page_type | description | products | languages | extensions | urlFragment | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
sample |
Microsoft Teams app SSO for Tab, Bot, ME - search, action, linkunfurl |
|
|
|
officedev-microsoft-teams-samples-app-sso-nodejs |
This app talks about the Teams Tab, Bot, Messaging Extension - search, action, linkunfurl SSO with Node JS
Tab SSO This sample shows how to implement Azure AD single sign-on support for tabs. It will
- Obtain an access token for the logged-in user using SSO
- Call a web service - also part of this project - to exchange this access token
- Call Graph and retrieve the user's profile
Bot, ME SSO Bot Framework v4 bot using Teams authentication
This bot has been created using Bot Framework, it shows how to get started with authentication in a bot for Microsoft Teams.
The focus of this sample is how to use the Bot Framework support for oauth in your bot. Teams behaves slightly differently than other channels in this regard. Specifically an Invoke Activity is sent to the bot rather than the Event Activity used by other channels. This Invoke Activity must be forwarded to the dialog if the OAuthPrompt is being used. This is done by subclassing the ActivityHandler and this sample includes a reusable TeamsActivityHandler. This class is a candidate for future inclusion in the Bot Framework SDK.
The sample uses the bot authentication capabilities in Azure Bot Service, providing features to make it easier to develop a bot that authenticates users to various identity providers such as Azure AD (Azure Active Directory), GitHub, Uber, etc. The OAuth token is then used to make basic Microsoft Graph queries. Refer the SSO setup documentation.
IMPORTANT: The manifest file in this app adds "token.botframework.com" to the list of
validDomains
. This must be included in any bot that uses the Bot Framework OAuth flow.
-
To test locally, NodeJS must be installed on your development machine (version 16.14.2 or higher).
# determine node version node --version
-
To test locally, you'll need Ngrok installed on your development machine. Make sure you've downloaded and installed Ngrok on your local machine. ngrok will tunnel requests from the Internet to your local computer and terminate the SSL connection from Teams.
-
M365 developer account or access to a Teams account with the appropriate permissions to install an app.
-
Setup for Bot SSO Refer to Bot SSO Setup document.
-
Ensure that you've enabled the Teams Channel
- Run ngrok - point to port `3978`
```bash
ngrok http -host-header=localhost 3978
```
-
Clone the repository
git clone https://github.com/OfficeDev/Microsoft-Teams-Samples.git
-
In a terminal, navigate to
mples/app-sso/nodejs
-
Install modules & Run the
NodeJS
Server- Server will run on PORT:
4001
- Open a terminal and navigate to project root directory
npm run server
This command is equivalent to: npm install > npm run build-client > npm start
- Server will run on PORT:
-
Install modules & Run the
React
Client- Client will run on PORT:
3978
- Open a terminal and navigate to project root directory
npm run client
> **This command is equivalent to:** _cd client > npm install > npm start_
- Client will run on PORT:
-
Update the
.env
configuration for the bot to use theMicrosoftAppId
(Microsoft App Id),MicrosoftAppPassword
(App Password) andconnectionName
(OAuth Connection Name) from the Azure Bot registration.NOTE: the App Password is referred to as the
client secret
in the azure portal and you can always create a new client secret anytime.
Bot Configuration:
Bot OAuth Connection:
- Register a new application in the Azure Active Directory – App Registrations portal.
- Select New Registration and on the register an application page, set following values:
- Set name to your app name.
- Choose the supported account types (any account type will work)
- Leave Redirect URI empty.
- Choose Register.
- On the overview page, copy and save the Application (client) ID, Directory (tenant) ID. You’ll need those later when updating your Teams application manifest and in the appsettings.json.
- Under Manage, select Expose an API.
- Select the Set link to generate the Application ID URI in the form of
api://{AppID}
. Insert your fully qualified domain name (with a forward slash "/" appended to the end) between the double forward slashes and the GUID. The entire ID should have the form of:api://fully-qualified-domain-name/botid-{AppID}
- ex:
api://%ngrokDomain%.ngrok.io/botid-00000000-0000-0000-0000-000000000000
.
- ex:
- Select the Add a scope button. In the panel that opens, enter
access_as_user
as the Scope name. - Set Who can consent? to
Admins and users
- Fill in the fields for configuring the admin and user consent prompts with values that are appropriate for the
access_as_user
scope:- Admin consent title: Teams can access the user’s profile.
- Admin consent description: Allows Teams to call the app’s web APIs as the current user.
- User consent title: Teams can access the user profile and make requests on the user's behalf.
- User consent description: Enable Teams to call this app’s APIs with the same rights as the user.
- Ensure that State is set to Enabled
- Select Add scope
- The domain part of the Scope name displayed just below the text field should automatically match the Application ID URI set in the previous step, with
/access_as_user
appended to the end:- `api://[ngrokDomain].ngrok.io/00000000-0000-0000-0000-000000000000/access_as_user.
