services | platforms | author | level | client | service | endpoint |
---|---|---|---|---|---|---|
active-directory |
dotnet, xamarin.iOS, xamarin.Android, UWP |
jmprieur |
300 |
Xamarin |
Microsoft Graph |
Microsoft identity platform |
This is a simple Xamarin Forms app showcasing how to use MSAL.NET to:
- Authenticate users with Work or School accounts (AAD) or Microsoft personal accounts (MSA)
- Get an access token for Microsoft Graph
The Xamarin Forms application is provided for Xamarin.iOS, Xamarin.Android, and Xamarin.UWP
- You can learn more about Microsoft Graph with this video: An introduction to Microsoft Graph for developers.
To run this sample you will need:
- Visual Studio 2019 with the Mobile development with .NET workload:
- An Internet connection
- At least one of the following accounts:
- A Microsoft Account - you can get a free account by visiting https://www.microsoft.com/en-us/outlook-com/.
- An Azure AD account - you can get a free trial Office 365 account by visiting https://products.office.com/en-us/try.
- For UWP, if you want to test the UWP application, you will have to add the SDK corresponding to your version of Windows 10 (or all the Windows 10 SDKs). See Testing UWP applications on Windows 10
- Setup Xamarin.iOS for Visual Studio (if you want to run the iOS app)
- For a faster Android emulator, consider using with Hyper-V. This might require turning on Virtualization in BIOS settings of your PC.
From your shell or command line:
git clone https://github.com/Azure-Samples/active-directory-xamarin-native-v2.git
cd 1-Basic
or download and exact the repository .zip file.
Given that the name of the sample is pretty long, and so are the name of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
You can run the sample as is with its current settings, or you can optionally register it as a new application under your own developer account.
As a first step you'll need to:
- Sign in to the Azure portal using either a work or school account or a personal Microsoft account.
- If your account is present in more than one Azure AD tenant, select your profile at the top right corner in the menu on top of the page, and then switch directory. Change your portal session to the desired Azure AD tenant.
- Navigate to the Microsoft identity platform for developers App registrations page.
- Select New registration.
- When the Register an application page appears, enter your application's registration information:
- In the Name section, enter a meaningful application name that will be displayed to users of the app, for example
active-directory-xamarin-native-v2
. - In the Supported account types section, select Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com).
- In the Name section, enter a meaningful application name that will be displayed to users of the app, for example
- Select Register to create the application.
- On the app Overview page, find the Application (client) ID value and record it for later. You'll need it to configure the Visual Studio configuration file for this project.
- In the list of pages for the app, select Authentication..
- In the Redirect URIs | Suggested Redirect URIs for public clients (mobile, desktop) section, check the option of the form msal<clientId>://auth
- Select Save.
- In the list of pages for the app, select API permissions
- Click the Add a permission button and then,
- Ensure that the Microsoft APIs tab is selected
- In the Commonly used Microsoft APIs section, click on Microsoft Graph
- In the Delegated permissions section, ensure that the right permissions are checked: User.Read. Use the search box if necessary.
- Select the Add permissions button
In the steps below, "ClientID" is the same as "Application ID" or "AppId".
- Open the solution in Visual Studio 2017.
- Open the
UserDetailsClient\App.cs
file. - Find the assignment for
public static string ClientID
and replace the value with the Application ID from the app registration portal, created in Step 2.
- Open the
UserDetailsClient.iOS\AppDelegate.cs
file. - Open the
UserDetailsClient.iOS\info.plist
file in a text editor (opening it in Visual Studio won't work for this step as you need to edit the text) - In the URL types section, add an entry for the authorization schema used in your redirectUri:
<key>CFBundleURLTypes</key>
<array>
<dict>
<key>CFBundleTypeRole</key>
<string>Editor</string>
<key>CFBundleURLName</key>
<string>com.yourcompany.UserDetailsClient</string>
<key>CFBundleURLSchemes</key>
<array>
<string>msal[ClientID]</string>
</array>
</dict>
</array>
where [ClientID]
is the identifier you copied in step 2. Save the file.
- Open the
UserDetailsClient.Droid\MsalActivity.cs
file. - Replace
[ClientID]
with the identifier you copied in step 2. - Save the file.
