-
Notifications
You must be signed in to change notification settings - Fork 148
[iOS SDK] Update Email OTP MFA to match EC implementation #2687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[iOS SDK] Update Email OTP MFA to match EC implementation #2687
Conversation
289D138D2DF336390008CB1A /* MSALNativeAuthGenericError.swift in Sources */ = {isa = PBXBuildFile; fileRef = 289D13852DF336330008CB1A /* MSALNativeAuthGenericError.swift */; }; | ||
289D138E2DF336390008CB1A /* MSALNativeAuthGenericError.swift in Sources */ = {isa = PBXBuildFile; fileRef = 289D13852DF336330008CB1A /* MSALNativeAuthGenericError.swift */; }; | ||
289E15592948E601006104D9 /* MSALNativeAuthCacheInterface.swift in Sources */ = {isa = PBXBuildFile; fileRef = 289E15582948E601006104D9 /* MSALNativeAuthCacheInterface.swift */; }; | ||
289E156D2948EB8A006104D9 /* MSALNativeAuthCacheAccessor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 289E156C2948EB8A006104D9 /* MSALNativeAuthCacheAccessor.swift */; }; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@spetrescu84 can you please update the changelog file too?
telemetryUpdate: { [weak self] result in | ||
self?.stopTelemetryEvent(event, context: context, delegateDispatcherResult: result) | ||
}) | ||
case .introspectRequired: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this type of result can't be returned by the API, so we can get rid of it
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wasn't sure on this one, removed
Proposed changes
This PR updates the SDK to match the latest flow from EC.
In this new flow, the developer must always supply an existing Method Id to the
/oauth2/v2.0/challenge
endpoint which means once the.strongAuthRequired
error is received from any endpoint, the/oauth2/v2.0/introspect
endpoint needs to be called to retrieve the methods which are automatically returned to be used by the developer.Furthermore whenever calling the
/token
endpoint is called with an MFA Email OTP code, the grant type should bemfa_oob
Type of change
Risk
Additional information