Authentication, SSO, and Microsoft Graph in Microsoft Teams Tabs: An End-To-End Tutorial


Some of the most common questions we receive from Microsoft Teams developers concern authentication to Azure Active Directory (Azure AD), single sign-on (SSO) to Azure AD, and how to access Microsoft Graph APIs from within a Microsoft Teams app. Here, we’ll explain in detail how to do these things, going above and beyond authentication basics.


The TypeScript source code shown here can be found in our comprehensive sample apps: https://github.com/OfficeDev/microsoft-teams-sample-complete-node. There’s also a C# version.


First Things First

Don’t rely on the information from tab context to establish the user’s identity, whether you get it as URL parameters to your tab content URL or by calling the microsoftTeams.getContext() function in the Microsoft Teams client SDK. A malicious actor could invoke your tab content URL with its own parameters, and a web page impersonating Microsoft Teams could load your tab content URL in an <iframe> and return its own data to the getContext() function. You should treat the identity-related information in the tab context as “hints,” and validate them before use.


The Basics

The help topic Authenticate a user in your Microsoft Teams tab covers the basics of tab authentication. Here I’ll present a working example of a static tab that requests an access token for Microsoft Graph and shows the current user’s basic profile information from Azure AD.


Configuring your Azure AD Application

To authenticate with Azure AD, you will need to register an application and configure it correctly. If your Microsoft Teams app has a bot or a compose extension, an Azure AD application was created for you when you registered your bot with the Bot Framework. If your Microsoft Teams app just has a tab, you can create a new application through the Application Registration Portal.


The examples below use the OAuth2 Implicit Grant flow via the V1 endpoint, and reads the user’s profile information.


Here’s how to configure your application:

  1. Open the Application Registration Portal, locate your app, and click on it to see its properties.
  2. For the TypeScript/Node.js and C# sample apps on GitHub, the redirect URLs will be similar to what’s below, but the hostname will be different. That is, the redirect URLs for the sample app will be https://yourhost/tab-auth/simple-end and https://yourhost/tab-auth/silent-end.
    Redirect url settings for the sample appRedirect url settings for the sample app
  3. In the “Microsoft Graph Permissions” section, add the permissions your app requires. The examples below assume the User.Read delegated permission, which newly-created apps will have by default.
    Graph permissions required by the sample appGraph permissions required by the sample app

Step 1: Initiate the authentication flow

In the tab content or configuration page, call the microsoftTeams.authenticate() function of the Microsoft Teams client SDK to launch a popup that will host the authentication flow.

    url: window.location.origin + "/tab-auth/simple-start",
    width: 600,
    height: 535,
    successCallback: function (result) {
    failureCallback: function (reason) {

Here are some important things to understand about the above function:

  • Identity providers typically don’t allow their login and consent pages to be placed in an <iframe>, so you must use a popup (such as /tab-auth/simple-start above) instead of trying to host the login experience directly in your tab.
  • The URL you pass to microsoftTeams.authenticate() is the start page of your authentication flow. This page must be on a domain that’s in your validDomains list, or else the popup will not open.
  • The authentication flow must start on a page that’s on your domain; don’t start it directly to your identity provider’s login or consent page. In our example, even though we’re using Azure AD, we begin at /tab-auth/simple-start rather than going directly to the Azure AD endpoint at https://login.microsoftonline.com. If you skip this step, the login popup may fail to close when you call notifySuccess() or notifyFailure().


Step 2: Navigate to the authorization page

Next, from your login start page (e.g. in our example, /tab-auth/simple-start), navigate to the authorization page of the identity provider. You can return an HTTP 302 response from your server, or do this client-side by returning a page with JavaScript that calls window.location.assign(). Our example does this client-side, so that it can use the “hinting” information from the Microsoft Teams client SDK function microsoftTeams.getContext() to streamline the login flow:

microsoftTeams.getContext(function (context) {
    // Generate random state string and store it, so we can verify it in the callback
    let state = _guid();        // _guid() is a helper function in the sample
    localStorage.setItem("simple.state", state);

