Megosztás a következőn keresztül:


Configure single sign-on with a generic OAuth provider

Copilot Studio supports single sign-on (SSO) with OAuth 2.0 compatible authentication providers. SSO allows copilots on your website to sign customers in if they signed in to the page or app where the copilot is deployed.

Prerequisites

Create or use a custom canvas that supports the generic OAuth provider SSO flow

When the authentication topic is triggered in copilots connected with a generic OAuth 2.0 provider, Copilot Studio sends a message containing a secure URL, which is used to post the user's access token.

The custom canvas or a page where the canvas is embedded should implement the following pattern:

  1. Obtain an access token for the signed-in user from your OAuth 2.0 authentication provider, using your preferred method.

  2. Intercept an incoming message from Copilot Studio, and extract the secure URL.

  3. Post the access token to the secure URL.

Extract the secure URL and post the token

The custom canvas intercepts incoming messages using a middleware concept, which is code that runs in the context of receiving messages from Copilot Studio.

To respond to sign-in requests, the custom canvas needs to intercept messages with attachments that have the content type application/vnd.microsoft.card.oauth. OAuthCard attachments contain a content.tokenPostResource.sasUrl property, from which the secure URL can be extracted. Finally, the custom canvas should post the user's access token to the secure URL.

The following JavaScript code is an example of middleware code that extracts the secure URL and posts a token. If the post is successful, the middleware returns false. If the post is unsuccessful, or if the activity doesn't have the application/vnd.microsoft.card.oauth property, it returns next(…args).

const activityMiddleware = () => next => (...args) => {
  if (args[0].activity.attachments?.[0]?.contentType === 'application/vnd.microsoft.card.oauth') {
    var postEndpoint = args[0].activity.attachments?.[0].content.tokenPostResource.sasUrl;

    // Perform an HTTP POST to the secure URL with the body of:
    // {
    //     "token": <user_token> 
    // } 

    if(success)
       return false;
    else
       return next(...args);
  } else {
    return next(...args);
  }
};

Full sample code

The implementation of a custom canvas or app that obtains a token for a signed-in user, and posts the token to Copilot Studio, varies based on your authentication provider. For more information, see your authentication provider's documentation for more details about sign-in flows and obtaining access tokens. For a reference sample using OKTA, see Third party SSO with OKTA.

Using the token in Copilot Studio

Tokens that are posted using the secure URL are populated into the System.User.AccessToken variable in Copilot Studio. Copilot makers can use this system variable to access protected APIs that are connected to the authenticated provider that generated the token.

In the following example, an HTTP call is configured with an Authorization header that uses System.User.AccessToken.

Screenshot illustrating an HTTP call that accesses a secure APU.

Supported channels

SSO with a generic OAuth authentication provider is a custom pattern, which can be implemented by either a custom canvas, or any other client working with the Directline API.