As of 2020, this repo is obsolete. The Firebase SDK now supports authenticating using Microsoft. I left the old README below. The Firebase docs explain setting up Firebase and Azure AD, handling the sign-in, existing account errors, other advanced topics, authenticating in a Chrome extension and customizing a redirect domain.
This sample shows how to authenticate Firebase apps using Azure AD Sign-In. It's copied from from Firebase's function-samples repo, specifically the instagram-auth sample. This model uses redirect instead of popup to be a little more mobile-friendly.
In this sample we use OAuth 2.0 based authentication to get Azure AD user information then create a Firebase Custom Token (using the oid
from the Azure AD id_token
).
Create and setup the Firebase project:
- Create a Firebase project using the Firebase Developer Console.
- Enable Billing on your Firebase project by switching to the Blaze plan. You must upgrade to execute external HTTP requests from Cloud Functions.
Create and provide Service Account credentials:
- Create a Service Accounts file as described in the Server SDK setup instructions.
- Save the Service Account credential file as
./functions/service-account.json
- Make sure
service-account.json
is in.gitignore
.
Create and set up your Azure AD app:
- Register an Azure AD app on Azure Portal App registrations. You'll need to do a New registration if you don't already have an app.
- Once your app is created make sure you specify your app's callback URL in the list of Redirect URIs for your Azure AD app. You should whitelist
https://localhost:5000/auth.html
for local development and if you deploy on App Engine (See Deploy section below) you should whitelist the URLhttps://<application-id>.firebaseapp.com/auth.html
. You can find your Application (client) ID in the Overview of the App Registration page. Use the appropriateazure.redirect_uri
in your Firebase config. (See below.) - Under Certificates & secrets, generate a new client secret. Save this to your Firebase config under
azure.client_secret
. - Copy the Application (client) ID and Directory (tenant) ID from the overview page. Password of your Azure AD app and save these to your Firebase config as
azure.client_id
andazure.tenant_id
. (See below.)
firebase functions:config:set azure.client_id="your application/client id" azure.client_secret="your client secret" azure.tenant_id="your directory/tenant id"
firebase functions:config:set azure.redirect_uri="local or app engine redirect uri"
Make sure the Azure AD Password is always kept secret. For instance do not save it in your version control system.
- Run
firebase init
and walk through the init process. It will also install your dependencies. - Run
npm i
oryarn
to install dependencies if you didn't do it during theinit
process. - Run
firebase deploy
to deploy. The first time the Functions are deployed the process can take several minutes.
Before you run the sample, you must copy your Firebase config to local. Make sure that .runtimeconfig.json
is in your .gitignore
.
firebase functions:config:get > .runtimeconfig.json
Open the sample's website by using firebase open hosting:site
or directly accessing https://<project-id>.firebaseapp.com/
.
Click on the Sign in with Azure AD button and the page should redirect to the Microsoft auth page. Sign in and/or authorize the authentication request.
The website should display your name and email address from Azure AD. At this point you are authenticated in Firebase and can use the database/hosting etc...
When clicking the Sign in with Azure AD button the page redirects users to the redirect
Function URL.
The redirect
Function then redirects the user to the Azure AD OAuth 2.0 consent screen where the (first-time) user must grant approval. Also the state
cookie is set on the client with the value of the state
URL query parameter to check against later on.
After the user has granted approval the user is redirected back to the ./auth.html
page along with an OAuth 2.0 Auth Code as a URL parameter. This Auth code is then sent to the token
Function using a JSONP Request. The token
function then:
- Checks that the value of the
state
URL query parameter is the same as the one in thestate
cookie. - Exchanges the auth code for an access token using the Azure AD app credentials and gets the user identity (oid, email, and full name).
- Mints a Custom Auth token (which is why we need Service Accounts Credentials).
- Returns the Custom Auth Token, oid, email, user display name and Azure AD access token to the
./auth.html
page.
The ./auth.html
receives the Custom Auth Token and other data back from the AJAX request to the token
Function and uses it to update the user's profile, saves the access token to the database, authenticate the user in Firebase and then redirect to the index page.
At this point the main page will detect the sign-in through the Firebase Auth State observer and display the signed-In user information.