Azure-docs: Daemons/server-side apps via Client Credential Flow

Created on 28 Feb 2018  Â·  6Comments  Â·  Source: MicrosoftDocs/azure-docs

The documentation says this is not supported but the user voice feedback item says you can do this now:

Daemons/server-side apps

This flow is not currently supported by Azure AD B2C.

user voice:

Currently, you can use “App Registration” blade in the Azure Portal (outside of the Azure AD B2C blades) to register an apps that define application permission and the register apps that use client credentials to request these. The caveat is that this is done using the same mechanism that you’d use in regular Azure AD.


Document Details

âš  Do not edit this section. It is required for docs.microsoft.com âžź GitHub issue linking.

  • ID: b05da885-25ac-99ff-890d-97e9c670f1d7
  • Version Independent ID: 0673a2a2-e408-8ed4-83c8-1acc461d2c74
  • Content
  • Content Source
  • Service: active-directory-b2c
active-directory-b2svc assigned-to-author doc-bug in-progress triaged

All 6 comments

@spottedmahn Thanks for reporting this. I have assigned the issue to the content author to take a look and update as appropriate.

in-process

@spottedmahn You can do it outside of AD B2C using this information:

https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-devquickstarts-webapi-dotnet

https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds

But as you know, this would be completely outside of B2C. I have opened an item in our documentation backlog to clear this up in the article.

We'll respond back to you on this issue when we've done the work. For now, we'll close this GitHub issue.

please-close

@spottedmahn An update to this issue: The article Application types that can be used in Active Directory B2C already had a discussion about the limitations around server-side apps. I revised the text per engineering feedback and added a link to the active directory article that describes the flow.

Nice, looks good, thanks @davidmu1 👍

Was this page helpful?
0 / 5 - 0 ratings