    // Go to the Azure AD authorization endpoint
    let queryParams = {
        client_id: "YOUR_APP_ID_HERE",
        response_type: "id_token token",
        response_mode: "fragment",
        resource: "https://graph.microsoft.com/User.Read openid",
        redirect_uri: window.location.origin + "/tab-auth/simple-end",
        nonce: _guid(),
        state: state,
        // The context object is populated by Teams; the upn attribute
	// is used as hinting information
        login_hint: context.upn,
    let authorizeEndpoint = "https://login.microsoftonline.com/common/oauth2/authorize?" 
+ toQueryString(queryParams); window.location.assign(authorizeEndpoint); });


  • As described earlier, this example uses the Azure AD OAuth2 Implicit Grant flow to get an access token for Microsoft Graph and an id token for the user. By performing the authorization in the microsoftTeams.getContext() callback function, the username field of the login prompt can be pre-filled with the user principal name (UPN) from the tab context. This saves the user from typing and may even allow the authentication flow to complete without further user interaction if the user is already logged in.
  • If you’re doing client-side redirection, call window.location.assign(). The microsoftTeams.navigateCrossDomain() function is not available in the context of the authentication popup. As a result, it is not necessary to include the the identity provider’s domain (e.g., for Azure AD, login.microsoftonline.com) in the validDomains list in the app’s manifest.json file.


Step 3: User sign-in and authorization

The user signs in to the identity provider and authorizes your application. The identity provider navigates to your login callback URL (the one you specified in the Application Registration Portal, e.g. https://yourhost/tab-auth/simple-end), which should determine if authentication was successful and call either the microsoftTeams.authentication.notifySuccess() or microsoftTeams.authentication.notifyFailure() functions from the Microsoft Teams client SDK.


Below is the example code of the JavaScript code in the login callback URL’s page that illustrates how to call notifySuccess() and notifyFailure():

// Split the key-value pairs passed from Azure AD
// getHashParameters is a helper function that parses the arguments sent
// to the callback URL by Azure AD after the authorization call
let hashParams = getHashParameters(); 
if (hashParams["error"]) {
    // Authentication/authorization failed
} else if (hashParams["access_token"]) {
    // Get the stored state parameter and compare with incoming state
    // This validates that the data is coming from Azure AD
    let expectedState = localStorage.getItem("simple.state");
    if (expectedState !== hashParams["state"]) {
        // State does not match, report error
    } else {
        // Success: return token information to the tab
            idToken: hashParams["id_token"],
            accessToken: hashParams["access_token"],
            tokenType: hashParams["token_type"],
            expiresIn: hashParams["expires_in"]
} else {
    // Unexpected condition: hash does not contain error or access_token parameter

The JavaScript above on the login callback URL’s page parses the key-value pairs received from Azure AD in window.location.hash using the getHashParameters() helper function. If it finds an access_token, and the state value is the same as the one provided at the start of the auth flow, it returns the access token to the tab by calling notifySuccess(); otherwise it reports an error with notifyFailure(). The tab receives the result, or the failure reason, in the callback functions it provided in the call to authenticate().


Note: Microsoft Teams will also invoke your failure callback in the following cases, with a predefined failure reason:

  • CancelledByUser – the user closed the popup window before completing the authentication flow.
  • FailedToOpenWindow – the popup window could not be opened. When running Microsoft Teams in a browser, this typically means that the window was blocked by a popup blocker


“Silent” Authentication

If you want to keep your code completely client-side, you can use the Azure Active Directory Authentication Library for Javascript to attempt to acquire an Azure AD access token silently (that is, without the user ever seeing a popup dialog). Even though the ADAL.js library is optimized for working with AngularJS applications, it’s certainly usable from pure JavaScript single-page applications.


The diagram below illustrates how “silent” authentication works:

"Silent" authentication using the ADAL.js library"Silent" authentication using the ADAL.js library

The ADAL.js library creates a hidden <iframe> for the implicit grant flow, but it specifies prompt=none so that Azure AD never shows the login page. If user interaction is required, whether because the user needs to log in or grant access to the application, Azure AD will immediately return an error that ADAL.js reports to your app. At this point your app can show a login button.


