Table of Contents

Interface IPublicClientApplication

Namespace
Microsoft.Identity.Client
Assembly
Microsoft.Identity.Client.dll

Represents public client applications - desktop and mobile applications.

public interface IPublicClientApplication : IClientApplicationBase, IApplicationBase
Inherited Members
Extension Methods

Remarks

Public client applications are not trusted to safely keep application secrets and therefore they can only access web APIs in the name of the authenticating user. See Client Applications.

Unlike IConfidentialClientApplication, public clients are unable to securely store secrets on a client device and as a result do not require the use of a client secret.

The redirect URI needed for interactive authentication is automatically determined by the library. It does not need to be passed explicitly in the constructor. Depending on the authentication strategy (e.g., through the Web Account Manager, the Authenticator app, web browser, etc.), different redirect URIs will be used by MSAL. Redirect URIs must always be configured for the application in the Azure Portal.

Properties

IsSystemWebViewAvailable

Tells if the application can use the system web browser, therefore enabling single-sign-on with web applications. By default, MSAL will try to use a system browser on the mobile platforms, if it is available. See our documentation for more details.

bool IsSystemWebViewAvailable { get; }

Property Value

bool

Returns true if MSAL can use the system web browser.

Remarks

On Windows, macOS, and Linux a system browser can always be used, except in cases where there is no UI (e.g., a SSH session). On Android, the browser must support tabs.

Methods

AcquireTokenByIntegratedWindowsAuth(IEnumerable<string>)

This API is no longer recommended and will be deprecated in future versions in favor of similar functionality via the Windows broker (WAM). WAM does not require any setup for desktop apps to login with the Windows account.

Acquires a token non-interactively for the signed-in user in Windows via Integrated Windows Authentication. The account used in this overrides is pulled from the operating system as the current user principal name. This method does not look in the token cache, but stores the result in it. Before calling this method, use other methods such as AcquireTokenSilent(IEnumerable<string>, IAccount) to check the token cache.

AcquireTokenByIntegratedWindowsAuthParameterBuilder AcquireTokenByIntegratedWindowsAuth(IEnumerable<string> scopes)

Parameters

scopes IEnumerable<string>

Scopes requested to access a protected API.

Returns

AcquireTokenByIntegratedWindowsAuthParameterBuilder

A builder enabling you to add optional parameters before executing the token request.

Remarks

See our documentation for more details.

AcquireTokenByUsernamePassword(IEnumerable<string>, string, string)

Acquires a token without user interaction using username and password authentication. This method does not look in the token cache, but stores the result in it. Before calling this method, use other methods such as AcquireTokenSilent(IEnumerable<string>, IAccount) to check the token cache.

AcquireTokenByUsernamePasswordParameterBuilder AcquireTokenByUsernamePassword(IEnumerable<string> scopes, string username, string password)

Parameters

scopes IEnumerable<string>

Scopes requested to access a protected API.

username string

Identifier of the user application requests token on behalf. Generally in UserPrincipalName (UPN) format, e.g. john.doe@contoso.com

password string

User password as a string.

Returns

AcquireTokenByUsernamePasswordParameterBuilder

A builder enabling you to add optional parameters before executing the token request.

Remarks

Available only for .NET Framework and .NET Core applications. See our documentation for details.

AcquireTokenInteractive(IEnumerable<string>)

Acquires a token interactively for the specified scopes. Either a system browser, an embedded browser, or a broker will handle this request, depending on the version of .NET framework used and on configuration. For Microsoft Entra applications, a broker is recommended. See Windows Broker. This method does not look in the token cache, but stores the result in it. Before calling this method, use other methods such as AcquireTokenSilent(IEnumerable<string>, IAccount) to check the token cache. See Interactive Authentication.

AcquireTokenInteractiveParameterBuilder AcquireTokenInteractive(IEnumerable<string> scopes)

Parameters

scopes IEnumerable<string>

Scopes requested to access a protected API.

Returns

AcquireTokenInteractiveParameterBuilder

A builder enabling you to add optional parameters before executing the token request.

Remarks

The user will be signed-in interactively and will consent to scopes, as well as perform a multi-factor authentication step if such a policy was enabled in the Azure AD tenant.

AcquireTokenWithDeviceCode(IEnumerable<string>, Func<DeviceCodeResult, Task>)

Acquires a token on a device without a web browser by letting the user authenticate on another device. This method does not look in the token cache, but stores the result in it. Before calling this method, use other methods such as AcquireTokenSilent(IEnumerable<string>, IAccount) to check the token cache.

AcquireTokenWithDeviceCodeParameterBuilder AcquireTokenWithDeviceCode(IEnumerable<string> scopes, Func<DeviceCodeResult, Task> deviceCodeResultCallback)

Parameters

scopes IEnumerable<string>

Scopes requested to access a protected API.

deviceCodeResultCallback Func<DeviceCodeResult, Task>

Callback containing information to show the user about how to authenticate and enter the device code.

Returns

AcquireTokenWithDeviceCodeParameterBuilder

A builder enabling you to add optional parameters before executing the token request.

Remarks

The token acquisition is done in two steps:

  • The method first acquires a device code from the authority and returns it to the caller via the deviceCodeResultCallback. This callback takes care of interacting with the user to direct them to authenticate (i.e., to a specific URL, with a code).
  • The method then proceeds to poll for the security token which is granted upon successful login by the user based on the device code information.
See Device Code Flow.