-
Notifications
You must be signed in to change notification settings - Fork 991
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure AD Support #112
Comments
We are not willing to implement workarounds for each broken OAuth 2.0 implementation. If this is a blocker for you, please maintain your own of the oauth2 package with the necessary patches. |
I found this issue via Google and wanted to note for posterity that this is supported now. To get the config := &oauth2.Config{
ClientID: "my-client-id",
ClientSecret: "my-client-secret",
RedirectURL: "https://localhost",
Endpoint: oauth2.Endpoint{
AuthURL: "https://login.microsoftonline.com/common/oauth2/authorize",
TokenURL: "https://login.microsoftonline.com/common/oauth2/token",
},
}
config.AuthCodeURL("state", oauth2.SetAuthURLParam("resource", "https://outlook.office.com")) You can also set Hope this helps anyone else who finds this issue! |
@bmorton can you add a bit more on the code since I did this in python but in Golang i am struggling .... Thx |
Would like to see Azure Active Directory support officially added. This requires the
client_secret
andresource
parameters. In my testing, adding "https://login.microsoftonline.com/" to thebrokenAuthHeaderProviders
slice in addition to usingresource
in place ofscope
seems to do the trick.The text was updated successfully, but these errors were encountered: