Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

azure active directory & postman

I have an Azure web API application which is secured by an azure active directory tenant. Through Postman I am trying to obtain the OAuth2 access token using Postman's OAuth2 Helper. The get access-token requires four bits of info: The tenant auth endpoint, the tenant token endpoint, the client id and the client secret of the associated tenant application. It also seems that the tenant application reply url must include https://www.getpostman.com/oauth2/callback which is where postman is supposed to retrieve the token into the helper.

I can't get this to work. The get access token button reports back an error but it is very hard to decipher what the error is: the debug url reveals nothing really.

Has anyone had any experience attempting to get an AAD Oauth access token with postman's OAuth2 helper? If so, do you have any hints as to where I should look to debug what is going on?

like image 646
Bill McKnight Avatar asked Sep 23 '15 01:09

Bill McKnight


2 Answers

The extension sadly lacks one critical field for Azure AD. AAD must know what resource you want the token for, since a token will not work for all APIs that your app has permissions for. The authorization code is actually retrieved successfully, but the request to the token endpoint fails with an error message about the missing resource identifier. So you can't use it with AAD, neither authorization code or client credential flow works.

Update: The Azure AD v2 endpoint allows you to use the scope parameter instead of resource, which Postman does support!

like image 124
juunas Avatar answered Oct 19 '22 02:10

juunas


You can set the resource ID as a parameter to the Auth URL.

Auth URL: https://_______________?resource=https://_________
like image 2
sdasdadas Avatar answered Oct 19 '22 02:10

sdasdadas