A cloud-based identity and access management service for securing user authentication and resource access
Hello RajKumar Kannan,
Microsoft SSO may be integrated into your Cloud FinOps SPA without the need for a client secret or certificate. The Microsoft identity platform requires SPAs to handle their apps as public clients, and interactive user-based flows, such as the OAuth 2.0 authorization code flow using PKCE, are the best method for user authentication. Client secrets and certificates belong to private clients like server apps or daemons, thus you don't need (and shouldn't use) them in a browser-based SPA.
In order for your SPA to sign a user in:
- The user is redirected to the /authorize endpoint of Azure AD by the browser application. Azure AD asks the user to consent and sign in if necessary.
- Your SPA receives an authorization code from Azure AD. Without a client secret, the SPA (using MSAL.js + PKCE) trades that code for an ID token and may also access tokens.
In addition to allowing your app to use APIs (such as Microsoft Graph or your own backend) on the user's behalf, this interactive flow verifies the user's identity (SSO).
And client credentials is not suitable for your scenario as its only service to service authentication.
Single-page app sign-in & sign-out code - Microsoft identity platform | Microsoft Learn
Let me know if any further queries - feel free to reach out!
Otherwise, we can connect offline to troubleshoot the issue. Please share details over private message.