You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,11 @@ Before using MSAL Python (or any MSAL SDKs, for that matter), you will have to
35
35
[register your application with the Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-register-an-app).
36
36
37
37
Acquiring tokens with MSAL Python follows this 3-step pattern.
38
+
(Note: That is the high level conceptual pattern.
39
+
There will be some variations for different flows. They are demonstrated in
40
+
[runnable samples hosted right in this repo](https://github.com/AzureAD/microsoft-authentication-library-for-python/tree/dev/sample).
41
+
)
42
+
38
43
39
44
1. MSAL proposes a clean separation between
40
45
[public client applications, and confidential client applications](https://tools.ietf.org/html/rfc6749#section-2.1).
@@ -43,7 +48,9 @@ Acquiring tokens with MSAL Python follows this 3-step pattern.
Later, each time you would want an access token, you start by:
@@ -67,7 +74,7 @@ Acquiring tokens with MSAL Python follows this 3-step pattern.
67
74
# Assuming the end user chose this one
68
75
chosen = accounts[0]
69
76
# Now let's try to find a token in cache for this account
70
-
result = app.acquire_token_silent(config["scope"], account=chosen)
77
+
result = app.acquire_token_silent(["your_scope"], account=chosen)
71
78
```
72
79
73
80
3. Either there is no suitable token in the cache, or you chose to skip the previous step,
@@ -86,9 +93,6 @@ Acquiring tokens with MSAL Python follows this 3-step pattern.
86
93
print(result.get("correlation_id")) # You may need this when reporting a bug
87
94
```
88
95
89
-
That is the high level pattern. There will be some variations for different flows. They are demonstrated in
90
-
[samples hosted right in this repo](https://github.com/AzureAD/microsoft-authentication-library-for-python/tree/dev/sample).
91
-
92
96
Refer the [Wiki](https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki) pages for more details on the MSAL Python functionality and usage.
0 commit comments