- The domain part of the Scope name displayed just below the text field should automatically match the Application ID URI set in the previous step, with
- In the Authorized client applications section, identify the applications that you want to authorize for your app’s web application. Each of the following IDs needs to be entered:
1fec8e78-bce4-4aaf-ab1b-5451cc387264
(Teams mobile/desktop application)5e3ce6c0-2b1f-4285-8d4b-75ee78787346
(Teams web application) Note If you want to test or extend your Teams apps across Office and Outlook, kindly add below client application identifiers while doing Azure AD app registration in your tenant:
4765445b-32c6-49b0-83e6-1d93765276ca
(Office web)0ec893e0-5785-4de6-99da-4ed124e5296c
(Office desktop)bc59ab01-8403-45c6-8796-ac3ef710b3e3
(Outlook web)d3590ed6-52b3-4102-aeff-aad2292ab01c
(Outlook desktop)
- Navigate to API Permissions, and make sure to add the follow permissions:
- Select Add a permission
- Select Microsoft Graph -> Delegated permissions.
- User.Read (enabled by default)
- offline_access
- OpenId
- profile
- Click on Add permissions. Please make sure to grant the admin consent for the required permissions.
-
Navigate to Authentication If an app hasn't been granted IT admin consent, users will have to provide consent the first time they use an app. Set a redirect URI:
- Select Add a platform.
- Select web.
- Enter the redirect URI for the app in the following format:
- https://%ngrokDomain%.ngrok.io/Auth/End
- https://token.botframework.com/.auth/web/redirect
Enable implicit grant by checking the following boxes:
✔ ID Token
✔ Access Token
-
Navigate to the Certificates & secrets. In the Client secrets section, click on "+ New client secret". Add a description (Name of the secret) for the secret and select “Never” for Expires. Click "Add". Once the client secret is created, copy its value, it need to be placed in the appsettings.json.
- This step is specific to Teams.
- Edit the
manifest.json
contained in theteamsAppManifest
folder to replace your Microsoft App Id (that was created when you registered your bot earlier) everywhere you see the place holder string<<YOUR-MICROSOFT-APP-ID>>
(depending on the scenario the Microsoft App Id may occur multiple times in themanifest.json
) also update the<<DOMAIN-NAME>>
with the ngrok URL domain likexxx111.ngrok.io
excluding http/https. - Note: If you want to test your app across multi hub like: Outlook/Office.com, please update the
manifest.json
in theapp-sso\nodejs
folder with the required values. - Zip up the contents of the
teamsAppManifest
folder to create amanifest.zip
orManifest_Hub
- Upload the
manifest.zip
to Teams (in the Apps view click "Upload a custom app")
- Edit the
Note: This
manifest.json
specified that the bot will be installed in a "personal" scope only. Please refer to Teams documentation for more details.
You can interact with this bot by sending it a message. The bot will respond by requesting you to login to AAD, then making a call to the Graph API on your behalf and returning the results.
Install App:
Welcome Card:
- Type anything on the compose box and send
- The bot will perform
Single Sign-On
and Profile card will be displayed along with the option prompt to view thetoken
Would you like to view your token:
Click token Yes:
Open Messaging Extension (Search), it will show profile details:
Open Messaging Extension (Action), it will show profile details:
Click profile UI:
Select profile UI:
Click profile UI:
Open Messaging Extension (linkunfurl), The link will unfurl and show profile details:
Paste https://profile.botframework.com on the compose box
Open SSO Tab Continue and then Accept and it'll show the profile details:
Install app other tenant:
NOTE: If
SSO
couldn't be performed then it will fallback to normal Authentication method and you will get a defaultSign In
action
Consent the ME Search by clicking the Sign In link like below:
Consent the ME Action by clicking the Setup button like below:
-
To view your app in Outlook on the web.
-
Go to Outlook on the weband sign in using your dev tenant account.
On the side bar, select More Apps. Your sideloaded app title appears among your installed apps
Select your app icon to launch and preview your app running in Outlook on the web
Note: Similarly, you can test your application in the Outlook desktop app as well.
-
To preview your app running in Office on the web.
-
Log into office.com with test tenant credentials
Select the Apps icon on the side bar. Your sideloaded app title appears among your installed apps
Select your app icon to launch your app in Office on the web
Note: Similarly, you can test your application in the Office 365 desktop app as well.
To learn more about deploying a bot to Azure, see Deploy your bot to Azure for a complete list of deployment instructions.
- Bot Framework Documentation
- Bot Basics
- SSO for Bot
- SSO for Messaging Extensions
- SSO for Tab
- Azure Portal
- Add Authentication to Your Bot Via Azure Bot Service
- Activity processing
- Azure Bot Service Introduction
- Azure Bot Service Documentation
- Azure CLI
- Azure Portal
- Language Understanding using LUIS
- Channels and Bot Connector Service
- dotenv
- Microsoft Teams Developer Platform
- Extend Teams apps across Microsoft 365