Step 1: Configure the ADAL.js library

Include the ADAL.js library in your tab pages and configure ADAL with your client ID and redirect URL:

<script src="https://secure.aadcdn.microsoftonline-p.com/lib/1.0.15/js/adal.min.js" integrity="sha384-lIk8T3uMxKqXQVVfFbiw0K/Nq+kt1P3NtGt/pNexiDby2rKU6xnDY8p16gIwKqgI" crossorigin="anonymous"></script>
<script type="text/javascript">
    // ADAL.js configuration
    let config = {
        clientId: "YOUR_APP_ID_HERE",
        // redirectUri must be in the list of redirect URLs for the AAD app
        redirectUri: window.location.origin + "/tab-auth/silent-end",
        cacheLocation: "localStorage",
        navigateToLoginRequestUrl: false,


Step 2: Build the tab content page 

  1. Call microsoftTeams.getContext() to get the current user’s UPN. Note that we won’t be relying on the value reported in the context, but rather, use it as login hint in the call to Azure AD.
    // Set up extra query parameters for ADAL
    // - openid and profile scope adds profile information to the id_token
    // - login_hint provides the expected user name
    if (upn) {
        config.extraQueryParameters = "scope=openid+profile&login_hint=" + encodeURIComponent(upn);
    } else {
        config.extraQueryParameters = "scope=openid+profile";              
  2. If ADAL has an unexpired token cached for the user, use that.
  3. Otherwise, attempt to get a token silently. Call _renewIdToken(callback) for an id token, or _renewToken(resource, callback) for an access token. ADAL.js will call your callback function with the requested token, or an error if it fails.
  4. If you get an error in the callback function, show a login button and fall back to an explicit login.
    let authContext = new AuthenticationContext(config); // from the ADAL.js library
    // See if there's a cached user and it matches the expected user
    let user = authContext.getCachedUser();
    if (user) {
        if (user.userName !== upn) {
            // User doesn't match, clear the cache
    // Get the id token (which is the access token for resource = clientId)
    let token = authContext.getCachedToken(config.clientId);
    if (token) {
    } else {
        // No token, or token is expired
        authContext._renewIdToken(function (err, idToken) {
            if (err) {
                console.log("Renewal failed: " + err);
                // Failed to get the token silently; show the login button
                // You could attempt to launch the login popup here, but in browsers this could be blocked by
                // a popup blocker, in which case the login attempt will fail with the reason FailedToOpenWindow.
            } else {


Step 3: Handle the AzureAD callback

Let ADAL.js take care of parsing the result from Azure AD by calling AuthenticationContext.handleWindowCallback(hash) in the login callback page. Next, check that we have a valid user, and call microsoftTeams.authentication.notifySuccess() or microsoftTeams.authentication.notifyFailure() to report status back to your main tab content page.

if (authContext.isCallback(window.location.hash)) {
  if (authContext.getCachedUser()) {
  } else {


Using an Existing Login Flow

The above examples illustrate how to perform authentication and authorization against Microsoft Active Directory. What if have an existing web application that requires authentication, and want to allow users to pin pages from that site as a tab?


For example, suppose our site is at https://example.com, and:


There’s no source code for this flow in the Node.js and C# examples, but here’s an overview of an approach that minimizes changes to the main site:

  1. Create a post-login page at https://example.com/tab-auth-done.
    On this page, check if the user’s login succeeded, then call notifySuccess() or notifyFailure() accordingly.
  2. Create a tab content page at https://example.com/tab-content. This page takes the URL of the actual content page as a targetUrl parameter.
    1. On load, check if the user is logged in to the site.
    2. If the user is logged in, navigate to the actual content by calling navigateCrossDomain().
      We recommend calling navigateCrossDomain() even if the target is actually on the same domain because Microsoft Teams validates that that domain of the target URL is in the valid domains list. This keeps your tab from navigating to an untrusted location and losing its connection to Microsoft Teams.
    3. Otherwise, show a login button.
      In the button’s click handler, call authenticate() with the URL: https://example.com/login?next=https%3A%2F%2Fexample.com%2Ftab-auth-done. If it succeeds, navigate to the actual content as above. If it fails, you might opt to show an error message, but remember to keep showing the login button so that the user can try again.
  3. When you create the tab, configure its settings as follows:
    1. Set contentUrl to https://example.com/tab-content?targetUrl=https%3A%2F%2Fexample.com%2Fpage%2F1%3Fsource%3Dmsteams so the tab goes to the landing page first.
    2. Set webUrl to https://example.com/page/1, so we go directly to the web content when the user chooses to view your tab in a browser.

