Skip to content

Add token binding to MicrosoftIdentityMessageHandler#3743

Merged
cpp11nullptr merged 6 commits intomasterfrom
iepoly/extend-microsoft-identity-message-handler-with-token-binding
Mar 25, 2026
Merged

Add token binding to MicrosoftIdentityMessageHandler#3743
cpp11nullptr merged 6 commits intomasterfrom
iepoly/extend-microsoft-identity-message-handler-with-token-binding

Conversation

@cpp11nullptr
Copy link
Copy Markdown
Contributor

No description provided.

@cpp11nullptr cpp11nullptr requested a review from a team as a code owner March 4, 2026 17:20
Comment thread src/Microsoft.Identity.Web.TokenAcquisition/MicrosoftIdentityMessageHandler.cs Outdated
Comment thread src/Microsoft.Identity.Web.TokenAcquisition/MicrosoftIdentityMessageHandler.cs Outdated
Comment thread docs/calling-downstream-apis/custom-apis.md Outdated
Copy link
Copy Markdown
Collaborator

@jmprieur jmprieur left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are a couple of things to improve:

  • the RequiredService seems inconsistent with the option. Either use GetService or explain why required is fine. I think it's a breaking change, personally. you don't want to break Aspire!!
  • Fragile code that can be improved
  • +some questions/remarks

Comment thread docs/calling-downstream-apis/custom-apis.md Outdated
Comment thread docs/calling-downstream-apis/token-binding.md Outdated
Comment thread src/Microsoft.Identity.Web.TokenAcquisition/MicrosoftIdentityMessageHandler.cs Outdated
Comment thread src/Microsoft.Identity.Web.TokenAcquisition/MicrosoftIdentityMessageHandler.cs Outdated
@bgavrilMS
Copy link
Copy Markdown
Member

@tlupes - this is related to pure mTLS option, a review from you would be good.

@tlupes
Copy link
Copy Markdown
Contributor

tlupes commented Mar 5, 2026

@tlupes - this is related to pure mTLS option, a review from you would be good.

It looks very similar to how DownstreamApi works, which means it should be easy to transfer over. Centralizing the logic would make things easier.

@cpp11nullptr cpp11nullptr requested a review from a team as a code owner March 23, 2026 15:45
@cpp11nullptr
Copy link
Copy Markdown
Contributor Author

@tlupes - this is related to pure mTLS option, a review from you would be good.

It looks very similar to how DownstreamApi works, which means it should be easy to transfer over. Centralizing the logic would make things easier.

(replied in other comment)

@bgavrilMS bgavrilMS requested review from gladjohn and jmprieur March 25, 2026 15:23
Copy link
Copy Markdown
Collaborator

@jmprieur jmprieur left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM
I left a few comments worth looking at.

Comment thread tests/DevApps/MtlsPop/MtlsPopClient/Program.cs
Copy link
Copy Markdown
Collaborator

@jmprieur jmprieur left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for addressing the feedback

@cpp11nullptr cpp11nullptr merged commit 231b092 into master Mar 25, 2026
4 checks passed
@cpp11nullptr cpp11nullptr deleted the iepoly/extend-microsoft-identity-message-handler-with-token-binding branch March 25, 2026 22:22
UserFlow = originalOptions.AcquireTokenOptions.UserFlow
};
challengeOptions.AcquireTokenOptions.Claims = challengeClaims;
challengeOptions.AcquireTokenOptions.ForceRefresh = true;
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't needed. MSAL would do the right thing. Functioanlly it's ok, except that some telemetry will go haywire.

github-actions Bot pushed a commit to EelcoLos/nx-tinkering that referenced this pull request Apr 21, 2026
Pinned
[Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-identity-web)
at 4.8.0.

<details>
<summary>Release notes</summary>

_Sourced from [Microsoft.Identity.Web's
releases](https://github.com/AzureAD/microsoft-identity-web/releases)._

## 4.8.0

## What's Changed
* Bump flatted from 3.3.3 to 3.4.2 in
/tests/DevApps/SidecarAdapter/typescript by @​dependabot[bot] in
AzureAD/microsoft-identity-web#3753
* Update changelog.md for ID.Web 4.6.0 by @​bgavrilMS in
AzureAD/microsoft-identity-web#3756
* Add token binding to MicrosoftIdentityMessageHandler by @​cpp11nullptr
in AzureAD/microsoft-identity-web#3743
* Bump picomatch in /tests/DevApps/SidecarAdapter/typescript by
@​dependabot[bot] in
AzureAD/microsoft-identity-web#3759
* Documentation: Clarify managed identity credential types for
containerized vs. VM/App Service deployments by @​Copilot in
AzureAD/microsoft-identity-web#3585
* Bump path-to-regexp from 8.3.0 to 8.4.0 in
/tests/DevApps/SidecarAdapter/typescript by @​dependabot[bot] in
AzureAD/microsoft-identity-web#3762
* Upgrade Microsoft Application Insights packages by @​RojaEnnam in
AzureAD/microsoft-identity-web#3763
* Use Abstractions 12 by @​pmaytak in
AzureAD/microsoft-identity-web#3761
* Post-4.7.0 by @​pmaytak in
AzureAD/microsoft-identity-web#3768
* Fix Comp Gov DOTNET-Security-10.0 by @​reginayap8 in
AzureAD/microsoft-identity-web#3769
* Upgrade CodeQL to V4: Fix 10 CodeQL Analysis Warnings and Errors by
@​reginayap8 in
AzureAD/microsoft-identity-web#3770
* fix warnings by @​gladjohn in
AzureAD/microsoft-identity-web#3771
* adding examples for using postgres as a distributed cache by
@​JaredMSFT in
AzureAD/microsoft-identity-web#3766
* Suppress AOT configuration-binding SYSLIB warnings in AotCompatibility
test app by @​Copilot in
AzureAD/microsoft-identity-web#3774
* Bump vite from 7.1.11 to 7.3.2 in
/tests/DevApps/SidecarAdapter/typescript by @​dependabot[bot] in
AzureAD/microsoft-identity-web#3772
* Skip legacy B2C local-account Todo UI test in WebAppUiTests by
@​Copilot in AzureAD/microsoft-identity-web#3778
* Fix initialization of ConfidentialClientApplicationOptions in
MergedOptions by @​cpp11nullptr in
AzureAD/microsoft-identity-web#3760
* Bump net8/net9/net10 runtime package baselines to patched crypto
servicing versions by @​Copilot in
AzureAD/microsoft-identity-web#3779
* Fix flaky certificate test failures on CI by @​gladjohn in
AzureAD/microsoft-identity-web#3780
* MTLS Without Tokens Support by @​tlupes in
AzureAD/microsoft-identity-web#3747
* Fix CredentialsProvider DI lifetime mismatch causing startup crash in
Development by @​Avery-Dunn in
AzureAD/microsoft-identity-web#3783
* Remove unused DataProtection configuration from Sidecar by @​Copilot
in AzureAD/microsoft-identity-web#3776

## New Contributors
* @​RojaEnnam made their first contribution in
AzureAD/microsoft-identity-web#3763
* @​reginayap8 made their first contribution in
AzureAD/microsoft-identity-web#3769
* @​JaredMSFT made their first contribution in
AzureAD/microsoft-identity-web#3766

**Full Changelog**:
AzureAD/microsoft-identity-web@4.6.0...4.8.0

Commits viewable in [compare
view](AzureAD/microsoft-identity-web@4.7.0...4.8.0).
</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants