use of com.microsoft.identity.common.internal.providers.microsoft.MicrosoftAccount in project microsoft-authentication-library-common-for-android by AzureAD.
the class ADALOAuth2TokenCache method save.
/**
* Method responsible for saving tokens contained in the TokenResponse to storage.
*
* @param strategy
* @param request
* @param response
*/
@Override
public ICacheRecord save(final AzureActiveDirectoryOAuth2Strategy strategy, final AzureActiveDirectoryAuthorizationRequest request, final AzureActiveDirectoryTokenResponse response) {
final String methodName = "save";
Logger.info(TAG + ":" + methodName, "Saving Tokens...");
final String issuerCacheIdentifier = strategy.getIssuerCacheIdentifier(request);
final AzureActiveDirectoryAccount account = strategy.createAccount(response);
final String msalEnvironment = Uri.parse(issuerCacheIdentifier).getAuthority();
account.setEnvironment(msalEnvironment);
final AzureActiveDirectoryRefreshToken refreshToken = strategy.getRefreshTokenFromResponse(response);
refreshToken.setEnvironment(msalEnvironment);
Logger.info(TAG, "Constructing new ADALTokenCacheItem");
final ADALTokenCacheItem cacheItem = new ADALTokenCacheItem(strategy, request, response);
logTokenCacheItem(cacheItem);
// There is more than one valid user identifier for some accounts... AAD Accounts as of this writing have 3
Logger.info(TAG + ":" + methodName, "Setting items to cache for user...");
for (final String cacheIdentifier : account.getCacheIdentifiers()) {
// Azure AD Uses Resource and Not Scope... but we didn't override... heads up
final String scope = request.getScope();
final String clientId = request.getClientId();
Logger.infoPII(TAG + ":" + methodName, "issuerCacheIdentifier: [" + issuerCacheIdentifier + "]");
Logger.infoPII(TAG + ":" + methodName, "scope: [" + scope + "]");
Logger.infoPII(TAG + ":" + methodName, "clientId: [" + clientId + "]");
Logger.infoPII(TAG + ":" + methodName, "cacheIdentifier: [" + cacheIdentifier + "]");
setItemToCacheForUser(issuerCacheIdentifier, scope, clientId, cacheItem, cacheIdentifier);
}
// For legacy reasons creating a cache entry where the userid is null
// ADAL supported a single user mode where it was not necessary for the developer to provide the user id
// on calls to acquireTokenSilentAsync
setItemToCacheForUser(issuerCacheIdentifier, request.getScope(), request.getClientId(), cacheItem, null);
// TODO At some point, the type-safety of this call needs to get beefed-up
Logger.info(TAG + ":" + methodName, "Syncing SSO state to caches...");
for (final IShareSingleSignOnState<MicrosoftAccount, MicrosoftRefreshToken> sharedSsoCache : mSharedSSOCaches) {
try {
sharedSsoCache.setSingleSignOnState(account, refreshToken);
} catch (ClientException e) {
Logger.errorPII(TAG, "Exception setting single sign on state for account " + account.getUsername(), e);
}
}
// Returning null, since the ADAL cache's schema doesn't support this return type.
return null;
}
use of com.microsoft.identity.common.internal.providers.microsoft.MicrosoftAccount in project microsoft-authentication-library-common-for-android by AzureAD.
the class TokenCacheItemMigrationAdapter method renewToken.
@Nullable
public static Pair<MicrosoftAccount, MicrosoftRefreshToken> renewToken(@Nullable final String redirectUri, @NonNull final ITokenCacheItem targetCacheItemToRenew) {
Pair<MicrosoftAccount, MicrosoftRefreshToken> resultPair = null;
if (!StringExtensions.isNullOrBlank(redirectUri)) {
try {
final String authority = targetCacheItemToRenew.getAuthority();
final String clientId = targetCacheItemToRenew.getClientId();
final String refreshToken = targetCacheItemToRenew.getRefreshToken();
final MicrosoftStsOAuth2Configuration config = new MicrosoftStsOAuth2Configuration();
config.setAuthorityUrl(new URL(authority));
// Create a correlation_id for the request
final UUID correlationId = UUID.randomUUID();
final String scopes;
if (TextUtils.isEmpty(targetCacheItemToRenew.getResource())) {
scopes = BaseController.getDelimitedDefaultScopeString();
} else {
scopes = getScopesForTokenRequest(targetCacheItemToRenew.getResource());
}
// Create the strategy
final OAuth2StrategyParameters strategyParameters = new OAuth2StrategyParameters();
final MicrosoftStsOAuth2Strategy strategy = new MicrosoftStsOAuth2Strategy(config, strategyParameters);
final MicrosoftStsTokenRequest tokenRequest = createTokenRequest(clientId, scopes, refreshToken, redirectUri, strategy, correlationId, "2");
final TokenResult tokenResult = strategy.requestToken(tokenRequest);
if (tokenResult.getSuccess()) {
final MicrosoftStsTokenResponse tokenResponse = (MicrosoftStsTokenResponse) tokenResult.getTokenResponse();
tokenResponse.setClientId(clientId);
// Create the Account to save...
final MicrosoftAccount account = strategy.createAccount(tokenResponse);
// Create the refresh token...
final MicrosoftRefreshToken msStsRt = new MicrosoftStsRefreshToken(tokenResponse);
msStsRt.setEnvironment(AzureActiveDirectory.getAzureActiveDirectoryCloud(new URL(authority)).getPreferredCacheHostName());
resultPair = new Pair<>(account, msStsRt);
} else {
Logger.warn(TAG, correlationId.toString(), "TokenRequest was unsuccessful.");
if (null != tokenResult.getErrorResponse()) {
logTokenResultError(correlationId, tokenResult);
}
}
} catch (Exception e) {
Logger.errorPII(TAG, "Failed to request new refresh token...", e);
}
}
return resultPair;
}
Aggregations