Acquire tokens to call a web API using a daemon application
After you've constructed a confidential client application, you can acquire a token for the app by calling AcquireTokenForClient
, passing the scope, and optionally forcing a refresh of the token.
Scopes to request
The scope to request for a client credential flow is the name of the resource followed by /.default
. This notation tells Microsoft Entra ID to use the application-level permissions declared statically during application registration. Also, these API permissions must be granted by a tenant administrator.
Here's an example of defining the scopes for the web API as part of the configuration in an appsettings.json file. This example is taken from the .NET console daemon code sample on GitHub.
{
"AzureAd": {
// Same AzureAd section as before.
},
"MyWebApi": {
"BaseUrl": "https://localhost:44372/",
"RelativePath": "api/TodoList",
"RequestAppToken": true,
"Scopes": [ "[Enter here the scopes for your web API]" ]
}
}
Azure AD (v1.0) resources
The scope used for client credentials should always be the resource ID followed by /.default
.
Important
When MSAL requests an access token for a resource that accepts a version 1.0 access token, Microsoft Entra ID parses the desired audience from the requested scope by taking everything before the last slash and using it as the resource identifier.
So if, like Azure SQL Database (https://database.windows.net
), the resource expects an audience that ends with a slash (for Azure SQL Database, https://database.windows.net/
), you'll need to request a scope of https://database.windows.net//.default
. (Note the double slash.) See also MSAL.NET issue #747: Resource url's trailing slash is omitted, which caused sql auth failure
.
AcquireTokenForClient API
To acquire a token for the app, use AcquireTokenForClient
or its equivalent, depending on the platform.
With Microsoft.Identity.Web, you don't need to acquire a token. You can use higher level APIs, as you see in Calling a web API from a daemon application. If however you're using an SDK that requires a token, the following code snippet shows how to get this token.
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Identity.Abstractions;
using Microsoft.Identity.Web;
// In the Program.cs, acquire a token for your downstream API
var tokenAcquirerFactory = TokenAcquirerFactory.GetDefaultInstance();
ITokenAcquirer acquirer = tokenAcquirerFactory.GetTokenAcquirer();
AcquireTokenResult tokenResult = await acquirer.GetTokenForUserAsync(new[] { "https://graph.microsoft.com/.default" });
string accessToken = tokenResult.AccessToken;
Protocol
If you don't yet have a library for your chosen language, you might want to use the protocol directly:
First case: Access the token request by using a shared secret
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 //Line breaks for clarity.
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded
client_id=00001111-aaaa-2222-bbbb-3333cccc4444
&scope=https%3A%2F%2Fgraph.microsoft.com%2F.default
&client_secret=A1b-C2d_E3f.H4i,J5k?L6m!N7o-P8q_R9s.T0u
&grant_type=client_credentials
Second case: Access the token request by using a certificate
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity.
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded
scope=https%3A%2F%2Fgraph.microsoft.com%2F.default
&client_id=11112222-bbbb-3333-cccc-4444dddd5555
&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer
&client_assertion=aaaaaaaa-0b0b-...
&grant_type=client_credentials
For more information, see the protocol documentation: Microsoft identity platform and the OAuth 2.0 client credentials flow.
Troubleshooting
Did you use the resource/.default scope?
If you get an error message telling you that you used an invalid scope, you probably didn't use the resource/.default
scope.
Did you forget to provide admin consent? Daemon apps need it!
If you get an Insufficient privileges to complete the operation error when you call the API, the tenant administrator needs to grant permissions to the application.
If you don't grant admin consent to your application, you'll run into the following error:
Failed to call the web API: Forbidden
Content: {
"error": {
"code": "Authorization_RequestDenied",
"message": "Insufficient privileges to complete the operation.",
"innerError": {
"request-id": "<guid>",
"date": "<date>"
}
}
}
Select one of the following options, depending on the role.
Cloud Application Administrator
For a Cloud Application Administrator, go to Enterprise applications in the Microsoft Entra admin center. Select the app registration, and select Permissions from the Security section of the left pane. Then select the large button labeled Grant admin consent for {Tenant Name} (where {Tenant Name} is the name of the directory).
Standard user
For a standard user of your tenant, ask a Cloud Application Administrator to grant admin consent to the application. To do this, provide the following URL to the administrator:
https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_id=Enter_the_Application_Id_Here
In the URL:
- Replace
Enter_the_Tenant_Id_Here
with the tenant ID or tenant name (for example,contoso.microsoft.com
). Enter_the_Application_Id_Here
is the application (client) ID for the registered application.
The error AADSTS50011: No reply address is registered for the application
may be displayed after you grant consent to the app by using the preceding URL. This error occurs because the application and the URL don't have a redirect URI. This can be ignored.
Are you calling your own API?
If your daemon app calls your own web API and you weren't able to add an app permission to the daemon's app registration, you need to Add app roles to the web API's app registration.
Next steps
Move on to the next article in this scenario, Calling a web API.