Azure B2C无法访问图形API

标签 azure azure-ad-graph-api

我使用以下代码获得了访问 token 来获取图形客户端:

    string graphResourceID = "https://graph.windows.net";      
    string tenantID = ConfigurationManager.AppSettings["ida:Domain"];
    string aadInstance = "https://login.microsoftonline.com/" + tenantID + 
    "/oauth2/v2.0/token";

Microsoft.IdentityModel.Clients.ActiveDirectory.ClientCredential credential = new Microsoft.IdentityModel.Clients.ActiveDirectory.ClientCredential(clientId, appKey);
AuthenticationContext authenticationContext = new AuthenticationContext(aadInstance);
authenticationContext.TokenCache.Clear();

var authResult = await authenticationContext.AcquireTokenAsync(graphResourceID,clientcred);

然后尝试使用 token 通过 AD 图 API 获取登录用户的信息:

Uri servicePointUri = new Uri(graphResourceID);
Uri serviceRoot = new Uri(servicePointUri, tenantID);
ActiveDirectoryClient activeDirectoryClient = new ActiveDirectoryClient(serviceRoot,async () => await GetTokenForApplication());    
var result = await activeDirectoryClient.Users.Where(u => u.ObjectId.Equals(userObjectID)).ExecuteAsync();
IUser user = result.CurrentPage.ToList().First();

return View(user);

但是,这会返回以下错误:

"error": {
"code": "Authorization_IdentityNotFound",
"message": "The identity of the calling application could not be established.",
"innerError": {
"request-id": "2bdae8ff-d935-4e01-80a1-78cbc8acf4de",
"date": "2017-08-09T18:07:40"

我确保 mu B2C 应用程序具有 Windows Active Directory 的“读取和写入目录数据”权限:

enter image description here

有人可以帮忙吗?被困在这个问题上有一段时间了。 TIA

编辑

我也尝试过使用 Microsoft.Graph 但最终遇到了相同的错误。另外,对于 B2C 用户,我认为现在最好坚持使用 Azure Ad Graph api:https://dev.office.com/blogs/microsoft-graph-or-azure-ad-graph

最佳答案

您似乎使用Azure AD库来操作Graph API。我建议您可以使用 Microsoft.Graph要做到这一点。另请使用 Microsoft Graph 设置权限。

注意:不要忘记点击[授予权限]按钮。

enter image description here

以下是演示代码。

string graphResourceId = "https://graph.microsoft.com/";
string authority = "https://login.microsoftonline.com/{0}";
string tenantId = "tenantId";
string clientId = "client Id";
string secretKey = "secret key"
var accessToken = authContext.AcquireTokenAsync(graphResourceId, new ClientCredential(clientId,secret)).Result.AccessToken;
var graphserviceClient = new GraphServiceClient(
                new DelegateAuthenticationProvider(
                    requestMessage =>
                    {
                        requestMessage.Headers.Authorization = new AuthenticationHeaderValue("bearer", accessToken);

                        return Task.FromResult(0);
                    }));
var user = graphserviceClient.Users.Request().GetAsync().Result.FirstOrDefault();

测试结果:

enter image description here

更新:

我还使用 Azure B2c 测试了 Azure AD 图形 API,它在我这边也能正常工作。我也是分配了【读写目录数据】,点击【授予权限】,没有其他权限设置。

以下是我用于测试的演示代码。

 string graphResourceID = "https://graph.windows.net";
 string tenantID = "tenant Id";
 Uri servicePointUri = new Uri(graphResourceID);
 Uri serviceRoot = new Uri(servicePointUri, tenantID);
 ActiveDirectoryClient activeDirectoryClient = new ActiveDirectoryClient(serviceRoot, async () => await GetAppTokenAsync());
 var result =  activeDirectoryClient.Users.ExecuteAsync().Result;
 IUser user = result.CurrentPage.ToList().First();



 private static async Task<string> GetAppTokenAsync()
 {
        string graphResourceID = "https://graph.windows.net";
        string tenantID = "tenant id ";
        //please remove v2 from the link
        string aadInstance = "https://login.microsoftonline.com/" + tenantID +"/oauth2/token";
        var clientId = "client Id";
        var appKey = "secret key";
        // Instantiate an AuthenticationContext for my directory (see authString above).
        AuthenticationContext authenticationContext = new AuthenticationContext(aadInstance, false);
        // Create a ClientCredential that will be used for authentication.
        // This is where the Client ID and Key/Secret from the Azure Management Portal is used.
        ClientCredential clientCred = new ClientCredential(clientId, appKey);
        // Acquire an access token from Azure AD to access the Azure AD Graph (the resource)
        // using the Client ID and Key/Secret as credentials.
        AuthenticationResult authenticationResult = await authenticationContext.AcquireTokenAsync(graphResourceID, clientCred); 
        // Return the access token.
        return authenticationResult.AccessToken;
   }

测试结果:

enter image description here

如果它仍然不适合你。我建议您创建一个新的 Azure AD 应用程序并重试。

Packages.config:

<?xml version="1.0" encoding="utf-8"?>
<packages>
  <package id="Microsoft.Azure.ActiveDirectory.GraphClient" version="2.1.1" targetFramework="net471" />
  <package id="Microsoft.Data.Edm" version="5.6.4" targetFramework="net471" />
  <package id="Microsoft.Data.OData" version="5.6.4" targetFramework="net471" />
  <package id="Microsoft.Data.Services.Client" version="5.6.4" targetFramework="net471" />
  <package id="Microsoft.IdentityModel.Clients.ActiveDirectory" version="3.19.8" targetFramework="net471" />
  <package id="System.Spatial" version="5.6.4" targetFramework="net471" />
</packages>

关于Azure B2C无法访问图形API,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/51015984/

相关文章:

azure - 在多个 Azure 区域中的 Service Fabric 上运行微服务

c# - 系统找不到使用 X509Certificate2 指定的文件来连接 Azure 服务器中的 Google OAuth2.0

azure - 注册具有应用程序权限的应用程序时 'supported account type'的重要性

Azure AD Graph API - 从注册的应用程序获取客户端 key

visual-studio-2010 - Azure VM角色问题

azure - azure CPU 分钟数/天的说明

Azure CLI - 将 Azure DevOps 通用包下载到 AzureML 计算实例时出现 "Hard linking failed!"

java - 使用图形 API 的 Azure AD 导入适用于随机应用程序

powershell - Azure AD - 通过 Powershell 自定义应用程序角色

c# - 从 C# 服务使用 Graph API 获取日历计划