
Hi Suraj, I had a similar question posted on stack overflow and ended up answering my own question here:
https://stackoverflow.com/questions/79589292/use-github-s-oidc-feature-to-authenticate-directly-to-azure-entra-id/79590023#79590023
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hi Microsoft Team,
I am developing a React.js-based Outlook Add-In and for that I have been setting up a federated credential using GitHub Actions as the external Identity Provider (IdP) for an application in Microsoft Entra ID. What additional steps are needed to get an access token using the federated credential? Specifically, I want the token to be scope for calling Microsoft Graph API endpoints.
Below are the steps I have completed so far:
For set up in GitHub Action followed the steps as per steps in documentation:
Authenticate to Azure from GitHub Actions workflows | Microsoft Learn
on: [push]
permissions:
``id-token: write
``contents: read
name: Run Azure Login without subscription
jobs:
``build-and-deploy:
``runs-on: ubuntu-latest
``steps:
``- name: Azure Login
``uses: azure/login@v2
``with:
``client-id: ${{ secrets.AZURE_CLIENT_ID }}
``tenant-id: ${{ secrets.AZURE_TENANT_ID }}
``allow-no-subscriptions: true
``enable-AzPSSession: true
``- name: Azure CLI script
``uses: azure/cli@v2
``with:
``azcliversion: latest
``inlineScript: |
``az account show
``- name: Run Azure PowerShell
``uses: azure/powershell@v2
``with:
``azPSVersion: "latest"
``inlineScript: |
``Get-AzContext
Hi Suraj, I had a similar question posted on stack overflow and ended up answering my own question here:
https://stackoverflow.com/questions/79589292/use-github-s-oidc-feature-to-authenticate-directly-to-azure-entra-id/79590023#79590023