-
-
Couldn't load subscription status.
- Fork 124
Description
RE: Office365
AzureAD App client secrets are usually used in a Confidential client configuration where an application is running as a service/daemon of some kind. Since I just want the proxy to work to authenticate a user, I would instead use an Azure AD app configured as a Public client. In this situation, a client secret would not necessarily be required since the user will be authenticating as itself.
In my testing I set the client_secret blank in my config file and made the following modification in the code
email-oauth2-proxy/emailproxy.py
Line 280 in 89f2f7c
| if not (permission_url and token_url and oauth2_scope and redirect_uri and client_id and client_secret): |
To:
if not (permission_url and token_url and oauth2_scope and redirect_uri and client_id):
This works perfectly and still allows for a client_secret to be used if it were going to be used a different way.
What were your thoughts when making client_secret a required field, and would you consider republishing as optional?