{ "version": 3, "sources": ["src/app/configs/auth-config.ts"], "sourcesContent": ["/**\r\n * This file contains authentication parameters. Contents of this file\r\n * is roughly the same across other MSAL.js libraries. These parameters\r\n * are used to initialize Angular and MSAL Angular configurations in\r\n * in app.module.ts file.\r\n */\r\n\r\nimport {\r\n LogLevel,\r\n Configuration,\r\n BrowserCacheLocation,\r\n} from '@azure/msal-browser';\r\nimport { environment } from '../../environments/environment';\r\n\r\nconst isIE =\r\n window.navigator.userAgent.indexOf('MSIE ') > -1 ||\r\n window.navigator.userAgent.indexOf('Trident/') > -1;\r\nconst b2cConfigs = environment.b2cConfigs;\r\n\r\n/**\r\n * Enter here the user flows and custom policies for your B2C application,\r\n * To learn more about user flows, visit https://docs.microsoft.com/en-us/azure/active-directory-b2c/user-flow-overview\r\n * To learn more about custom policies, visit https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-overview\r\n */\r\nexport const b2cPolicies = {\r\n names: {\r\n signUpSignIn: 'B2C_1_lawa_signup_signin',\r\n resetPassword: 'B2C_1_lawa_pwd_reset',\r\n editProfile: 'B2C_1_lawa_profile_edit',\r\n employerSignUp: 'B2C_1_employer_signup',\r\n jobSeekerSignUp: 'B2C_1_jobseeker_signup',\r\n },\r\n authorities: {\r\n signUpSignIn: {\r\n authority: `https://${b2cConfigs.tenantName}.b2clogin.com/${b2cConfigs.tenantName}.onmicrosoft.com/${b2cConfigs.policyNames.signUpSignIn}`,\r\n },\r\n editProfile: {\r\n authority: `https://${b2cConfigs.tenantName}.b2clogin.com/${b2cConfigs.tenantName}.onmicrosoft.com/${b2cConfigs.policyNames.editProfile}`,\r\n },\r\n resetPassword: {\r\n authority: `https://${b2cConfigs.tenantName}.b2clogin.com/${b2cConfigs.tenantName}.onmicrosoft.com/${b2cConfigs.policyNames.resetPassword}`,\r\n },\r\n },\r\n authorityDomain: `${b2cConfigs.tenantName}.b2clogin.com`,\r\n};\r\n\r\n/**\r\n * Configuration object to be passed to MSAL instance on creation.\r\n * For a full list of MSAL.js configuration parameters, visit:\r\n * https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/configuration.md\r\n */\r\nexport const msalConfig: Configuration = {\r\n auth: {\r\n clientId: b2cConfigs.clientId, // This is the ONLY mandatory field that you need to supply.\r\n authority: b2cPolicies.authorities.signUpSignIn.authority, // Defaults to \"https://login.microsoftonline.com/common\"\r\n knownAuthorities: [b2cPolicies.authorityDomain], // Mark your B2C tenant's domain as trusted.\r\n redirectUri: b2cConfigs.redirectUri, // Points to window.location.origin by default. You must register this URI on Azure portal/App Registration.\r\n postLogoutRedirectUri: b2cConfigs.logoutRedirectUri, // Points to window.location.origin by default.\r\n },\r\n cache: {\r\n cacheLocation: BrowserCacheLocation.LocalStorage, // Configures cache location. \"sessionStorage\" is more secure, but \"localStorage\" gives you SSO between tabs.\r\n storeAuthStateInCookie: isIE, // Set this to \"true\" if you are having issues on IE11 or Edge. Remove this line to use Angular Universal\r\n },\r\n system: {\r\n /**\r\n * Below you can configure MSAL.js logs. For more information, visit:\r\n * https://docs.microsoft.com/azure/active-directory/develop/msal-logging-js\r\n */\r\n loggerOptions: {\r\n loggerCallback(logLevel: LogLevel, message: string) {},\r\n logLevel: LogLevel.Verbose,\r\n piiLoggingEnabled: false,\r\n },\r\n },\r\n};\r\n\r\n/**\r\n * Scopes you add here will be prompted for user consent during sign-in.\r\n * By default, MSAL.js will add OIDC scopes (openid, profile) to any login request.\r\n * For more information about OIDC scopes, visit:\r\n * https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes\r\n */\r\nexport const loginRequest = {\r\n scopes: [],\r\n};\r\n\r\n/**\r\n * An optional silentRequest object can be used to achieve silent SSO\r\n * between applications by providing a \"loginHint\" property (such as a username). For more, visit:\r\n * https://learn.microsoft.com/en-us/azure/active-directory/develop/msal-js-sso#sso-between-different-apps\r\n * If you do not receive the username claim in ID tokens, see also:\r\n * https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/FAQ.md#why-is-getaccountbyusername-returning-null-even-though-im-signed-in\r\n */\r\nexport const silentRequest = {\r\n scopes: [],\r\n loginHint: 'example@domain.net',\r\n};\r\n\r\nexport const SignUpRoles = {\r\n Employer: 'Employer',\r\n JobSeeker: 'Job Seeker',\r\n CBO: 'Community Partner',\r\n Staff: 'LAWA Staff',\r\n};\r\n"], "mappings": ";;;;;;;AAcA,IAAM,OACJ,OAAO,UAAU,UAAU,QAAQ,OAAO,IAAI,MAC9C,OAAO,UAAU,UAAU,QAAQ,UAAU,IAAI;AACnD,IAAM,aAAa,YAAY;AAOxB,IAAM,cAAc;EACzB,OAAO;IACL,cAAc;IACd,eAAe;IACf,aAAa;IACb,gBAAgB;IAChB,iBAAiB;;EAEnB,aAAa;IACX,cAAc;MACZ,WAAW,WAAW,WAAW,UAAU,iBAAiB,WAAW,UAAU,oBAAoB,WAAW,YAAY,YAAY;;IAE1I,aAAa;MACX,WAAW,WAAW,WAAW,UAAU,iBAAiB,WAAW,UAAU,oBAAoB,WAAW,YAAY,WAAW;;IAEzI,eAAe;MACb,WAAW,WAAW,WAAW,UAAU,iBAAiB,WAAW,UAAU,oBAAoB,WAAW,YAAY,aAAa;;;EAG7I,iBAAiB,GAAG,WAAW,UAAU;;AAQpC,IAAM,aAA4B;EACvC,MAAM;IACJ,UAAU,WAAW;;IACrB,WAAW,YAAY,YAAY,aAAa;;IAChD,kBAAkB,CAAC,YAAY,eAAe;;IAC9C,aAAa,WAAW;;IACxB,uBAAuB,WAAW;;;EAEpC,OAAO;IACL,eAAe,qBAAqB;;IACpC,wBAAwB;;;EAE1B,QAAQ;;;;;IAKN,eAAe;MACb,eAAe,UAAoB,SAAe;MAAG;MACrD,UAAU,SAAS;MACnB,mBAAmB;;;;AAWlB,IAAM,eAAe;EAC1B,QAAQ,CAAA;;AAeH,IAAM,cAAc;EACzB,UAAU;EACV,WAAW;EACX,KAAK;EACL,OAAO;;", "names": [] }