[Activity]
[IntentFilter(new[] { Intent.ActionView },
Categories = new[] { Intent.CategoryBrowsable, Intent.CategoryDefault },
DataHost = "auth",
DataScheme = "msal[ClientID]")]
public class MsalActivity : BrowserTabActivity
{
}
Choose the platform you want to work on by setting the startup project in the Solution Explorer. Make sure that your platform of choice is marked for build and deploy in the Configuration Manager. Clean the solution, rebuild the solution, and run it:
- Click the sign-in button at the bottom of the application screen. On the sign-in screen, enter the name and password of a personal Microsoft account or a work/school account. The sample works exactly in the same way regardless of the account type you choose, apart from some visual differences in the authentication and consent experience. During the sign in process, you will be prompted to grant various permissions (to allow the application to access your data).
- Upon successful sign in and consent, the application screen will list some basic profile info for the authenticated user. Also, the button at the bottom of the screen will turn into a Sign out button.
- Close the application and reopen it. You will see that the app retains access to the API and retrieves the user info right away, without the need to sign in again.
- Sign out by clicking the Sign out button and confirm that you lose access to the API until the next interactive sign in.
MSAL.NET in Android requires support for Chrome Custom Tabs for displaying authentication prompts. Not every emulator image comes with Chrome on board: please refer to this document for instructions on how to ensure that your emulator supports the features required by MSAL.
The structure of the solution is straightforward. All the application logic and UX reside in UserDetailsClient (portable)
project.
-
MSAL's main primitive for native clients,
PublicClientApplication
, is initialized as a static variable inApp.cs
(For details see Client applications in MSAL.NET)PCA = PublicClientApplicationBuilder.Create(ClientID) .WithRedirectUri($"msal{App.ClientID}://auth") .Build();
-
For single-tenant apps, you must include
.WithTenantId(<tenantId>)
in the application builder. -
At application startup, the main page (
UserDetailsClient/MainPage.xaml.cs
) attempts to get a token without showing any UX - just in case a suitable token is already present in the cache from previous sessions. This is the code performing that logic:try { IAccount firstAccount = accounts.FirstOrDefault(); authResult = await App.PCA.AcquireTokenSilent(App.Scopes, firstAccount) .ExecuteAsync(); /* display info*/ } catch (MsalUiRequiredException ex) { try { authResult = await App.PCA.AcquireTokenInteractive(App.Scopes, App.ParentWindow) .ExecuteAsync(); /* display info*/ } }
-
If the attempt to obtain a token silently fails, we display a screen with the sign in button (at the bottom of the application).
-
When the sign in button is pressed, we execute the same logic - but using a method that shows interactive UX:
AuthenticationResult ar = await App.PCA.AcquireTokenInteractive(App.Scopes, App.ParentWindow);
-
The
Scopes
parameter indicates the permissions the application needs to gain access to the data requested through subsequent web API call (in this sample, encapsulated inRefreshUserData
).
The parentWindow
is used in Android to tie the authentication flow to the current activity, and in UWP to center the window. It is ignored on iOS. For more platform specific considerations, please see below.
-
The sign out logic is very simple. In this sample we have just one user, however we are demonstrating a more generic sign out logic that you can apply if you have multiple concurrent users and you want to clear up the entire cache.
var accounts = await App.PCA.GetAccountsAsync(); while (accounts.Any()) { await App.PCA.RemoveAsync(accounts.FirstOrDefault()); accounts = await App.PCA.GetAccountsAsync(); }
The platform specific projects require only a couple of extra lines to accommodate for individual platform differences.
The UserDetailsClient.Droid
project requires two extra lines in the MainActivity.cs
file.
In OnActivityResult
, we need to add
AuthenticationContinuationHelper.SetAuthenticationContinuationEventArgs(requestCode, resultCode, data);
That line ensures that the control goes back to MSAL once the interactive portion of the authentication flow ended.
In OnCreate
, we need to add the following assignment (the ParentWindow is the activity)
App.ParentWindow = this;
That code ensures that the authentication flows occur in the context of the current activity.
The UserDetailsClient.iOS
project only requires one extra line, in AppDelegate.cs
.
