This library makes it easy to to consume Microsoft account and Azure Active Directory authentication for the OneDrive SDK. It provides IAuthenticationProvider imlementations for Microsoft account OAuth and ADAL authentication.
The Authentication Adapter for the OneDrive SDK Library is built as a Portable Class Library. It targets the following frameworks:
To install the client library via NuGet:
Microsoft.OneDriveSdk.Authentication
in the NuGet Library, orInstall-Package Microsoft.OneDriveSdk.Authentication
into the Package Manager Console.Register your application to use Microsoft Graph API using one of the following supported authentication portals:
var msaAuthenticationProvider = new MsaAuthenticationProvider(
clientId,
returnUrl,
scopes);
The MsaAuthenticationProvider constructor has an overload that takes in client secret for platforms that support web clients.
If you are building a UWP app, you can leverage the user's signed-in account. Simply construct an OnlineIdAuthenticationProvider
:
var msaAuthenticationProvider = new OnlineIdAuthenticationProvider(scopes);
This type inherits from MsaAuthenticationProvider
and behaves similarly. It will also refresh the user's token as needed.
msaAuthenticationProvider.AuthenticateUserAsync();
AuthenticateUserAsync will perform the action of prompting the user with authentication UI.
var adalAuthenticationProvider = new AdalAuthenticationProvider(AccountSelection.AadClientId, AccountSelection.AadReturnUrl);
The AdalAuthenticationProvider constructor has an overload that takes in client secret or client certificate for platforms that support web clients. The developer can also pass in an AuthenticationContext, in case the app is already using ADAL for authentication and would like to re-use their authentication context.
The DiscoveryServiceHelper is used to look up discovery service information for a user. It takes in an AdalAuthenticationProvider to authenticate the user for the discovery service endpoint.
var discoveryServiceHelper = new DiscoveryServiceHelper(adalAuthenticationProvider);
var businessServiceInformation = await discoveryServiceHelper.DiscoverFilesEndpointInformationForUserAsync();
await adalAuthenticationProvider.AuthenticateUserAsync(serviceResourceId);
await adalAuthenticationProvider.AuthenticateUserWithRefreshTokenAsync(refreshToken, serviceResourceId);
serviceResourceId is optional when authenticating using a refresh token. If not provided, the access token will be granted for the resource that generated the refresh token.
await adalAuthenticationProvider.AuthenticateUserWithAuthorizationCodeAsync(authorizationCode, serviceResourceId);
serviceResourceId is optional when authenticating using an authorization code. If not provided, the access token will be granted for the resource that generated the code.
var client = new OneDriveClient(baseUrl, authenticationProvider);
MasAuthProvider can store sessions for re-use later. Make the following changes to take advantage of silent re-authentication:
MsaAuthenticationProvider
, provide an instantiation of ICredentialVault
. A default implementation is available in CredentialVault
.AuthenticateAsync
, call RestoreMostRecentFromCacheOrAuthenticateUserAsync
on the instance of MsaAuthenticationProvider
.var msaAuthProvider = new MsaAuthenticationProvider(
clientId,
returnUrl,
scopes,
/*CredentialCache*/ null,
new CredentialVault(clientId));
authTask = msaAuthProvider.RestoreMostRecentFromCacheOrAuthenticateUserAsync();
app.OneDriveClient = new OneDriveClient(this.oneDriveConsumerBaseUrl, msaAuthProvider);
This will store the session in a secure location (encrypted on disk with the user's context, so only the current user can decrypt), and also retrieve previous sessions. If a previous session is found with a refresh token, then its redemption will be attempted before prompting the user to log in. If the refresh token is valid then the user will not see authentication UI at all.
To clear out this cache, simply call await MsaAuthenticationProvider.SignOutAsync()
. The contents of the cache will be deleted.
Note: CredentialVault is not necassary if you are using OnlineIdAuthenticationProvider
.
To view or log issues, see issues.
Copyright (c) Microsoft Corporation. All Rights Reserved. Licensed under the MIT license
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.