For example:Īpp1 Redirect URI: 1://authĪpp2 Redirect URI: 2://authĪpp3 Redirect URI: 3://auth Each app in your suite will have a different redirect URI. Each application can have multiple Redirect URIs registered in the onboarding portal. The way the Microsoft identity platform tells apps that use the same Application ID apart is by their Redirect URIs. This is the unique identifier that was provided to you when you registered your first application in the portal. Use the same Client ID and Application IDįor the Microsoft identity platform to know which applications can share tokens, those applications need to share the same Client ID or Application ID. Tell the MSAL SDKs about the shared keychain you want us to use if it's different from the default one.Request the same keychain entitlement for each of your applications.Ensure that all of your applications share the same signing certificate from Apple so that you can share keychains.Ensure that all your applications use the same Client ID or Application ID.To enable SSO across your applications, you'll need to do the following steps, which are explained in more detail below: MSAL supports SSO sharing through iOS keychain access groups. See SSO between ADAL and MSAL apps on macOS and iOS for instructions for cross-app SSO between ADAL and MSAL-based apps. The apps must be distributed by the same Apple Developer. MSAL Objective-C supports migration and SSO with ADAL Objective-C-based apps. Silent SSO between ADAL and MSAL macOS/iOS apps.MSAL on macOS only supports WKWebView which doesn't have SSO support with Safari. This type of SSO is currently not available on macOS.
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |