To use MSAL as authentication provider in the applications you develop in Kuika, you need to define the information you get from Azure Portal in the Configuration Manager module in Kuika.
1. Open the application for which you want to use MSAL as authentication provider.
2. Open the Configuration Manager module.
3. Open an existing configuration if you have one or create a new one.
4. Create a new configuration setting via the drop-down menu opposite MSAL in the App Settings tab under the “Authentication & Authorization” heading.
5. Continue with the MSAL Setting pop-up.
- Name: Enter a meaningful name to identify the added authentication provider.
- Client ID: Enter the unique ID of the application you created through the Azure portal.
- Client Secret: Enter the secret key you received from Azure to authenticate your application.
- Authority: Enter the URL extension used for user authentication. For example, https://login.microsoftonline.com/{tenant} or https://login.microsoftonline.com/common/.
- Scopes: Specify the permissions your application requests access to. For example, user.read.
- Keystore Base64: Enter the keystore from the signed APK file for your Android app encoded in Base64 format.
- Cache Location: Use a switch to specify the location where authentication credentials and tokens will be stored. This switch controls whether the cache is turned on or off.
- Keystore Hash (Android only): Enter the SHA-1 or SHA-256 hash obtained from the signed APK file, only required for Android apps.
6. After entering all the information correctly, add the MSAL Authentication Provider by pressing the “CREATE” button. You can add multiple MSAL configurations and select the one to be used in the corresponding Config Manager.
Now your application can perform user authentication using MSAL and provide access to the required resources.