Skip to content
Go to file


Failed to load latest commit information.

page_type description languages products urlFragment
A sample demonstrating how to use the Microsoft Authentication Library for JavaScript to get an access token and call an API secured by Azure AD B2C.

Single-Page Application built on MSAL.js with Azure AD B2C

Warning: Silent renewing of access tokens is not supported by all social identity providers.

This simple sample demonstrates how to use the Microsoft Authentication Library for JavaScript (msal.js) to get an access token and call an API secured by Azure AD B2C.

Note: A quickstart guide covering this sample can be found here.

Note: A more detailed tutorial covering this sample can be found here.


File/folder Description
JavaScriptSPA Contains sample source files.
authPopup.js Main authentication logic resides here (using Popup flow).
authRedirect.js Use this instead of authPopup.js for authentication with redirect flow.
authConfig.js Contains configuration parameters for the sample.
api.js Provides a helper function for calling the web API.
apiConfig.js Contains API endpoint and scope.
ui.js Contains UI logic.
policies.js Contains policies and authority strings.
index.html Contains the UI of the sample.
.gitignore Defines what to ignore at commit time. List of changes to the sample. Code of Conduct information. Guidelines for contributing to the sample.
LICENSE The license for the sample.
package.json Package manifest for npm. This README file. Security disclosures.
server.js Implements a simple Node server to serve index.html.


  • Node must be installed to run this sample.
  • A modern web browser. This sample uses ES6 conventions and will not run on Internet Explorer.

How to run this sample

There are two ways to run this sample:

  1. Using the demo environment - The sample is already configured to use a demo environment and can be run simply by downloading this repository and running the app on your machine. See steps below for Running with demo environment.
  2. Using your own Azure AD B2C tenant - If you would like to use your own Azure AD B2C configuration, follow the steps listed below for using your own Azure AD B2C tenant.

Using the demo environment

This sample demonstrates how to sign in or sign up for an account at "Fabrikam B2C" - the demo environment for this sample. Once signed-in, clicking on the Call Web API button shows the display name you used when you created your account.

Step 1: Clone or download this repository

From your shell or command line:

git clone

Step 2: Run the application

Make sure you've installed Node.

From your shell or command line:

cd active-directory-b2c-javascript-msal-singlepageapp
npm install && npm update
npm start

The console window shows the port number for the web application

Listening on port 6420...

You can visit http://localhost:6420 and perform the following actions:

  1. Click the Login button to start the Azure AD B2C sign in, sign up or password reset user-flows.
  2. Once signed in, you can click on the Call Web API button to have your display name returned from the Web API call as a JSON object.
  3. Once signed in, you can click the Edit Profile button to edit your profile information.
  4. Click Logout to logout from the application.

Using your own Azure AD B2C Tenant

In the previous section, you learned how to run the sample application using the demo environment. In this section, you'll learn how to configure this single page application sample and the related Node.js Web API with Azure AD B2C sample to work with your own Azure AD B2C Tenant. This will be covered in two parts.

PART I: Configure the API

How to setup and register the Node.js Web API sample

Follow the instructions on the Node.js Web API with Azure AD B2C sample. Once you are done, you should have a Node.js web API running on the port 5000. While it runs, continue with Part II below.

PART II: Configure the Client

Step 1: Register your own Web Application with Azure AD B2C

Next, you need to register your single page application in your B2C tenant.

Provide the following values for the Single Page Application registration:

  • Provide a descriptive Name for the single page application, for example, My Test SPA. You will identify this application by its Name whenever working in the Azure portal.
  • Mark Yes for the Web App/Web API setting for your application.
  • Set the Reply URL for your app to http://localhost:6420. This sample provided in this repository is configured to run on port 6420.
  • Create the application.
  • Once the application is created, open your My Test SPA and open the API Access window (in the left nav menu). Click Add and select the name of the Node.js Web API you registered previously, My Test Node.js Web API. Select the scope(s) you defined previously, for example, and hit Save.

Step 2: Configure the sample code to use your Azure AD B2C tenant

Now in the sample code, you can replace the single page application's demo environment configuration with your own tenant.

  1. Open the authConfig.js file.
  2. Find the assignment for clientId and replace the value with the Application ID for the single page application you registered earlier, for example the Application ID found in My Test SPA application in the Azure portal.
  3. Open the policies.js file.
  4. Find the entries for names and authorities and replacing, as appropriate, with the names of the policies you created in Step 2, and by the name of your Azure AD B2C tenant, for example https://<your-tenant-name><your-tenant-name><your-sign-in-sign-up-policy>
  5. Open the apiConfig.js file.
  6. Find the assignment for the scopes b2cScopes replacing the URL by the scope URL you created for the Web API, e.g. b2cScopes: ["https://<your-tenant-name>"]
  7. Find the assignment for API URL webApi replacing the current URL by the URL where you deployed your Web API in Step 4, e.g. webApi: http://localhost:5000/hello

Your resulting code should look as follows:

const msalConfig = {
  auth: {
    clientId: "e760cab2-b9a1-4c0d-86fb-ff7084abd902",
    authority: b2cPolicies.authorities.signUpSignIn.authority,
    validateAuthority: false
  cache: {
    cacheLocation: "localStorage",
    storeAuthStateInCookie: true

const loginRequest = {
  scopes: ["openid", "profile"],

const tokenRequest = {
  scopes: apiConfig.b2cScopes // i.e. [""]
const b2cPolicies = {
    names: {
        signUpSignIn: "b2c_1_susi",
        forgotPassword: "b2c_1_reset",
        editProfile: "b2c_1_edit_profile"
    authorities: {
        signUpSignIn: {
            authority: "",
        forgotPassword: {
            authority: "",
        editProfile: {
            authority: ""
const apiConfig = {
  b2cScopes: [""],
  webApi: ""

Step 3: Run the sample

  1. Install the node dependencies if this is your first time running the app (e.g. if you skipped running in the demo environment):

    cd active-directory-b2c-javascript-msal-singlepageapp
    npm install && npm update
  2. Run the Web application:

    npm start
  3. Go to http://localhost:6420.

  4. Click the login button at the top of the application screen. The sample works exactly in the same way regardless of the account type you choose, apart from some visual differences in the authentication and consent experience. Upon successful sign in, the application screen will show buttons that allow you to call an API and sign out.

  5. Click on the Call Web API and see the textual representation of the JSON object that is returned. Make sure your Node.js Web API sample is still running on port 5000.

  6. Sign out by clicking the Logout button.


  • The MSAL.js library allows you to pass a login_hint parameter in the AuthenticationParameters object, using the loginHint attribute.

      const loginRequest = {
        scopes: ["openid", "profile"],
        loginHint: ""
  • You can pass any custom query string parameter in the AuthenticationParameters object, using the extraQueryParameters attribute. Following sample sets the campaignId that can be used in the Azure AD B2C UI, and the ui_locales set to es (Spanish).

      const loginRequest = {
        scopes: ["openid", "profile"],
        extraQueryParameters: { campaignId: 'hawaii', ui_locales: 'es' }

More information

For more information on Azure B2C, see:

Community Help and Support

We use StackOverflow with the msal and azure-ad-b2c tags to provide support. We highly recommend you ask your questions on StackOverflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [msal.js].

If you find and bug or have a feature request, please raise the issue on GitHub Issues.

To provide a recommendation, visit our Feedback Forum.


If you'd like to contribute to this sample, see CONTRIBUTING.MD.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact with any additional questions or comments.

You can’t perform that action at this time.