In the previous tutorial Localhost Python WebApp Auth Code Flow with Entra ID , we demonstrated using a localhost web app as a “server-side app” (confidential client) with the Authorization Code Flow. In this tutorial, we will deploy the app to Azure, making it a true “server-side app” where users cannot access secrets.
The following steps are required to deploy the app to Azure:
Create an Azure Container Registry
Create a Dockerfile and publish the image to the registry
This guide demonstrates how to create a “server-side” Python web application running locally (for development) that authenticates users with Microsoft Entra ID and authorizes access to the Microsoft Graph API using the Authorization Code Flow as a “confidential client” with a client secret.
Info:
In the second tutorial, we will deploy this app to Azure
The client is considered confidential because the app runs solely on the server, and users do not have access to the client secret.
To better understand OAuth 2.0, I have created the following mind map and a series of follow-up tutorials that provide a basic overview of how OAuth works.
MindMap OAuth
OAUTH 2.0 Mind Map illustrates basic concepts Figure 1: OAUTH 2.0 Mind Map visualizing basic concepts