page_type | description | products | languages | extensions | urlFragment | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
sample |
Sample channel and group tab with SSO hello world app. |
|
|
|
officedev-microsoft-teams-samples-tab-channel-group-sso-quickstart-ts |
Tabs are Teams-aware webpages embedded in Microsoft Teams. A channel/group tab delivers content to channels and group chats, and are a great way to create collaborative spaces around dedicated web-based content.
-
M365 developer account or access to a Teams account with the appropriate permissions to install an app.
Teams needs to access your tab from a publically accessible URL. If you are running your app in localhost, you will need to use a tunneling service like ngrok. Run ngrok and point it to localhost.
ngrok http -host-header=rewrite 3000
-
Register a new application in the Azure Active Directory – App Registrations portal.
-
On the overview page, copy and save the Application (client) ID, Directory (tenant) ID. You’ll need those later when updating your Teams application manifest and in the .env file at both client and server.
-
Navigate to the Certificates & secrets. In the Client secrets section, click on "+ New client secret". Add a description (Name of the secret) for the secret and select “Never” for Expires. Click "Add". Once the client secret is created, copy its value, it need to be placed in the appsettings.json file.
-
Navigate to Authentication If an app hasn't been granted IT admin consent, users will have to provide consent the first time they use an app.
Set a redirect URI:
- Select Add a platform.
- Select web.
- Enter the redirect URI for your app. This will be the page where a successful implicit grant flow will redirect the user.
Set it as
https://Base_Url/auth-end
, ex:https://f631****.ngrok.io/auth-end
Next, enable implicit grant by checking the following boxes:
✔ ID Token
✔ Access Token -
Under Manage, select Expose an API.
-
Select the Set link to generate the Application ID URI in the form of
api://{AppID}
. Insert your fully qualified domain name (with a forward slash "/" appended to the end) between the double forward slashes and the GUID. The entire ID should have the form of:api://fully-qualified-domain-name.com/{AppID}
- ex:
api://subdomain.example.com/00000000-0000-0000-0000-000000000000
.
The fully qualified domain name is the human readable domain name from which your app is served. If you are using a tunneling service such as ngrok, you will need to update this value whenever your ngrok subdomain changes.
- ex:
api://f631****.ngrok.io/9051a142-901a-4384-a83c-556c2888b071
.
- ex:
-
Select the Add a scope button. In the panel that opens, enter
access_as_user
as the Scope name. -
Set Who can consent? to
Admins and users
-
Fill in the fields for configuring the admin and user consent prompts with values that are appropriate for the
access_as_user
scope:- Admin consent display name: Teams can access the user’s profile.
- Admin consent description: Allows Teams to call the app’s web APIs as the current user.
-
Ensure that State is set to Enabled
-
Select the Add scope button to save
- The domain part of the Scope name displayed just below the text field should automatically match the Application ID URI set in the previous step, with
/access_as_user
appended to the end:api://subdomain.example.com/00000000-0000-0000-0000-000000000000/access_as_user
- The domain part of the Scope name displayed just below the text field should automatically match the Application ID URI set in the previous step, with
-
In the Authorized client applications section, identify the applications that you want to authorize for your app’s web application. Select Add a client application. Enter each of the following client IDs and select the authorized scope you created in the previous step:
1fec8e78-bce4-4aaf-ab1b-5451cc387264
(Teams mobile/desktop application)5e3ce6c0-2b1f-4285-8d4b-75ee78787346
(Teams web application)
-
- `"REACT_APP_AZURE_APP_REGISTRATION_ID"` : Application ID of the Azure AD application
- `"REACT_APP_BASE_URL"` : Ngrok URL you get after running the ngrok command.
Go to the folder api-server
and update following values in .env files
- `"CLIENT_ID"` : Application ID of the Azure AD application
- `"CLIENT_SECRET"` : Application secret of the Azure AD application
You can build and run the project from the command line or an IDE:
- Navigate to the Project root folder
- Build Client
- Open terminal
- Install pacakge with npm install
- npm run build
- Run Client
- Open new terminal
- npm start
- The client will start running on 3000 port
- Run Server
- Open new terminal
- Change directory to
api-server
folder with command i.e.cd api-server
- Install pacakge with npm install
- npm start
- The server will start running on 5000 port
- Update the manifest's
<<REACT_APP_AZURE_APP_REGISTRATION_ID>>
&<<REACT_APP_BASE_URL>>
with their repective values and zip it under appPackage folder - Now your application is running and ready to upload
npm run build
Builds the app for production to the build
folder.
It correctly bundles React in production mode and optimizes the build for the best performance.
The build is minified and the filenames include the hashes.
Your app is ready to be deployed!
See the section about deployment for more information.