Book Image

Azure Active Directory for Secure Application Development

By : Sjoukje Zaal
Book Image

Azure Active Directory for Secure Application Development

By: Sjoukje Zaal

Overview of this book

Azure Active Directory for Secure Application Development is your one-stop shop for learning how to develop secure applications using modern authentication techniques with Microsoft Azure AD. Whether you’re working with single-tenant, multi-tenant, or line-of-business applications, this book contains everything you need to secure them. The book wastes no time in diving into the practicalities of Azure AD. Right from the start, you’ll be setting up tenants, adding users, and registering your first application in Azure AD. The balance between grasping and applying theory is maintained as you move from the intermediate to the advanced: from the basics of OAuth to getting your hands dirty with building applications and registering them in Azure AD. Want to pin down the Microsoft Graph, Azure AD B2C, or authentication protocol best practices? We’ve got you covered. The full range of Azure AD functionality from a developer perspective is here for you to explore with confidence. By the end of this secure app development book, you’ll have developed the skill set that so many organizations are clamoring for. Security is mission-critical, and after reading this book, you will be too.
Table of Contents (14 chapters)
Part 1: Getting Started with the Microsoft Identity Platform
Part 2: Authentication and Protocols
Part 3: Azure AD B2C

Building a web application that uses the Microsoft Graph API

In the previous sections of this chapter, we covered the features and capabilities of the Graph API. In this section, we are going to use the Graph API SDK to retrieve data from Microsoft 365.

This is the second part of this demonstration. We covered the first part in the previous chapter, where we focused on sign-in functionality using OAuth 2.0, OpenID Connect, and MSAL. In this second and last part, we are going to cover how to retrieve data from the Graph API using the credentials of a signed-in user.

If you need to set this application up from scratch, you can refer to Chapter 5, Securing Applications with OAuth 2.0, OpenID Connect, and MSAL. In the following diagram, you can see the scenario that we are going to build in this demo:

Figure 6.9 – The demo scenario

In this chapter, we are going to focus on the bottom part of the preceding diagram, where we connect to the Graph API...