
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
insomnia-plugin-azure-ad-authentication
Advanced tools
Easily acquire Microsoft Entra ID tokens from within [Insomnia REST Client](https://insomnia.rest/)!
Easily acquire Microsoft Entra ID tokens from within Insomnia REST Client!
This plugin supports:
This plugin requires Insomnia, the Open Source API client.
Start Insomnia,
Click "Application" -> "Preferences" and choose the "Plugins" tab,
Click "Allow elevated access for plugins",
Enter insomnia-plugin-azure-ad-authentication and click "Install Plugin",

Close the dialog.
Open a new request, switch to the "Headers" tab,
Insert a new header. In the header name field, enter Authorization,
In the value field type Bearer control + space entra. This will bring the template tag menu and reveal the Entra ID Authorization template:

Choose the desired Microsoft Entra instance. Most users will choose Entra ID global service. The tag will display its unconfigured form as follows:

Click on the tag to edit. Specify the Directory (tenant) ID, the Application (client) ID, desired scopes and the Redirect URI. For Microsoft Accounts, set Directory to consumers. For Work or School accounts, set Directory to organizations, a tenant name or tenant ID (i.e contoso.com or f0cb5560-5e2a-4b3b-88f9-8193bdd39f7a). To allow for both Microsoft Accounts and Work or School accounts, select common. Choose the desired Scopes, Redirect URI (see configure Microsoft Entra ID Application) and Token Grant Flow (see Choosing a token grant flow).

Close the "Edit Tag" dialog,
Send a request by pressing "Send". If an interactive login has been chosen, a browser window will appear and take you through the regular Microsoft Entra ID login flow, possibly including consent. When the authentication completes, the tag will display its logged in form as follows:

This plugin requires the Redirect URI specified during step 5 above to be configured under "Mobile and Desktop applications" or "Web" in Microsoft Entra ID. Other platforms (including "Single Page Application") are not currently supported.
By default, the Redirect URI is http://127.0.0.1:1234/redirect and most users should configure their Microsoft Entra ID application with this default return URI.
http://localhost Redirect URI. The portal wants https if the host is localhostSee Issue #2 - http not allowed anymore for instructions on how to force the redirect url to start with http. The idea is to edit the application manifest as follows:
https instead of http,Manifest. This will open an editor with the application manifest as JSON,redirectUriSettings object and change the protocol in the url from https to http,SaveFor web browser token grant flows, the only practical option is a Redirect URI targeting 127.0.0.1 instead of localhost since some web browsers block navigation to http://localhost.
An example of Microsoft Entra ID application Redirect URIs can be seen below:

When using "Mobile and Desktop applications", also select "Allow public client flows" as shown below:

The following Redirect URI styles are supported:
http://127.0.0.1:<port></path> where port is a valid port number above 1000 and available for binding. Examples include: http://127.0.0.1:1234 or http://127.0.0.1:1234/openid,http://<dns-name>:<port></path> where dns-name resolves to 127.0.0.1 via an entry in the local machine hosts file. Examples include: http://myapp:1234 or http://myapp:1234/openid.The following Redirect URI styles are not supported:
https. The plugin currently only supports http for Redirect URI,localhost. Most web browsers block navigation to localhost or force the use of https which the plugin does not currently support,https://oauth.pstmn.io/v1/callback and variants). On most computers, oauth.pstmn.io is a valid DNS name that resolves to an IP address other than 127.0.0.1.Microsoft Entra ID applications can authenticate as themselves without any user interaction. This capability can be enabled by adding a shared secret (client secret) or a certificate. More details can be found in the Microsoft Entra ID documentation Quickstart: Register an application with the Microsoft identity platform
Learn more about Microsoft Entra ID Redirect URIs with Redirect URI (reply URL) restrictions and limitations.
This plugin supports the following OAuth 2.0 grant flows. For more information on OAuth 2.0 flows, see Scenarios and supported authentication flows
This is the most common flow. A web browser is opened and users authenticate with Microsoft Entra ID interactively. With this flow, it is possible to choose the type of token returned and the scopes. An access token can be used to authenticate and authorize calls to Web APIs. An id token can be used to verify a user is who they claim to be.

When using this flow, the Scopes accepts a space separated list of Microsoft Entra ID permissions like openid offline_access.
This flow permits a web service (confidential client) to use its own credentials, instead of impersonating a user, to authenticate when calling another web service. The client presents a pre-established shared secret. This flow is not recommended in production. Create a shared secret in Microsoft Entra ID and paste the secret in the 'Shared Secret' field.

When using this flow, the Scopes field must be set to <app URI>/.default, for instance api://f0cb5560-5e2a-4b3b-88f9-8193bdd39f7a/.default.
This flow permits a web service (confidential client) to use its own credentials, instead of impersonating a user, to authenticate when calling another web service. The client uses a certificate to sign an assertion. Upload the public key of a certificate to Microsoft Entra ID. Configure the plugin with the certificate thumbprint and the certificate private key file in PEM format.

When using this flow, the Scopes field must be set to <app URI>/.default, where <app URI> is the Microsoft Entra ID application URI, for example api://f0cb5560-5e2a-4b3b-88f9-8193bdd39f7a/.default.
The plugin allows users to log out or clear the cache to forget all saved accounts. These capabilities are accessible via the "Edit Tag" dialog:

Enhancements include:
FAQs
Easily acquire Microsoft Entra ID tokens from within [Insomnia REST Client](https://insomnia.rest/)!
The npm package insomnia-plugin-azure-ad-authentication receives a total of 24 weekly downloads. As such, insomnia-plugin-azure-ad-authentication popularity was classified as not popular.
We found that insomnia-plugin-azure-ad-authentication demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.