You need to ensure that the OpenUrl handler looks as the snippet below:
public override bool OpenUrl(UIApplication app, NSUrl url, NSDictionary options)
{
AuthenticationContinuationHelper.SetAuthenticationContinuationEventArgs(url);
return true;
}
Once again, this logic is meant to ensure that once the interactive portion of the authentication flow is concluded, the flow goes back to MSAL.
Also, in order to make the token cache work and have the AcquireTokenSilentAsync
work multiple steps must be followed :
- Enable Keychain access in your
Entitlements.plist
file and specify in the Keychain Groups your bundle identifier. - In your project options, on iOS Bundle Signing view, select your
Entitlements.plist
file for the Custom Entitlements field. - When signing a certificate, make sure XCode uses the same Apple Id.
On Android and iOS, brokers enable:
- Single Sign On (SSO). Your users won't need to sign-in to each application.
- Device identification. By accessing the device certificate which was created on the device when it was workplace joined.
- Application identification verification. When an application calls the broker, it passes its redirect url, and the broker verifies it.
You can learn how to have your application support the broker on iOS in Leveraging the broker on iOS
You can set the UseCorporateNework
boolean to true
to benefit from windows integrated authentication (and therefore SSO with the user signed-in with the operating system) if this user is signed-in with an account in a federated Azure AD tenant. This leverages WAB (Web Authentication Broker). Setting this property to true assumes that the application developer has enabled Windows Integrated Authentication (WIA) in the application. For this, in the Package.appxmanifest
for your UWP application, in the Capabilities tab, enable the following capabilities:
- Enterprise Authentication
- Private Networks (Client & Server)
- Shared User Certificate
WIA is not enabled by default because applications requesting the Enterprise Authentication or Shared User Certificates capabilities require a higher level of verification to be accepted into the Windows Store, and not all developers may wish to perform the higher level of verification.
This might be because you have not installed all the required components from Visual Studio. You need to add the Mobile development with .NET workload, in the Visual Studio Installer.
you need to right click on the visual studio solution, choose Configuration Properties > Configuration and make sure that you check the projects and configuration you want to build (and deploy)
- you might want to right click on the
UserDetailsClient.UWP (Universal Windows)
project and, in the Application tab, change the Universal Windows Target and Min Version depending on the SDK you have installed on your machine. - To install more Windows 10 SDKs, run Visual Studio Installer, choose your Visual Studio installation, click on Modify, and in the Individual components tab, in the SDKs, Libraries, and frameworks section, make sure you check all the Windows 10 SDK versions that you need.
If sign-in with your work or school account and your organization requires conditional access, you are asked to provide a certificate:
-
If you did not enabled UWP specific considerations above, you will get this error:
No valid client certificate found in the request. No valid certificates found in the user's certificate store. Please try again choosing a different authentication method.
-
On Windows 10 desktop UWP application, if you enabled the settings described in UWP specific considerations, the list of certificates is presented, however if you choose to use your PIN, the PIN window is never presented. This is a known limitation with Web authentication broker in UWP applications running on Windows 10 (this works fine on Windows Phone 10). As a work around, you will need to click on the sign in with other options link and then choose Sign-in with a username and password instead, provide your password and go through the phone authentication. See also https://docs.microsoft.com/windows/uwp/security/web-authentication-broker for more debugging options related to the Web authentication broker used by MSAL.NET on the UWP platform
Samples favor simple code structures that show you how to use MSAL. Samples do not showcase best practices and patterns, nor do they make use of other libraries.
- Consider using dependency injection for the
IPublicClientApplication
- Consider wrapping the construction of the
IPublicClientApplication
andAcquireToken*
in another class to make testing possible. Mocking the existing builder pattern for creatingIPublicClientApplication
andAcquireTokenInteractiveParameterBuilder
is not possible (we've tried). - MSAL will generally let HTTP exceptions propagate. Consider using Xamarin.Essentials to detect situations where the network is down in order to provide a better error message to the user.
For more information, please visit:
- For more information on acquiring tokens with MSAL.NET, please visit MSAL.NET's conceptual documentation, in particular:
- To understand more about the Microsoft identity platform endpoint see http://aka.ms/aaddevv2
- For more information about how the protocols work in this scenario and other scenarios, see Authentication Scenarios for Microsoft identity platform.
- For more information about Microsoft Graph, please visit the Microsoft Graph homepage