Skip to content

a365 config init always enables "Allow public client flows" (even on Windows) & adds undocumented https://localhost/ redirect URI #322

@laura-damian

Description

@laura-damian

Description

When running a365 config init, the Agent 365 CLI:

  • Always enables the Entra app’s “Allow public client flows” (isFallbackPublicClient) — even on Windows, where it’s not required.
  • Silently adds a https://localhost/ redirect URI to the app registration if it’s missing.

Neither behavior is documented in the official setup guide, which can lead to confusion.

Expected behavior

The CLI should not silently modify app registration settings.
Documentation should clearly state:
That https://localhost/ is a required redirect URI.
That the CLI will enable “Allow public client flows” and why.
On Windows, the CLI should not enable public client flows unless device code fallback is actually needed.

SDK Version

1.1.115-preview+fd1f775761

Language/Runtime

Python 3.12

OS

Windows 11

How to Reproduce

  1. Create a new Entra ID app registration for Agent 365 CLI.
    Ensure:
  • “Allow public client flows” is disabled.
  • https://localhost/ is not listed as a redirect URI.
  1. Run a365 config init on Windows and complete the wizard.
    Observe:
    CLI logs:
    Enabling 'Allow public client flows' on app registration (required for device code authentication fallback on macOS/Linux).

App registration now has:

isFallbackPublicClient = true
https://localhost/ added as a redirect URI

Output

No response

Screenshots

No response

Code of Conduct

Metadata

Metadata

Assignees

Labels

P1Very high prioritybugSomething isn't workingescalatedIssue has breached SLA and been escalatedsecuritySecurity-related issue

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions