-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Allow multi-tenant applications to specify the AppHomeTenantId to be used for client credentials. #3121
Comments
What does this mean? This seems conflicting ( |
You are right @msbw2, I was not very clear.
the |
@jmprieur Can you help me finish this table?
|
Sure, @msbw2. Thanks for formalizing this. I think I updated your table |
@jmprieur Do you have pointers to these? In SAL I only found two references to the property, but I'm not sure where |
I'll check @msbw2. Thank you |
released in 3.4.0 |
Is your feature request related to a problem? Please describe.
When a multi-tenant application (TenantId: "common" or "organizations") wants to acquire a token on behalf of itself, Microsoft.Identity.Web can't use the "TenantId" as this is not accepted by ESTS.
Today we require all developers to specify the tenant ID to use by code, or by configuration in the case of IDownstreamApi:
Describe the solution you'd like
AppHomeTenantId
, which developers of multi-tenant apps could set in order to define the home tenant of the app (the tenant for which the app can get a token to call a downstream API on behalf of itself). This will usually be the app registration tenant. For instance, add it hereAppHomeTenantId
value. For this we would need to change this expression here to usemergedOptions.AppHomeTenantId
if it's not null, and throw otherwise, like todayAppHomeTenantId
if the CredentialDescription.DownstreamApi.AcquireTokenOptions.Tenant is not specified. Might not be necessary as IdWeb does the token acquisition, but needs to be verifiedDescribe alternatives you've considered
Multiply the same tenant value in all cases of auto-decrypt and MISE modules like today
The text was updated successfully, but these errors were encountered: