Skip to content
This repository has been archived by the owner. It is now read-only.
Switch branches/tags

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

OpenID Connect and Azure AD - Demo App

Build Status

This demo Node.js app shows how to use passport.js to implement OpenID Connect against Azure Active Directory (AD)

OpenID Connect Demo Preview

Try it out at with any of the following test accounts:

Name Username Password
Alice Samson WalterGropius5!
Joey Taylor WalterGropiusStrasse5!

Local Demo

First clone this repository

Configure Credentials as Environment Variables

If you want to try the demo locally you need to register an application with your Azure AD tenant. Once you've done that, note the client ID and secret.

Azure AD > App Registrations

For local development, create an .env file based on template .env.sample and fill it out with your application values, esp. the Azure AD Tenant IDs and the Client ID.


Configuring OAuth Client

In your AAD "App Registration", aka OAuth Client, make sure you enable the "ID Token", which our app expects as defined in config/oidc.js

Note: enable ID Token

Note that despite the "Implicit grant" heading, this demo does not use implicit flow, but rather authorization code flow using client credentials sent via backend channels.

Generate Secrets for Session

If you open app/config/oidc.js you will notice the app requires encryption keys for the cookie. To help you out, you can use this helper to generate keys

npm run generate-keys

Once you've configured everything, start up the nodejs application and redis server for sessions store.

docker-compose up --build