Skip to content

Acquiring a Token for On Behalf Of Flow (MSAL4J)

Published:

The On Behalf Of Flow is an OAuth 2.0 authentication flow that allows an application, such as a web service or a backend, to request an access token and perform subsequent service calls on behalf of the logged in user (or another web service), as the name suggests. This is possible using delegated permissions and scopes.

The easiest way to acquire a token for the On Behalf Of Flow when using Microsoft Entra ID (Azure AD) and Java is to use the MSAL (Microsoft Authentication Library) for Java library (msal4j).

Table of Contents

App Registration & the MSAL4J Library

My similar post on Client Credentials Flow explains how to create an app registration that you will need to perform the required calls. It also gives an overview of the MSAL4J library. Please have a quick look before proceeding.

Using the MSAL4J Library in Java

First, we need to include the following maven dependency.

<dependency>
    <groupId>com.microsoft.azure</groupId>
    <artifactId>msal4j</artifactId>
    <version>1.15.0</version> <!-- Use the latest available -->
</dependency>

Then, the following classes can be used to fetch an access token. If using Spring Cloud Azure with Spring Boot, the task is even easier as there are beans already containing all necessary properties.

import com.azure.spring.cloud.autoconfigure.implementation.context.properties.AzureGlobalProperties;
import com.microsoft.aad.msal4j.ClientCredentialFactory;
import com.microsoft.aad.msal4j.ConfidentialClientApplication;
import com.microsoft.aad.msal4j.OnBehalfOfParameters;

...

// Autowired in a Spring Boot app using spring-cloud-azure
// Otherwise, you can define the following manually
AzureGlobalProperties properties = ...; 

// STEP 1: Create a ConfidentialClientApplication
String clientId = properties.getCredential().getClientId();
String clientSecret = properties.getCredential().getClientSecret();
String tenantId = properties.getProfile().getTenantId();
ConfidentialClientApplication app = ConfidentialClientApplication.builder(
        clientId,
        ClientCredentialFactory.createFromSecret(clientSecret))
        .authority("https://login.microsoftonline.com/" + tenantId)
        .build();

// STEP 2: Set up the target scope(s) as well the users' token to request access on behalf of
Set<String> scopes = Set.of("api://target_scope_goes_here/.default");
UserAssertion userAssertion = new UserAssertion(userAccessToken);
OnBehalfOfParameters parameters = OnBehalfOfParameters.builder(scopes, userAssertion).build();

// STEP 3: Fetch the access token
String accessToken = app.acquireToken(parameters).get().accessToken();

// STEP 4: Use the access token in HTTP Headers or other libraries
...header("authorization", "Bearer " + accessToken)

Content of the Tokens

You can decoded tokens using JWT.io to understand more about them. My post on Client Credentials Flow explains a few of those claims, otherwise you can consult this comprehensive list.