我正在开发一个 Outlook 插件.我想在其中使用一个驱动器 API.我很容易获得客户端 ID 和客户端密码,以便将 API 用于一个驱动器个人帐户.但是,当我为一个驱动器业务 API 注册我的应用程序时天蓝色的活动目录,它只为我创建了一个客户端 ID,但没有创建任何客户端密码.我在注册时选择了本机应用程序,因为我的应用程序是本机应用程序.没有客户端密码我无法验证用户.请告诉我,如何获取客户端密码?提前谢谢.
I am developing an outlook plugin.I want use one drive API's in it.I easily got the client Id and client secret for using API's for one drive personal accounts.But, when I registered my application for one drive business API's in azure active directory, it created only a client Id for me, but didn't create any client secret.I chose native app while registering, as my app is a native app.I can't authenticate the user without the client secret.Please let me know , how to get the client secret?Thanks in advance.
本地客户端没有与之关联的任何机密 - 鉴于它们旨在在设备上运行,假设它们无法保护一个秘密.本机客户端使用 clientID 来指示客户端应用程序,但身份验证始终通过在流程中涉及用户身份来完成.如果您在 http://github.com/azureadsamples 中选择任何本机客户端示例,您将看到 clientid足以触发用户身份验证.
Native clients don't have any secrets associated to them - given that they are meant to run on devices, it is assumed that they would not be able to protect a secret. Native clients use the clientID for indicating the client app, but the authentication is always done by involving a user identity in the process. If you pick any of the native client samples in http://github.com/azureadsamples you will see how the clientid is enough to trigger user auth.
这篇关于如何从本机应用程序的天蓝色活动目录中获取客户端机密以使用一个驱动器业务 API?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持html5模板网!
ASP.NET Core 使用 Azure Active Directory 进行身份验证并ASP.NET Core authenticating with Azure Active Directory and persisting custom Claims across requests(ASP.NET Core 使用 Azure Active Directory 进行身
ASP.NET Core 2.0 Web API Azure Ad v2 令牌授权不起作用ASP.NET Core 2.0 Web API Azure Ad v2 Token Authorization not working(ASP.NET Core 2.0 Web API Azure Ad v2 令牌授权不起作用)
如何获取守护进程或服务器到 C# ASP.NET Web API 的How do I get Azure AD OAuth2 Access Token and Refresh token for Daemon or Server to C# ASP.NET Web API(如何获取守护进程或服务器到 C# ASP.N
异步调用时 Azure KeyVault Active Directory AcquireTokenAAzure KeyVault Active Directory AcquireTokenAsync timeout when called asynchronously(异步调用时 Azure KeyVault Active Directory AcquireTokenAsync 超
使用电子邮件地址和应用程序密码从 oauth2/tokenGetting access token using email address and app password from oauth2/token(使用电子邮件地址和应用程序密码从 oauth2/token 获取访问令
新的 Azure AD 应用程序在通过管理门户更新之前无New Azure AD application doesn#39;t work until updated through management portal(新的 Azure AD 应用程序在通过管理门户更新之前无法运行