-
-
Notifications
You must be signed in to change notification settings - Fork 93
feat: make Microsoft Entra ID tenant configurable #266
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Add MicrosoftTenant field to provider.Params and AddMicrosoftProvider method to auth.Service, allowing single-tenant Entra ID applications to specify their tenant instead of the hardcoded "common" endpoint. Fixes umputun/remark42#1998
Pull Request Test Coverage Report for Build 21887694868Details
💛 - Coveralls |
Add AUTH_MICROSOFT_TENANT env var to allow configuring the Azure AD tenant for single-tenant Entra ID applications, which cannot use the default /common endpoint. Depends on go-pkgz/auth#266 Closes #1998
Add AUTH_MICROSOFT_TENANT env var to allow configuring the Azure AD tenant for single-tenant Entra ID applications, which cannot use the default /common endpoint. Depends on go-pkgz/auth#266 Closes #1998
|
clean, minimal change - does what it says. CI green, 100% coverage on changed lines, v1/v2 consistent. two things worth considering:
otherwise LGTM |
umputun
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thx for adding the validation
Add AUTH_MICROSOFT_TENANT env var to allow configuring the Azure AD tenant for single-tenant Entra ID applications, which cannot use the default /common endpoint. Depends on go-pkgz/auth#266 Closes #1998
Summary
MicrosoftTenantfield toprovider.ParamsandAddMicrosoftProvidermethod toauth.Servicecommonendpoint"common"when no tenant is specified, preserving full backwards compatibilityContributes to umputun/remark42#1998