mirror of
https://github.com/dscalzi/HeliosLauncher.git
synced 2024-10-31 19:36:39 -07:00
e6cf76b436
* docs (Microsoft Auth): Add docs regarding whitelist system * docs: Commit Dan's suggestion Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com> * docs: Commit Dan's second suggestion Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com> * docs: Commit Dan's third suggestion Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com> * docs: Commit Dan's fourth suggestion Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com> * docs: Commit Dan's fifth suggestion Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com> --------- Co-authored-by: Daniel Scalzi <d_scalzi@yahoo.com>
2.6 KiB
2.6 KiB
Microsoft Authentication
Authenticating with Microsoft is fully supported by Helios Launcher.
Acquiring an Azure Client ID
- Navigate to https://portal.azure.com
- In the search bar, search for Azure Active Directory.
- In Azure Active Directory, go to App Registrations on the left pane (Under Manage).
- Click New Registration.
- Set Name to be your launcher's name.
- Set Supported account types to Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)
- Leave Redirect URI blank.
- Register the application.
- You should be on the application's management page. If not, Navigate back to App Registrations. Select the application you just registered.
- Click Authentication on the left pane (Under Manage).
- Click Add Platform.
- Select Mobile and desktop applications.
- Choose
https://login.microsoftonline.com/common/oauth2/nativeclient
as the Redirect URI. - Select Configure to finish adding the platform.
- Go to Credentials & secrets.
- Select Client secrets.
- Click New client secret.
- Set a description.
- Click Add.
- Don't copy the client secret, adding one is just a requirement from Microsoft.
- Navigate back to Overview.
- Copy Application (client) ID.
Adding the Azure Client ID to Helios Launcher.
In app/assets/js/ipcconstants.js
you'll find AZURE_CLIENT_ID
. Set it to your application's id.
Note: Azure Client ID is NOT a secret value and can be stored in git. Reference: https://stackoverflow.com/questions/57306964/are-azure-active-directorys-tenantid-and-clientid-considered-secrets
Then relaunch your app, and login. You'll be greeted with an error message, because the app isn't whitelisted yet. Microsoft needs some activity on the app before whitelisting it. Trying to log in before requesting whitelist is mandatory.
Requesting whitelisting from Microsoft
- Ensure you have completed every step of this doc page.
- Fill this form with the required information. Remember this is a new appID for approval. You can find both the Client ID and the Tenant ID on the overview page in the Azure Portal.
- Give Microsoft some time to review your app.
- Once you have received Microsoft's approval, allow up to 24 hours for the changes to apply.
You can now authenticate with Microsoft through the launcher.
References: