and sign out.
-
Click on the Call Web API and see the textual representation of the JSON object that is returned. Make sure your Node.js Web API sample is still running on port 5000.
-
Sign out by clicking the Logout button.
-
The MSAL.js library allows you to pass a login_hint parameter in the AuthenticationParameters object, using the
loginHint
attribute.const loginRequest = { scopes: ["openid", "profile"], loginHint: "someone@contoso.com" };
-
You can pass any custom query string parameter in the AuthenticationParameters object, using the
extraQueryParameters
attribute. Following sample sets thecampaignId
that can be used in the Azure AD B2C UI, and the ui_locales set to es (Spanish).const loginRequest = { scopes: ["openid", "profile"], extraQueryParameters: { campaignId: 'hawaii', ui_locales: 'es' } };
For more information on Azure B2C, see:
- Azure AD B2C documentation homepage
- Microsoft authentication library for js Wiki
- Integrate Microsoft Authentication Library (MSAL) with Azure Active Directory B2C
We use StackOverflow with the msal and azure-ad-b2c tags to provide support. We highly recommend you ask your questions on StackOverflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [msal.js].
If you find and bug or have a feature request, please raise the issue on GitHub Issues.
To provide a recommendation, visit our Feedback Forum.
If you'd like to contribute to this sample, see CONTRIBUTING.MD.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.