All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.azure.identity.DeviceCodeCredentialBuilder Maven / Gradle / Ivy

// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License.

package com.azure.identity;

import com.azure.core.credential.TokenRequestContext;
import com.azure.identity.implementation.util.IdentityConstants;
import com.azure.identity.implementation.util.IdentityUtil;

import java.util.Arrays;
import java.util.List;
import java.util.function.Consumer;

/**
 * Fluent credential builder for instantiating a {@link DeviceCodeCredential}.
 *
 * 

Device code authentication is a type of authentication flow offered by * Microsoft Entra ID that * allows users to sign in to applications on devices that don't have a web browser or a keyboard. * This authentication method is particularly useful for devices such as smart TVs, gaming consoles, and * Internet of Things (IoT) devices that may not have the capability to enter a username and password. * With device code authentication, the user is presented with a device code on the device that needs to be * authenticated. The user then navigates to a web browser on a separate device and enters the code on the * Microsoft sign-in page. After the user enters the code, Microsoft Entra ID verifies it and prompts the user to sign in * with their credentials, such as a username and password or a multi-factor authentication (MFA) method. * Device code authentication can be initiated using various Microsoft Entra-supported protocols, such as OAuth 2.0 and * OpenID Connect, and it can be used with a wide range of Microsoft Entra-integrated applications. * The DeviceCodeCredential interactively authenticates a user and acquires a token on devices with limited UI. * It works by prompting the user to visit a login URL on a browser-enabled machine when the application attempts to * authenticate. The user then enters the device code mentioned in the instructions along with their login credentials. * Upon successful authentication, the application that requested authentication gets authenticated successfully on the * device it's running on. For more information refer to the * conceptual knowledge and configuration * details.

* *

These steps will let the application authenticate, but it still won't have permission to log you into * Active Directory, or access resources on your behalf. To address this issue, navigate to API Permissions, and enable * Microsoft Graph and the resources you want to access, such as Azure Service Management, Key Vault, and so on. * You also need to be the admin of your tenant to grant consent to your application when you log in for the first time. * If you can't configure the device code flow option on your Active Directory, then it may require your app to * be multi- tenant. To make your app multi-tenant, navigate to the Authentication panel, then select Accounts in * any organizational directory. Then, select yes for Treat application as Public Client.

* *

Sample: Construct DeviceCodeCredential

* *

The following code sample demonstrates the creation of a {@link com.azure.identity.DeviceCodeCredential}, * using the {@link com.azure.identity.DeviceCodeCredentialBuilder} to configure it. By default, the credential * prints the device code challenge on the command line, to override that behaviours a {@code challengeConsumer} * can be optionally specified on the {@link com.azure.identity.DeviceCodeCredentialBuilder}. Once this credential is * created, it may be passed into the builder of many of the Azure SDK for Java client builders as the 'credential' * parameter.

* * *
 * TokenCredential deviceCodeCredential = new DeviceCodeCredentialBuilder().build();
 * 
* * * @see DeviceCodeCredential */ public class DeviceCodeCredentialBuilder extends AadCredentialBuilderBase { private Consumer challengeConsumer = deviceCodeInfo -> System.out.println(deviceCodeInfo.getMessage()); private boolean automaticAuthentication = true; /** * Constructs an instance of DeviceCodeCredentialBuilder. */ public DeviceCodeCredentialBuilder() { super(); } /** * Sets the client ID of the Microsoft Entra application that users will sign in to. It is recommended * that developers register their applications and assign appropriate roles. For more information, * visit this doc for app registration. * If not specified, users will authenticate to an Azure development application, which is not recommended * for production scenarios. * * @param clientId the client ID of the application. * @return An updated instance of this builder with the client ID configured. */ @Override public DeviceCodeCredentialBuilder clientId(String clientId) { return super.clientId(clientId); } /** * Sets the consumer to meet the device code challenge. If not specified a default consumer is used which prints * the device code info message to stdout. * * @param challengeConsumer A method allowing the user to meet the device code challenge. * @return An updated instance of this builder with the challenge consumer configured. */ public DeviceCodeCredentialBuilder challengeConsumer(Consumer challengeConsumer) { this.challengeConsumer = challengeConsumer; return this; } /** * Configures the persistent shared token cache options and enables the persistent token cache which is disabled * by default. If configured, the credential will store tokens in a cache persisted to the machine, protected to * the current user, which can be shared by other credentials and processes. * * @param tokenCachePersistenceOptions the token cache configuration options * @return An updated instance of this builder with the token cache options configured. */ public DeviceCodeCredentialBuilder tokenCachePersistenceOptions(TokenCachePersistenceOptions tokenCachePersistenceOptions) { this.identityClientOptions.setTokenCacheOptions(tokenCachePersistenceOptions); return this; } /** * Sets the {@link AuthenticationRecord} captured from a previous authentication. * * @param authenticationRecord the authentication record to be configured. * * @return An updated instance of this builder with the configured authentication record. */ public DeviceCodeCredentialBuilder authenticationRecord(AuthenticationRecord authenticationRecord) { this.identityClientOptions.setAuthenticationRecord(authenticationRecord); return this; } /** * Disables the automatic authentication and prevents the {@link DeviceCodeCredential} from automatically * prompting the user. If automatic authentication is disabled a {@link AuthenticationRequiredException} * will be thrown from {@link DeviceCodeCredential#getToken(TokenRequestContext)} in the case that * user interaction is necessary. The application is responsible for handling this exception, and * calling {@link DeviceCodeCredential#authenticate()} or * {@link DeviceCodeCredential#authenticate(TokenRequestContext)} to authenticate the user interactively. * * @return An updated instance of this builder with automatic authentication disabled. */ public DeviceCodeCredentialBuilder disableAutomaticAuthentication() { this.automaticAuthentication = false; return this; } /** * For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens. * Add the wildcard value "*" to allow the credential to acquire tokens for any tenant on which the application is installed. * If no value is specified for TenantId this option will have no effect, and the credential will * acquire tokens for any requested tenant. * * @param additionallyAllowedTenants the additionally allowed tenants. * @return An updated instance of this builder with the additional tenants configured. */ @Override public DeviceCodeCredentialBuilder additionallyAllowedTenants(String... additionallyAllowedTenants) { identityClientOptions.setAdditionallyAllowedTenants( IdentityUtil.resolveAdditionalTenants(Arrays.asList(additionallyAllowedTenants))); return this; } /** * For multi-tenant applications, specifies additional tenants for which the credential may acquire tokens. * Add the wildcard value "*" to allow the credential to acquire tokens for any tenant on which the application is installed. * If no value is specified for TenantId this option will have no effect, and the credential will * acquire tokens for any requested tenant. * * @param additionallyAllowedTenants the additionally allowed tenants. * @return An updated instance of this builder with the additional tenants configured. */ @Override public DeviceCodeCredentialBuilder additionallyAllowedTenants(List additionallyAllowedTenants) { identityClientOptions .setAdditionallyAllowedTenants(IdentityUtil.resolveAdditionalTenants(additionallyAllowedTenants)); return this; } /** * Creates a new {@link DeviceCodeCredential} with the current configurations. * * @return a {@link DeviceCodeCredential} with the current configurations. */ public DeviceCodeCredential build() { String clientId = this.clientId != null ? this.clientId : IdentityConstants.DEVELOPER_SINGLE_SIGN_ON_ID; return new DeviceCodeCredential(clientId, tenantId, challengeConsumer, automaticAuthentication, identityClientOptions); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy