Thank you for posting your query on Microsoft Q&A. From above description I am not able to understand much however I am assuming that you have follow objective:
- How to get an Azure AD access token for an application registered (3rd party) with Azure AD?
- To add a certificate with the application registered following file types .cer .pem .prt, but I'm not sure where to find these.
PFB answers:
How to get an Azure AD access token for an application registered (3rd party) with Azure AD?
- You need to Register the application with Azure AD.
- Get access on behalf of a user OR
- Get access without a user
To add a certificate with the application registered following file types .cer .pem .prt, but I'm not sure where to find these.
- As a step in Application registration you can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
- You may Create a self-signed public certificate to authenticate your application
- As per Microsoft identity platform application authentication certificate credentials,
One form of credential that an application can use for authentication is a JSON Web Token (JWT) assertion signed with a certificate that the application owns. This is described in the OpenID Connect specification for the
private_key_jwt
client authentication option. If you're interested in using a JWT issued by another identity provider as a credential for your application, please see workload identity federation for how to set up a federation policy.
Please do let me know if you have any queries.
Thanks,
Akshay Kaushik
Please "Accept the answer" (Yes), and share your feedback if the suggestion answers you’re your query. This will help us and others in the community as well.