|
6 | 6 | resetpassword_user_flow = "b2c_1_passwordreset1" |
7 | 7 | authority_template = "https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{user_flow}" |
8 | 8 |
|
9 | | -CLIENT_SECRET = "Enter_the_Client_Secret_Here" # Our Quickstart uses this placeholder |
10 | | -# In your production app, we recommend you to use other ways to store your secret, |
11 | | -# such as KeyVault, or environment variable as described in Flask's documentation here |
| 9 | +CLIENT_ID = "Enter_the_Application_Id_here" # Application (client) ID of app registration |
| 10 | + |
| 11 | +CLIENT_SECRET = "Enter_the_Client_Secret_Here" # Placeholder - for use ONLY during testing. |
| 12 | +# In a production app, we recommend you use a more secure method of storing your secret, |
| 13 | +# like Azure Key Vault. Or, use an environment variable as described in Flask's documentation: |
12 | 14 | # https://flask.palletsprojects.com/en/1.1.x/config/#configuring-from-environment-variables |
13 | 15 | # CLIENT_SECRET = os.getenv("CLIENT_SECRET") |
14 | 16 | # if not CLIENT_SECRET: |
|
21 | 23 | B2C_RESET_PASSWORD_AUTHORITY = authority_template.format( |
22 | 24 | tenant=b2c_tenant, user_flow=resetpassword_user_flow) |
23 | 25 |
|
24 | | -CLIENT_ID = "Enter_the_Application_Id_here" |
25 | | - |
26 | | -REDIRECT_PATH = "/getAToken" # It will be used to form an absolute URL |
27 | | - # And that absolute URL must match your app's redirect_uri set in AAD |
28 | | - |
29 | | -# This is the resource that you are going to access in your B2C tenant |
30 | | -ENDPOINT = '' |
| 26 | +REDIRECT_PATH = "/getAToken" # Used for forming an absolute URL to your redirect URI. |
| 27 | + # The absolute URL must match the redirect URI you set |
| 28 | + # in the app's registration in the Azure portal. |
31 | 29 |
|
32 | | -# These are the scopes that you defined for the web API |
33 | | -SCOPE = [] # For illustration purposes only: ["demo.read", "demo.write"] |
| 30 | +# This is the API resource endpoint |
| 31 | +ENDPOINT = '' # Application ID URI of app registration in Azure portal |
34 | 32 |
|
35 | | -SESSION_TYPE = "filesystem" # So token cache will be stored in server-side session |
| 33 | +# These are the scopes you've exposed in the web API app registration in the Azure portal |
| 34 | +SCOPE = [] # Example with two exposed scopes: ["demo.read", "demo.write"] |
36 | 35 |
|
| 36 | +SESSION_TYPE = "filesystem" # Specifies the token cache should be stored in server-side session |
0 commit comments