Skip to content

Commit b96489d

Browse files
authored
Merge pull request #564 from AzureAD/ciam-in-new-partition
Adjustment for new CIAM partition
2 parents 56256e4 + 49090cb commit b96489d

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

tests/test_e2e.py

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -925,10 +925,16 @@ def test_ciam_acquire_token_for_client(self):
925925
client_secret=self.get_lab_user_secret(
926926
self.app_config["clientSecret"].split("=")[-1]),
927927
authority=self.app_config["authority"],
928-
scope=["{}/.default".format(self.app_config["appId"])], # App permission
928+
#scope=["{}/.default".format(self.app_config["appId"])], # AADSTS500207: The account type can't be used for the resource you're trying to access.
929+
#scope=["api://{}/.default".format(self.app_config["appId"])], # AADSTS500011: The resource principal named api://ced781e7-bdb0-4c99-855c-d3bacddea88a was not found in the tenant named MSIDLABCIAM2. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You might have sent your authentication request to the wrong tenant.
930+
scope=self.app_config["scopes"], # It shall ends with "/.default"
929931
)
930932

931933
def test_ciam_acquire_token_by_ropc(self):
934+
"""CIAM does not officially support ROPC, especially not for external emails.
935+
936+
We keep this test case for now, because the test data will use a local email.
937+
"""
932938
# Somehow, this would only work after creating a secret for the test app
933939
# and enabling "Allow public client flows".
934940
# Otherwise it would hit AADSTS7000218.

0 commit comments

Comments
 (0)