Configure single sign-on with Azure Active Directory in Power Virtual Agents


There is additional information available for people using Power Virtual Agents (preview).

Power Virtual Agents supports single sign-on (SSO), which means chatbots can sign the user in if they're in to the page where the bot is deployed.

For example, the bot is hosted on the corporate intranet or in an app that the user is already signed in to.

There are four main steps to configuring SSO for Power Virtual Agents:

  1. Create an app registration in Azure AD for your custom canvas.

  2. Define a custom scope for your bot.

  3. Configure authentication in Power Virtual Agents to enable SSO.

  4. Configure your custom canvas HTML code to enable SSO.


SSO is currently not supported when a bot has been either:


Supported channels

The following table details the channels that currently support SSO. You can suggest support for additional channels at the Power Virtual Agents ideas forum.

Channel Supported
Azure Bot Service channels Not supported
Custom Website Supported
Demo Website Not supported
Facebook Not supported
Microsoft Teams1 Supported
Mobile App Not supported
Omnichannel for Customer Service2 Supported

1 If you also have the Teams channel enabled, you need to follow the configuration instructions on the Configure SSO for Teams channel documentation. Failing to configure the Teams SSO settings as instructed on that page will cause your users to always fail authentication when using the Teams channel.

2 Only the live chat channel is supported. For more information, see Configure hand-off to Dynamics 365 Customer Service.

Technical overview

The following illustration shows how a user is signed in without seeing a login prompt (SSO) in Power Virtual Agents:

Illustration of SSO authentication flow.

  1. The bot user enters a phrase that triggers a sign-in topic. The sign-in topic is designed to sign the user in and use the user's authenticated token (AuthToken variable).

  2. Power Virtual Agents sends a login prompt to allow the user to sign in with their configured identity provider.

  3. The bot's custom canvas intercepts the sign-in prompt and requests an on-behalf-of (OBO) token from Azure AD. The canvas sends the token to the bot.

  4. On receipt of the OBO token, the bot exchanges the OBO token for an "access token" and fills in the AuthToken variable using the access token's value. The IsLoggedIn variable is also set at this time.

Create an app registration in Azure AD for your custom canvas

To enable SSO, you'll need two separate app registrations:


You can't reuse the same app registration for both your bot's user authentication and your custom canvas.

Create an app registration for the bot's canvas

  1. Sign in to the Azure portal.

  2. Go to App registrations, either by selecting the icon or searching in the top search bar.

    Screenshot highlighting app registrations tile on the Azure portal.

  3. Select New registration.

    Screenshot of the app registration blade with the New registration button highlighted.

  4. Enter a name for the registration. It can be helpful to use the name of the bot whose canvas you're registering and include "canvas" to help separate it from the app registration for authentication.

    For example, if your bot is called "Contoso sales help", you might name the app registration as "ContosoSalesCanvas" or something similar.

  5. Select the account type under Supported account types. We recommend you select Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (for example Skype, Xbox).

  6. Leave the Redirect URI section blank for now, as you'll enter that information in the next steps. Select Register.

    Screenshot showing the registration form.

  7. After the registration is completed, it will open to the Overview page. Go to Manifest. Confirm that accessTokenAcceptedVersion is set to 2. If it isn't, change it to 2 and then select Save.

Add the redirect URL

  1. With the registration open, go to Authentication and then select Add a platform.

    Screenshot showing Add a platform under Authentication.

  2. On the configure platforms blade, select Web.

    Screenshot showing the web tile highlighted.

  3. Under Redirect URIs, add the full URL to the page where your chat canvas is hosted. Under the Implicit grant section, select the Id Tokens and Access Tokens checkboxes.

  4. Select Configure to confirm your changes.

    Screenshot showing the redirect URLs form.

  5. Go to API Permissions. Select Grant admin consent for <your tenant name> and then Yes.


    To avoid users from having to consent to each application, a Global Administrator, Application Administrator, or a Cloud Application Administrator must grant tenant-wide consent to your app registrations.

    Screenshot highlight the Grant admin consent for tenant-name button.

Define a custom scope for your bot

Define a custom scope by exposing an API for the canvas app registration within the authentication app registration. Scopes allow you to determine user and admin roles and access rights.

This step creates a trust relationship between the authentication app registration for authentication and the app registration for your custom canvas.

  1. Open the app registration that you created when you configured authentication.

  2. Go to API Permissions and ensure that the correct permissions are added for your bot. Select Grant admin consent for <your tenant name> and then Yes.


    To avoid users from having to consent to each application, a Global Administrator, Application Administrator, or a Cloud Application Administrator must grant tenant-wide consent to your app registrations.

  3. Go to Expose an API and select Add a scope.

    Screenshot showing Expose an api and then add a scope.

  4. Enter a name for the scope, along with the display information that should be shown to users when they come to the SSO screen. Select Add scope.

    Screenshot showing the Add scope blade.

  5. Select Add a client application.

  6. Enter the Application (client) ID from the Overview page for the canvas app registration into the Client ID field. Select the checkbox for the listed scope that you created.

