No problem, thanks for having time
This one is OIDC
However this strategy implementation for Azure works, due to the use of the parameters
responseType: "code",
responseMode: "query",
I tried those with this strategy, but they were not compatible.
I am using the SAML-P endpoint, apologies if the next code is very much Hello World!
adminAuth: {
type: "strategy",
strategy: {
name: "saml",
label: "Sign in with Entra ID",
icon: "fa-windows",
strategy: require("passport-saml").Strategy,
options: {
issuer: "very-secret-issuer",
entryPoint: "https://login.microsoftonline.com/top-secret-uid/saml2",
cert: "almost-definitely-a-secret-cert,
callbackUrl: "http://localhost:1880/auth/strategy/callback",
verify: function (accessToken, refreshToken, profile, done) {
// @todo
done(null, profile);
},
autoLogin: true,
},
},
users: function (user) {
return Promise.resolve({ username: user, permissions: "*" });
},
},
Looks like more tinkering...