ms-identity-javascript-react-spa-dotnetcore-webapi-obo | Redux single-page application | Azure library
kandi X-RAY | ms-identity-javascript-react-spa-dotnetcore-webapi-obo Summary
kandi X-RAY | ms-identity-javascript-react-spa-dotnetcore-webapi-obo Summary
This sample demonstrates a React & Redux single-page application which lets a user authenticate and obtain an access token to call an ASP.NET Core web API, protected by Azure Active Directory (Azure AD). The web API then calls the Microsoft Graph API using the on-behalf-of flow. The web API's call to the Microsoft Graph API is made using the Microsoft Graph SDK.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ms-identity-javascript-react-spa-dotnetcore-webapi-obo
ms-identity-javascript-react-spa-dotnetcore-webapi-obo Key Features
ms-identity-javascript-react-spa-dotnetcore-webapi-obo Examples and Code Snippets
Community Discussions
Trending Discussions on ms-identity-javascript-react-spa-dotnetcore-webapi-obo
QUESTION
I'm testing the example in following GitHub repository. Azure AD for React Redux .Net core
I've selected the Supported account types as "Accounts in this organizational directory only " when registering both client and API apps. But when executing it gives following error when trying to login.
"We're unable to complete your request unauthorized_client: The client does not exist or is not enabled for consumers. If you are the application developer, configure a new application through the App Registrations in the Azure Portal at https://go.microsoft.com/fwlink/?linkid=2083908."
can anyone please help me to resolve this.
...ANSWER
Answered 2021-Mar-12 at 09:10This error means you are using a Microsoft Account(MSA) to login your client app, but it is not enabled for that.
To allow your client app to be logged in with an MSA, you need to choose the Supported account types
with the third option or fourth option like below when you create it.
To change the setting for an existing AD App, navigate to the Manifest
blade of it in the portal, find the signInAudience
attribute, set it with AzureADandPersonalMicrosoftAccount
or PersonalMicrosoftAccount
, they correspond to the above two options.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install ms-identity-javascript-react-spa-dotnetcore-webapi-obo
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page