  7. Select Add application.

Configure authentication in Power Virtual Agents to enable SSO

The Token Exchange URL in the Power Virtual Agents authentication configuration page is used to exchange the OBO token for the requested access token through the bot framework.

Power Virtual Agents calls into Azure AD to perform the actual exchange.

  1. Sign in to Power Virtual Agents.

  2. Confirm you've selected the bot for which you want to enable authentication by selecting the bot icon on the top menu and choosing the correct bot.

  3. In the navigation menu, under Settings, select Security. Then select the Authentication card.

    Go to Manage and then Authentication.

  4. Enter the full scope URI from the Expose an API blade for the bot's authentication app registration in the Token exchange URL field. The URI will be in the format of api://1234-4567/

    Screenshot highlighting the scope's API.

    Screenshot showing the authentication tab with location for the API.

  5. Select Save and then publish the bot content.

Configure your custom canvas HTML code to enable SSO

Update the custom canvas page where the bot is located to intercept the login card request and exchange the OBO token.

  1. Configure the Microsoft Authentication Library (MSAL) by adding the following code into a <script> tag in your <head> section.

  2. Update clientId with the Application (client) ID for the canvas app registration. Replace <Directory ID> with the Directory (tenant) ID. You get these IDs from the Overview page for the canvas app registration.

    App registration overview highlighting the Application and Directory IDs.

       var clientApplication;
         (function () {
           var msalConfig = {
               auth: {
                 clientId: '<Client ID [CanvasClientId]>',
                 authority: '<Directory ID>'
               cache: {
                 cacheLocation: 'localStorage',
                 storeAuthStateInCookie: false
           if (!clientApplication) {
             clientApplication = new Msal.UserAgentApplication(msalConfig);
         } ());
  3. Insert the following <script> in the <body> section. This script calls a method to retrieve the resourceUrl and exchange your current token for a token requested by the OAuth prompt.

    function getOAuthCardResourceUri(activity) {
      if (activity &&
           activity.attachments &&
           activity.attachments[0] &&
           activity.attachments[0].contentType === 'application/' &&
           activity.attachments[0].content.tokenExchangeResource) {
             // asking for token exchange with AAD
             return activity.attachments[0].content.tokenExchangeResource.uri;
    function exchangeTokenAsync(resourceUri) {
      let user = clientApplication.getAccount();
       if (user) {
         let requestObj = {
           scopes: [resourceUri]
         return clientApplication.acquireTokenSilent(requestObj)
           .then(function (tokenResponse) {
             return tokenResponse.accessToken;
             .catch(function (error) {
             else {
             return Promise.resolve(null);
  4. Insert the following <script> in the <body> section. Within the main method, this code adds a conditional to your store, with your bot's unique identifier. It also generates a unique ID as your userId variable.

  5. Update <BOT ID> with your bot's ID. You can see your bot's ID by going to the Channels tab for the bot you're using, and selecting Mobile app on the Power Virtual Agents portal.

    Bot ID shown on the Mobile app channel configuration page.

        (async function main() {
            // Add your BOT ID below 
            var BOT_ID = "<BOT ID>";
            var theURL = "" + BOT_ID;
            const {
            } = await fetchJSON(theURL);
            const directLine = window.WebChat.createDirectLine({
            var userID = clientApplication.account?.accountIdentifier != null ?
                ("Your-customized-prefix-max-20-characters" + clientApplication.account.accountIdentifier).substr(0, 64) :
                (Math.random().toString() +, 64); // Make sure this will not exceed 64 characters 
            const store = WebChat.createStore({}, ({
            }) => next => action => {
                const {
                } = action;
                if (action.type === 'DIRECT_LINE/CONNECT_FULFILLED') {
                        type: 'WEB_CHAT/SEND_EVENT',
                        payload: {
                            name: 'startConversation',
                            type: 'event',
                            value: {
                                text: "hello"
                    return next(action);
                if (action.type === 'DIRECT_LINE/INCOMING_ACTIVITY') {
                    const activity = action.payload.activity;
                    let resourceUri;
                    if (activity.from && activity.from.role === 'bot' &&
                        (resourceUri = getOAuthCardResourceUri(activity))) {
                        exchangeTokenAsync(resourceUri).then(function(token) {
                            if (token) {
                                    type: 'invoke',
                                    name: 'signin/tokenExchange',
                                    value: {
                                        id: activity.attachments[0],
                                        connectionName: activity.attachments[0].content.connectionName,
                                    "from": {
                                        id: userID,
                                        role: "user"
                                    id => {
                                        if (id === 'retry') {
                                            // bot was not able to handle the invoke, so display the oauthCard
                                            return next(action);
                                        // else: tokenexchange successful and we do not display the oauthCard
                                    error => {
                                        // an error occurred to display the oauthCard
                                        return next(action);
                            } else
                                return next(action);
                    } else
                        return next(action);
                } else
                    return next(action);
            const styleOptions = {
                // Add styleOptions to customize Web Chat canvas
                hideUploadButton: true
                    directLine: directLine,
                    userID: userID,
        })().catch(err => console.error("An error occurred: " + err));

Full sample code

For reference, you can find the full sample code, with the MSAL and store conditional scripts already included at our GitHub repo.