The source code for this post can be found over at this GitHub repo.

Progressing from Part 1, we’re at the stage where we have a Azure Active Directory (AAD) tenant set up. We can make calls to AAD using postman and receive an access token which we could now use to call the API.

However, how do we get the API to validate that access token, ensuring it is valid and that a call which presents that access token should actually be allowed to transact. This is the focus of this post.

Creating an API

Feel free to use whatever you like to do this. In my case, I’ll use .Net Core (v 3.0) and use the default ValuesController to demonstrate the point.

For now, I’ll have the entire controller requiring authentication (by using the [Authorize] attribute). For the purpose of this post, we’ll just use the Get action.

    public class ValuesController : ControllerBase
        public ActionResult<IEnumerable<string>> Get()
            return new string[] { "value1", "value2" };

In the settings.json file add the following:

    "AzAdAuth": {
        "Domain": "{tenantID}_/",
        "Secret": "_{clientSecret}_"

In the StartUp class within ConfigureServices add the following:

    services.AddAuthentication(options =>
        options.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
    .AddJwtBearer(options =>
        options.Authority = $"{Configuration["AzAdAuth:Domain"]}";
        options.Audience = Configuration["Auth0:Audience"];
        options.TokenValidationParameters = new TokenValidationParameters
            ValidateIssuerSigningKey = true,
            IssuerSigningKey = new SymmetricSecurityKey(Encoding.ASCII.GetBytes($"{Configuration["AzAdAuth:Secret"]}")),
            ValidateIssuer = true,
            ValidateAudience = false

Lastly, within Configure add:


If you ran the application now and tried calling this endpoint, you’d get a connection refused response. :-)

Let’s setup a request in Postman and get a valid access token. a) Create a GET request that makes a call to {apiHost}/api/values b) Under Authorization select OAuth 2.0 as the Type c) Click on Get New Access Token and fill out the details as below

Token Name: _whatever you like_
Grant Type: `Authorization Code`
Callback URL: ``
Auth URL: `{tenantID}/oauth2/v2.0/authorize`
Access Token URL: `{tenantID}/oauth2/v2.0/token`
Client ID: `_{clientId}_`
Client Secret: `_{clientSecret}_`
Scope: `_{Application (client) ID}_/all`
Client Authentication: `Send as Basic Auth header`

Click Request Token then Use Token on the following dialog and you now have a bearer token that can be used to make a request to our API.

If you now execute the request, the values controller with return a 200 with the body of the the response presenting the return values from the controller.

Easy as that, we now have an API that’s secured by Azure Active Directory and requires a Bearer token to execute.

Additional Resources