use of com.microsoft.identity.common.internal.providers.microsoft.azureactivedirectory.AzureActiveDirectoryRefreshToken in project microsoft-authentication-library-common-for-android by AzureAD.
the class ADALOAuth2TokenCache method save.
/**
* Method responsible for saving tokens contained in the TokenResponse to storage.
*
* @param strategy
* @param request
* @param response
*/
@Override
public ICacheRecord save(final AzureActiveDirectoryOAuth2Strategy strategy, final AzureActiveDirectoryAuthorizationRequest request, final AzureActiveDirectoryTokenResponse response) {
final String methodName = "save";
Logger.info(TAG + ":" + methodName, "Saving Tokens...");
final String issuerCacheIdentifier = strategy.getIssuerCacheIdentifier(request);
final AzureActiveDirectoryAccount account = strategy.createAccount(response);
final String msalEnvironment = Uri.parse(issuerCacheIdentifier).getAuthority();
account.setEnvironment(msalEnvironment);
final AzureActiveDirectoryRefreshToken refreshToken = strategy.getRefreshTokenFromResponse(response);
refreshToken.setEnvironment(msalEnvironment);
Logger.info(TAG, "Constructing new ADALTokenCacheItem");
final ADALTokenCacheItem cacheItem = new ADALTokenCacheItem(strategy, request, response);
logTokenCacheItem(cacheItem);
// There is more than one valid user identifier for some accounts... AAD Accounts as of this writing have 3
Logger.info(TAG + ":" + methodName, "Setting items to cache for user...");
for (final String cacheIdentifier : account.getCacheIdentifiers()) {
// Azure AD Uses Resource and Not Scope... but we didn't override... heads up
final String scope = request.getScope();
final String clientId = request.getClientId();
Logger.infoPII(TAG + ":" + methodName, "issuerCacheIdentifier: [" + issuerCacheIdentifier + "]");
Logger.infoPII(TAG + ":" + methodName, "scope: [" + scope + "]");
Logger.infoPII(TAG + ":" + methodName, "clientId: [" + clientId + "]");
Logger.infoPII(TAG + ":" + methodName, "cacheIdentifier: [" + cacheIdentifier + "]");
setItemToCacheForUser(issuerCacheIdentifier, scope, clientId, cacheItem, cacheIdentifier);
}
// For legacy reasons creating a cache entry where the userid is null
// ADAL supported a single user mode where it was not necessary for the developer to provide the user id
// on calls to acquireTokenSilentAsync
setItemToCacheForUser(issuerCacheIdentifier, request.getScope(), request.getClientId(), cacheItem, null);
// TODO At some point, the type-safety of this call needs to get beefed-up
Logger.info(TAG + ":" + methodName, "Syncing SSO state to caches...");
for (final IShareSingleSignOnState<MicrosoftAccount, MicrosoftRefreshToken> sharedSsoCache : mSharedSSOCaches) {
try {
sharedSsoCache.setSingleSignOnState(account, refreshToken);
} catch (ClientException e) {
Logger.errorPII(TAG, "Exception setting single sign on state for account " + account.getUsername(), e);
}
}
// Returning null, since the ADAL cache's schema doesn't support this return type.
return null;
}
Aggregations