@@ -1598,7 +1598,6 @@ def acquire_token_interactive(
1598
1598
extra_scopes_to_consent = None ,
1599
1599
max_age = None ,
1600
1600
window = None ,
1601
- enable_msa_passthrough = None ,
1602
1601
** kwargs ):
1603
1602
"""Acquire token interactively i.e. via a local browser.
1604
1603
@@ -1661,13 +1660,6 @@ def acquire_token_interactive(
1661
1660
you are recommended to also provide its window handle,
1662
1661
so that the sign in UI window will properly pop up on top of your window.
1663
1662
1664
- :param boolean enable_msa_passthrough:
1665
- OPTIONAL. MSA-Passthrough is a legacy configuration,
1666
- needed by a small amount of Microsoft first-party apps,
1667
- which would login MSA accounts via ".../organizations" authority.
1668
- If you app belongs to this category, AND you are enabling broker,
1669
- you would want to enable this flag. Default value is equivalent to False.
1670
-
1671
1663
:return:
1672
1664
- A dict containing no "error" key,
1673
1665
and typically contains an "access_token" key.
@@ -1694,13 +1686,21 @@ def acquire_token_interactive(
1694
1686
"no" if self .authority ._validate_authority is False
1695
1687
or self .authority .is_adfs or self .authority ._is_b2c
1696
1688
else None )
1697
- enable_msa_passthrough = self .client_id in [
1698
- # Experimental: Automatically enable MSA-PT mode for known MSA-PT apps
1699
- # More background of MSA-PT is available from this internal docs:
1700
- # https://microsoft.sharepoint.com/:w:/t/Identity-DevEx/EatIUauX3c9Ctw1l7AQ6iM8B5CeBZxc58eoQCE0IuZ0VFw?e=tgc3jP&CID=39c853be-76ea-79d7-ee73-f1b2706ede05
1701
- "04b07795-8ddb-461a-bbee-02f9e1bf7b46" , # Azure CLI
1702
- "04f0c124-f2bc-4f59-8241-bf6df9866bbd" , # Visual Studio
1703
- ] if enable_msa_passthrough is None else enable_msa_passthrough
1689
+ enable_msa_passthrough = kwargs .get (
1690
+ "enable_msa_passthrough" , # Keep it as a hidden param, for now.
1691
+ # OPTIONAL. MSA-Passthrough is a legacy configuration,
1692
+ # needed by a small amount of Microsoft first-party apps,
1693
+ # which would login MSA accounts via ".../organizations" authority.
1694
+ # If you app belongs to this category, AND you are enabling broker,
1695
+ # you would want to enable this flag. Default value is equivalent to False.
1696
+ self .client_id in [
1697
+ # Experimental: Automatically enable MSA-PT mode for known MSA-PT apps
1698
+ # More background of MSA-PT is available from this internal docs:
1699
+ # https://microsoft.sharepoint.com/:w:/t/Identity-DevEx/EatIUauX3c9Ctw1l7AQ6iM8B5CeBZxc58eoQCE0IuZ0VFw?e=tgc3jP&CID=39c853be-76ea-79d7-ee73-f1b2706ede05
1700
+ "04b07795-8ddb-461a-bbee-02f9e1bf7b46" , # Azure CLI
1701
+ "04f0c124-f2bc-4f59-8241-bf6df9866bbd" , # Visual Studio
1702
+ ]
1703
+ )
1704
1704
# Call _signin_silently() and/or _signin_interactively()
1705
1705
if prompt == "none" or (not prompt and not login_hint ):
1706
1706
response = _signin_silently (
0 commit comments