-
Notifications
You must be signed in to change notification settings - Fork 11
Closed
Labels
P1Very high priorityVery high prioritybugSomething isn't workingSomething isn't workingescalatedIssue has breached SLA and been escalatedIssue has breached SLA and been escalatedsecuritySecurity-related issueSecurity-related issue
Description
Description
When running a365 config init, the Agent 365 CLI:
- Always enables the Entra app’s “Allow public client flows” (isFallbackPublicClient) — even on Windows, where it’s not required.
- Silently adds a https://localhost/ redirect URI to the app registration if it’s missing.
Neither behavior is documented in the official setup guide, which can lead to confusion.
Expected behavior
The CLI should not silently modify app registration settings.
Documentation should clearly state:
That https://localhost/ is a required redirect URI.
That the CLI will enable “Allow public client flows” and why.
On Windows, the CLI should not enable public client flows unless device code fallback is actually needed.
SDK Version
1.1.115-preview+fd1f775761
Language/Runtime
Python 3.12
OS
Windows 11
How to Reproduce
- Create a new Entra ID app registration for Agent 365 CLI.
Ensure:
- “Allow public client flows” is disabled.
- https://localhost/ is not listed as a redirect URI.
- Run a365 config init on Windows and complete the wizard.
Observe:
CLI logs:
Enabling 'Allow public client flows' on app registration (required for device code authentication fallback on macOS/Linux).
App registration now has:
isFallbackPublicClient = true
https://localhost/ added as a redirect URI
Output
No response
Screenshots
No response
Code of Conduct
- I agree to follow the Microsoft Open Source Code of Conduct.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
P1Very high priorityVery high prioritybugSomething isn't workingSomething isn't workingescalatedIssue has breached SLA and been escalatedIssue has breached SLA and been escalatedsecuritySecurity-related issueSecurity-related issue