The diagram below illustrates this flow:

Using an existing login flow in your Microsoft Teams tabUsing an existing login flow in your Microsoft Teams tab

Notice that when we set the contentUrl in the tab settings, we passed source=msteams as a parameter in the target URL's query string. This is as a signal to the site that it's about to be loaded inside a Microsoft Teams tab, so that it can experience accordingly. For example, we could suppress extraneous UI elements, or choose to load the Microsoft Teams tab library only when source=msteams is present. Keep in mind that anyone can easily load your site with the same query string parameter, so it's important to treat this only as a hint; don't make security-sensitive decisions based solely on query string!



In this article, we’ve explained how to perform authentication and authorization against Azure Active Directory, how to do single sign-on, and how to retrieve information using Microsoft Graph. This article, along with the Node.js/Typescript and C# samples, should illustrate these sophisticated and powerful techniques.


Happy authentication and authorization!

Senior Member

Thanks @Adrian Solis. Nice explanation with samples.


Hi @Adrian Solis, for Microsoft First party Apps such as Forms or Planner, will there be SSO support as well? 

Are you working with the AAD team to ensure that a similar approach can be used with future libraries? 


In MSAL (v0.1.3), the getCachedToken() method is declared as private, so I am using acquireTokenSilent(). However, if acquireTokenSilent() is called in the Teams tab, it fails silently. (The official Teams documentation discusses the requirement that auth pages cannot run inside an IFRA....) If I call acquireTokenSilent() using the prescribed microsoftTeams.authentication.authenticate() method, it works. However, the pop-up dialog is briefly shown.


@Kai Zhang The approach described in the "silent" authentication section above should work for first-party apps as well.


@Paul Schaeflein We just started investigating integrating with the AzureAD v2 endpoints and the new Microsoft Authentication Library (MSAL). As the successor to ADAL, we want MSAL to work within Teams as well, and we'll work with the maintainers to resolve issues. Thanks for your comment, and for reporting the problems you've encountered using MSAL in Teams.

Occasional Visitor

Adrian -

I am working on a Teams tab application, using C# .net mvc and javascript. Your article is excellent, and fills in many gaps in the online documentation. However, C# example  you referenced does not appear to be doing client side authentication. I cannot find a call to microsoftTeams.authentication.authenticate anywhere in the code.


I have been able to authenticate following Richard diZerega's blog post  - I believe the flow is the same, but he is using the ADAL javascript library


Problem - after authentication, I can access the Microsoft Graph API "https://graph.microsoft.com/v1.0/me", but the "https://graph.microsoft.com/beta/me/joinedTeams" returns an { "error": { "code": "", "message": "Authorization has been denied for this request.",


I have set Microsoft Graph Permissions in the Application Registration Portal for my app to same as I used in Graph Explorer.

I am in a developer sandbox, and have access to Office Admin. Is there something else I need to do to have permissions applied to my sideloaded app?


Here is a snapshot the app's permissions - any help would be appreciated!




Brad Cote

Occasional Visitor

Thanks Paul - I will check it out right away


@Brad Cote Has your app acquired tenant admin consent for the admin-only permissions? You need the User.Read.All permission to call /beta/me/joinedTeams, and that requires admin consent.

The training content Paul linked to has an example of getting admin consent (starts at step 2 under "Configure tab when added to channel").


Hi @Adrian Solis, thanks for this tutorial , it really helped me to build Msteams Tab.

One quick question, if our identity provider doesn’t allow the user to be login and logout with iframe, just in above case login works fine with Microsoft Teams Authentication flow. But for logout if want to open a window popup with same flow (microsoftTeams.authentication ), it is failing to call notifySuccess() callback to the parent page successCallBack() function. 

Can you please help what i am missing here to open a pop window to logout the user session.


 If we navigate to someother MSTeams Tabs after our login in iframe and come to our MsTeams Tab the logout is working perfectly. If we login and in the minute we logout without navigating to any other MsTeams Tab or channels, this above issue is occuring. Seems it is Msteams library (microsoftTeams.initilize() )in logout flow is conflicting with login flow page microsoftTeams.initialize() function.



The above case is happening only in MicrosoftTeams Desktop client application. In MicrosoftTeams web application on browser the above login and logout is working as expected.