Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create article linux-broker-py #117

Draft
wants to merge 4 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions msal-python-conceptual/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@
href: advanced/wam.md
- name: Using MSAL Python with Authentication Brokers on macOS
href: advanced/macos-broker.md
- name: Using MSAL Python with an Authentication Broker on Linux
href: ./advanced/linux-broker-py.md
displayName: msal, python, linux
- name: Migrate to MSAL Python
href: advanced/migrate-python-adal-msal.md
- name: Logging
Expand Down
92 changes: 92 additions & 0 deletions msal-python-conceptual/advanced/linux-broker-py.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
---
# Required metadata
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main

title: Using MSAL Python with an Authentication Broker on Linux
description: MSAL is able to call Microsoft Single Sign-on for Linux, which is a component that ships as a dependency of Intune Portal. This component acts as an authentication broker allowing the users of your app to benefit from integration with accounts known to the broker.
author: ploegert # GitHub alias
ms.author: jploegert # Microsoft alias
ms.service: msal
ms.topic: how-to
ms.date: 03/18/2025
---

# Using MSAL Python with an Authentication Broker on Linux


> [!NOTE]
> Linux authentication broker support is introduced with `msal` version UPDATE_ME.

Using an authentication brokers on Linux enables you to simplify how your users authenticate with Microsoft Entra ID from your application, as well as take advantage of future functionality that protects Microsoft Entra ID refresh tokens from exfiltration and misuse.

Authentication brokers are **not** pre-installed on Linux but are applications developed by Microsoft, such as [Company Portal](/mem/intune/apps/apps-company-portal-macos). These applications are usually installed when a Linux computer is enrolled in a company's device fleet via an endpoint management solution like [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). To learn more about Linux device set up with the Microsoft Identity Platform, refer to {TODO} [Microsoft Enterprise SSO plug-in for Apple devices](/entra/identity-platform/apple-sso-plugin).

1. In the MSAL Python library, we've introduced the `enable_broker_on_linux` flag, which enables the broker on both WSL and standalone Linux. However, if your goal is to enable broker support solely on WSL for Azure CLI, you can consider modifying the Azure CLI app code to activate the `enable_broker_on_linux` flag exclusively on WSL.

1. For WSL, there are no additional dependencies required. The Windows Authentication Manager (WAM), which is available by default on Windows, will serve as the broker. For standalone Linux, you'll need to have the Intune Portal installed for the Linux standalone broker to be set up and running.

1. If the broker is not installed on standalone Linux, it will fall back to the non-broker authentication flow.

1. If you choose to enable the broker on standalone Linux as well, you would need to test this environment to ensure there is no regression.

## Usage

To use the broker, you will need to install the broker-related packages in addition to the core MSAL from PyPI:

```bash
pip install msal[broker]>=1.31,<2
```

>[!IMPORTANT]
>If broker-related packages are not installed and you will try to use the authentication broker, you will get an error: `ImportError: You need to install dependency by: pip install "msal[broker]>=1.31,<2"`.

Typically, on macOS your [public client](/entra/identity-platform/msal-client-applications) Python applications would [acquire tokens](../getting-started/acquiring-tokens.md) via the system browser. To use authentication brokers installed on a macOS system instead, you will need to pass an additional argument in the `PublicClientApplication` constructor - `enable_broker_on_mac`:

```python
from msal import PublicClientApplication

app = PublicClientApplication(
"CLIENT_ID",
authority="https://login.microsoftonline.com/common",
enable_broker_on_mac =True)
```

>[!IMPORTANT]
>If you are writing a cross-platform application, you will also need to use `enable_broker_on_windows`, as outlined in the [Using MSAL Python with Web Account Manager](wam.md) article.

In addition to the constructor change, your application needs to support broker-specific redirect URIs. For _unsigned_ applications, the URI is:

```text
msauth.com.msauth.unsignedapp://auth
```

For signed applications, the redirect URI should be:

```text
msauth.BUNDLE_ID://auth
```

If the redirect URIs are not correctly set in the app configuration within the Entra portal, you will receive error like this:

```text
Error detected...
tag=508170375
context=AADSTS50011 Description: (pii), Domain: MSAIMSIDOAuthErrorDomain.Error was thrown in location: Broker
errorCode=-51411
status=Response_Status.Status_Unexpected
```

Once configured, you can call `acquire_token_interactive` to acquire a token.

```python
result = app.acquire_token_interactive(["User.ReadBasic.All"],
parent_window_handle=app.CONSOLE_WINDOW_HANDLE)
```

>[!NOTE]
>The `parent_window_handle` parameter is required even though on macOS it is not used. For GUI applications, the login prompt location will be determined ad-hoc and currently cannot be bound to a specific window. In a future update, this parameter will be used to determine the _actual_ parent window.

## Token caching

The authentication broker handles refresh and access token caching. You do not need to set up custom caching.