react-native-msal v4.0.4
react-native-msal
Getting started
Requires React Native >=0.61
$ yarn add react-native-msal
Setup
Common Setup
Before setting up your React Native app, you must register your application in the Azure Portal.
Android Setup
- Register a redirect URI for your application for Android in the Azure Portal. It will have the following pattern:
msauth://<PACKAGE>/<BASE64_URL_ENCODED_PACKAGE_SIGNATURE>
.- Get your package signature from your
.keystore
file, or from the Google Play Console if you have automatic app signing turned on.- See the MSAL FAQ for instructions on how to get the package signature from your
.keystore
file. - If you have automatic app signing turned on, you will find a SHA1 hash in your Google Play Console, under Release Management > App Signing > App Signing Certificate. To convert that to a base64 encoded string use the following command:
echo -n "<YOUR_SHA1_SIGNATURE>" | openssl dgst -binary -sha1 | openssl base64
. - Paste the base64 signature hash into the "Signature hash" field in the portal, and a redirect uri will be generated for you.
- See the MSAL FAQ for instructions on how to get the package signature from your
- Get your package signature from your
- Create your MSAL configuration file as described here. IMPORTANT: You MUST create a file in your assets folder (
android/app/src/main/assets
) namedmsal_config.json
containing your MSAL configuration. If you don't have anassets
folder already, you will need to create one. - Configure your
AndroidManifest.xml
file as described here.
iOS Setup
Follow the steps as described here. Steps include:
- Register a redirect URI for your application for iOS in the Azure Portal. It should be in the following format:
msauth.[BUNDLE_ID]://auth
- Add a keychain group to your project Capabilities called
com.microsoft.adalcache
- Add your application's redirect URI scheme to your
Info.plist
file, which will be in the format of msauth.BUNDLE_ID - Add LSApplicationQueriesSchemes to allow making call to Microsoft Authenticator if installed.
- Add the provided code in your AppDelegate.m to handle MSAL callbacks
Usage
PublicClientApplication
class
This class is designed to be a thin wrapper around the native functionality of the Android and iOS MSAL libraries.
Creating an instance
const config: MSALConfiguration = {
auth: {
clientId: 'your-client-id',
// authority: 'default-authority',
},
};
const pca = new PublicClientApplication(config);
If you don't provide an authority, the common one will be used. This authority will be used as the default for calls to acquireToken
and acquireTokenSilent
.
Signing in interactively
const params: MSALInteractiveParams = {
scopes: ['scope1', 'scope2'],
};
const result: MSALResult = await pca.acquireToken(params);
You must use this method before any calls to acquireTokenSilent
.
Use the accessToken
from the MSALResult to call your API.
Store the account
from the result for acquiring tokens silently or for removing the account.
Acquiring tokens silently
const params: MSALSilentParams = {
scopes: ['scope1', 'scope2'],
account: result.account,
// forceRefresh: true,
};
const result = await pca.acquireTokenSilent(params);
You can force the token to refresh with the forceRefresh
option
Listing all accounts for which the application has refresh tokens
const accounts: MSALAccount[] = await pca.getAccounts();
Instead of storing the account
from a MSALResult for an acquireTokenSilent
method call, you can filter the MSALAccount[] result for a particular account and use it.
Signing out
const res: boolean = await pca.removeAccount(result.account);
Alternatively, you can call the signOut
method:
const params: MSALSignoutParams = {
account: result.account,
// signoutFromBrowser: true
};
const res: boolean = await pca.signOut(params);
On Android, this is the same as removeAccount
, but on iOS, if you call it with signoutFromBrowser: true
, it will sign you out of the browser as well.
B2C Applications
The PublicClientApplication
class is a bit too bare bones for dealing with a B2C application, and you will need to write a bit of code to get the desired behavior.
To address this issue, the example app that is included in this repository includes a B2CClient
class which contains a lot of the functionality you will need for a B2C app. You can copy this class right into your own React Native app and modify it to your liking. You can see it being used in the example's App.tsx
If you would like to see this class included in the library itself, please create an issue requesting so.
Example
As mentioned above, the example app demonstrates a B2C implementation
To run the example, first:
yarn bootstrap
- Register the redirect URLs in your tenant:
- Android:
msauth://com.example/P6akJ4YYsuUDahjqGra9mAflzdA%3D
- iOS:
msauth.com.example://auth
- Android:
- Update the
b2cConfig
object inmsalConfig.ts
with your details
Android
- Edit the
msal_config.json
asset file to include your client id and authorities yarn example android
iOS
yarn example ios
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago