removed testing comments
This commit is contained in:
Родитель
62c8f52886
Коммит
4937fa0f2a
|
@ -1,32 +1,3 @@
|
|||
"""
|
||||
The configuration file would look like this (sans those // comments):
|
||||
|
||||
{
|
||||
"authority": "https://login.microsoftonline.com/Enter_the_Tenant_Name_Here",
|
||||
"client_id": "your_client_id",
|
||||
"scope": ["https://graph.microsoft.com/.default"],
|
||||
// Specific to Client Credentials Grant i.e. acquire_token_for_client(),
|
||||
// you don't specify, in the code, the individual scopes you want to access.
|
||||
// Instead, you statically declared them when registering your application.
|
||||
// Therefore the only possible scope is "resource/.default"
|
||||
// (here "https://graph.microsoft.com/.default")
|
||||
// which means "the static permissions defined in the application".
|
||||
|
||||
"secret": "The secret generated by AAD during your confidential app registration",
|
||||
// For information about generating client secret, refer:
|
||||
// https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Client-Credentials#registering-client-secrets-using-the-application-registration-portal
|
||||
|
||||
"endpoint": "https://graph.microsoft.com/v1.0/users"
|
||||
// For this resource to work, you need to visit Application Permissions
|
||||
// page in portal, declare scope User.Read.All, which needs admin consent
|
||||
// https://github.com/Azure-Samples/ms-identity-python-daemon/blob/master/1-Call-MsGraph-WithSecret/README.md
|
||||
}
|
||||
|
||||
You can then run this sample with a JSON configuration file:
|
||||
|
||||
python sample.py parameters.json
|
||||
"""
|
||||
|
||||
import os
|
||||
import json
|
||||
import logging
|
||||
|
|
Загрузка…
Ссылка в новой задаче