This gem is an Azure Active Directory B2C Strategy for OmniAuth.
In your Gemfile
add gem 'omniauth-azure_active_directory_b2c'
.
In your codebase add require 'omniauth-azure_active_directory_b2c'
.
Configuration depends on your stack... are you using a vanilla Rack application? Are you using Rails with the Devise and OmniAuth module? Are you using Rails directly with the OmniAuth gem? Are you using Sinatra?
In config/initializers/devise.rb
:
config.omniauth :azure_active_directory_b2c, strategy_options
Head over to the Devise repo and the OmniAuth Module Overview for further instructions on how to set up routes, controllers, etc.
See the next section for the strategy options.
In config/initializers/omniauth.rb
:
Rails.application.config.middleware.use OmniAuth::Builder do
provider :azure_active_directory_b2c, strategy_options
end
Head over to the OmniAuth repo and its wiki for further background info and instructions.
See the next section for the strategy options.
class MyApp < Sinatra::Base
use Rack::Session::Cookie
use OmniAuth::Builder do
provider :azure_active_directory_b2c, strategy_options
end
get '/auth/:provider' do
raise "OmniAuth provider has not been configured: %s" % params['provider']
end
get '/auth/:provider/callback' do
env['omniauth.auth']
end
end
Head over to the OmniAuth repo and its wiki for further background info and instructions.
See the next section for the strategy options.
This strategy accepts the following options:
Option | Required | Description |
---|---|---|
:name |
Optional | Sets the provider name used in the request and callback URLs. Defaults to 'azure_active_directory_b2c' . |
:redirect_uri |
Required | The absolute url sent to the Azure AD B2C policy to initiate the callback phase. |
:policy_options |
Required | A hash used to initialize an OmniAuth::Strategies::AzureActiveDirectoryB2C::Policy object . |
Additional info for each option will follow.
This is a complete example:
use OmniAuth::Builder do
provider :azure_active_directory_b2c, {
redirect_uri: ->(strategy) { 'http://localhost:9292/auth/%s/callback' % strategy.optionsname },
policy_options: {
application_identifier: '00000000-0000-0000-0000-000000000000',
application_secret: '****************',
tenant_name: 'example.onmicrosoft.com',
policy_name: 'b2c_1_signupin',
scope: [
:openid,
'https://example.onmicrosoft.com/example-api/user_impersonation',
'https://example.onmicrosoft.com/example-api/read',
'https://example.onmicrosoft.com/example-api/write',
],
jwk_signing_keys: { 'keys' => [{ 'kid' => '...', 'n' => '...' }]},
}
}
end
By default, :name
is set to azure_active_directory_b2c
.
This tells the OmniAuth gem what to name the request and callback URLs.
Eg. GET /auth/:name
and GET /auth/:name/callback
.
When you direct a user to GET /auth/azure_active_directory_b2c
, the request_phase
of this strategy will be initiated and the user will be redirected to the authorize
endpoint of the Azure AD B2C Policy.
When the Azure AD B2C Policy returns, it will return to the given redirect_url
which should, by default, match up to GET /auth/azure_active_directory_b2c/callback
. This will initiate the callback_phase
of this strategy. The strategy uses the code
returned from the policy to request an access_code
and id_token
from the policy.
The unencrypted user information will be available from the environment: env['omniauth.auth']
.
This is required as the URI must be absolute. The option can be used in one of two ways:
Pass in a String:
provider :azure_active_directory_b2c, redirect_uri: 'https://localhost:9292/auth/azure_active_directory_b2c/callback'
Pass in a Proc that returns a String:
provider :azure_active_directory_b2c, {
redirect_uri: ->(strategy) {
'https://localhost:9292/auth/%s/callback' % strategy.options.name
}
}
You must ensure that redirect_uri
is registered with the Application in the Azure AD B2C tennant otherwise you will get errors.
These options provide the configuation for the Azure AD B2C Tenant, Application, and Policy being used as the Identity Provider.
A hash can be passed to policy_options
specifying the following:
:application_identifier
:application_secret
:tenant_name
: This is the Domain Name or Resource name found in the Overview blade in the Azure AD B2C portal.:policy_name
: The name of the policy that the user should be redirected to and authenticated against:scope
: Defaults to[:openid]
, but can be overriden to request specific api permissions. Eg.[:openid, 'https://example.onmicrosoft.com/example-api/user_impersonation']
. See the microsoft docs form more info: here and here.:jwk_signing_keys
: This is required to decode theid_token
returned from thetoken
endpoint. The key can be found by going to the url that is specified injwks_uri
parameter at the policy's.well-known/openid-configuration
page. Eg:https://login.microsoftonline.com/te/example.onmicrosoft.com/b2c_1_signupin/discovery/v2.0/keys
.
An alternative approach to integration is to create a subclass of OmniAuth::Strategies::AzureActiveDirectoryB2C
.
module OmniAuth
module Strategies
class CustomB2CStrategy < AzureActiveDirectoryB2C
option :name, 'custom_b2c_strategy'
def redirect_uri
'http://localhost:9292/auth/%s/callback' % options.name
end
def policy_options
{ application_identifier: '...', application_secret: '***', etc: '...' }
end
end
end
end
OmniAuth.config.add_camelization('custom_b2c_strategy', 'CustomB2C')
use OmniAuth::Builder do
provider :custom_b2c_strategy
end
Dynamically load policy options to use multiple Azure AD B2C Policies from multiple tenants (Rails example):
# app/models/policy.rb
class Policy < ActiveRecord::Base
include OmniAuth::Strategies::AzureActiveDirectoryB2C::PolicyOptions
end
# lib/custom_b2c_strategy.rb
module OmniAuth
module Strategies
class CustomB2CStrategy < AzureActiveDirectoryB2C
option :name, 'custom_b2c_strategy'
def redirect_uri
'http://localhost:9292/auth/%s/callback' % options.name
end
def policy_name
@policy_name ||= begin
stored_policy_name = session['omniauth.policy_name']
session['omniauth.policy_name'] = request.params['policy_name']
session['omniauth.policy_name'] || stored_policy_name
end
end
# override
def policy
@policy ||= Policy.find_by(name: policy_name)
end
end
end
end
OmniAuth.config.add_camelization('custom_b2c_strategy', 'CustomB2C')
# config/initializers/devise.rb
require 'lib/custom_b2c_strategy.rb'
use OmniAuth::Builder do
provider :custom_b2c_strategy
end
This example is overriding the policy
method.
The object returned can be either:
- a subclass of
OmniAuth::Strategies::AzureActiveDirectoryB2C::Policy
, or; - include the module
OmniAuth::Strategies::AzureActiveDirectoryB2C::PolicyOptions
In this case an ActiveRecord
model that implements the OmniAuth::Strategies::AzureActiveDirectoryB2C::PolicyOptions
is being returned.
The policy_name
is expected to be provided as an URL parameter to the request URL. Eg: GET /auth/azure_active_directory_b2c?policy_name=test
These two methods can be overriden to allow the developer to provide their own implementation of OmniAuth::Strategies::AzureActiveDirectoryB2C::AuthenticationRequest
and OmniAuth::Strategies::AzureActiveDirectoryB2C::AuthenticationResponse
.
This may be necessary if the developer wants to
- use an unsupported authorization flow
- use a different decoding algorithm for the access code and id token
- access different claims returned in the id_token
This allows develops to either override, or add to the validation provided by this gem.
- The strategy only supports the
code
authorization flow. - The gem doesn't support discovery, but neither does Azure AD B2C as far as I can tell.