Azure AD OAuth client credential flow with custom certificate walk-through
Nicola Delfino demonstrates how to use a certificate to request an access token to Azure Active Directory, using the OAuth 2.0 client credential flow
You can use the OAuth 2.0 client credentials grant specified in RFC 6749, to access web-hosted resources by using the identity of an application. This type of grant is commonly used for server-to-server interactions that must run in the background, without immediate interaction with a user.
The OAuth 2.0 client credentials grant flow permits a web service (confidential client) to use its own credentials, instead of impersonating a user, to authenticate when calling another web service. For a higher level of assurance, the Microsoft Identity Platform also allows the calling service to authenticate using a certificate or federated credential instead of a shared secret.
In this walk-through I show how to use a certificate to request an access token to Azure Active Directory, using the OAuth 2.0 client credential flow. As the client, I use a custom c# DotNet 6 application and MSAL Library.
Continue with the complete walk-through on Nicola’s blog here.
Nicolas blog link is broken. There is a typo in the link added in the blog.
Correct link is: https://nicolgit.github.io/azure-ad-oauth-client-credential-flow-certificate-walk-through/