https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=38338

--- Comment #44 from Olivier Hubert <[email protected]> ---
Yes, exactly. I think that once administrative consent has been granted, we can
use client credentials to get a token, and bypass the whole /authorize
endpoint. We would still have to store the token and refresh it periodically,
but it would still be easier than having to deal with the whole back-and-forth.

In my tests, I've been able to get the token (and refresh token) using a POST
to     "https://login.microsoftonline.com/$tenant_id/oauth2/v2.0/token";, with a
payload of something like this:

    {
        grant_type    => "client_credentials",
        client_id     => $client_id,
        client_secret => $client_secret,
        scope         => "https://outlook.office365.com/.default";,
    }

So we would need to ask for the tenant ID, client ID and client secret, but
there would be no need for an authorization step.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are watching all bug changes.
_______________________________________________
Koha-bugs mailing list
[email protected]
https://lists.koha-community.org/cgi-bin/mailman/listinfo/koha-bugs
website : http://www.koha-community.org/
git : http://git.koha-community.org/
bugs : http://bugs.koha-community.org/

Reply via email to