App Center Auth

Add the SDK to your app

App Center Auth is a cloud-based identity management service that enables developers to authenticate application users and manage user identities. The service integrates with other parts of App Center, enabling developers to leverage user identity to view user data in other services and even send push notifications to users instead of individual devices. App Center Auth is powered by Azure Active Directory B2C.

Please follow the Getting Started section before configuring Auth if you haven't set up the SDK in your app.

1. Add the App Center Auth module

The App Center SDK is designed with a modular approach – a developer only needs to integrate the modules of the services that they're interested in.

Integration via Cocoapods

When integrating App Center into your app via Cocoapods, add the following dependency to the project's podfile and run pod install.

pod 'AppCenter/Auth'

Integration by copying the binaries into your project

To manually integrate the module, follow this documentation link.

2. Start App Center Auth

App Center only uses the specific modules invoked in the app. The app must explicitly call each of them when starting the SDK.

Add the Auth class to project's [MSAppCenter start] or MSAppCenter.start method to start the App Center Auth service.

[MSAppCenter start:@"{Your App Secret}" withServices:@[[MSAnalytics class], [MSCrashes class], [MSAuth class]]];
MSAppCenter.start("{Your App Secret}", withServices: [MSAnalytics.self, MSCrashes.self, MSAuth.self])

Be sure to replace {Your App Secret} in the code sample above with your App Secret:

[MSAppCenter start:@"65dc3680-7325-4000-a0e7-dbd2276eafd1" withServices:@[[MSAnalytics class], [MSCrashes class], [MSAuth class]]];
MSAppCenter.start("65dc3680-7325-4000-a0e7-dbd2276eafd1", withServices: [MSAnalytics.self, MSCrashes.self, MSAuth.self])

Add the following lines to the import statements in the project's App Delegate class:

@import AppCenter;
@import AppCenterAuth;
import AppCenter
import AppCenterAuth

Modify the project's Info.plist


If the App Center Distribute SDK has previously been configured, the URL types key will already be present. In this case, add a new entry to the URL types key by following the instructions from step 3.

  1. In the project's Info.plist file, add a new key for URL types by clicking the + button next to Information Property List at the top. If Xcode displays the project's Info.plist as source code, refer to the tip below.
  2. Change the key type to Array.
  3. Add a new entry to the array (Item 0) and change the type to Dictionary.
  4. Under Item 0, add a Document Role key and change the value to Editor.
  5. Under Item 0, add a URL Schemes key and change the type to Array.
  6. Under URL Schemes key, add a new entry (Item 0).
  7. Under URL Schemes > Item 0, change the value to msal{APP_SECRET} and replace {APP_SECRET} with your App Secret: msal65dc3680-7325-4000-a0e7-dbd2276eafd1.


If you want to verify that you modified the Info.plist correctly, right-click on the file and select Open as... > Source code. It should contain the following entry with your actual App Secret instead of {APP_SECRET}: <string>msal65dc3680-7325-4000-a0e7-dbd2276eafd1</string>.


Add keychain sharing capability

App Center uses the “” keychain access group to support single sign on, by enabling different apps to share keychain items (i.e. user secrets and credentials) with each other. We use this access group to securely share a user secret within a family of apps that rely on the same user secret. This way, logging into one of your apps will automatically grant the same user access to all of the family of apps.

You must add a new keychain group to your project Keychain Sharing Capabilities:

To do that, click on the app's target settings, then Capabilities, then toggle Keychain Sharing on, then add the entry like in the following screenshot:

App Center Auth Keychain Capability

Sign users into the app

App Center provides a signInWithCompletionHandler: method that triggers the sign in policy defined in your Azure AD B2C tenant.

To present the sign-in UI to the user, call the signIn method:

[MSAuth signInWithCompletionHandler:^(MSUserInformation *_Nullable userInformation, NSError *_Nullable error) {

	if (!error) {
		// Sign-in succeeded.
		NSString *accountId = userInformation.accountId;
	else {
		// Do something with sign in failure.
MSAuth.signIn { userInformation, error in

	if error == nil {

		// Sign-in succeeded.
		var accountId = userInformation!.accountId;
	else {

		// Do something with sign in failure.

Please note the following:

  • The Auth module must be started at the same time as other modules, in a MSAppCenter.start call. If you decide to start the Auth service separately using MSAppCenter.startService, the app will not sign in automatically after the restart and the user will have to call signIn again.
  • The app must initialize the App Center SDK using MSAppCenter.start before calling signIn.
  • The app must be in the foreground before calling signIn.
  • App Center associates crash reports and handled errors with the signed-in user after sign-in completes successfully.
  • If sign-in fails, the crash reports and handled errors are not associated with any user.
  • New push notifications targeting the signed-in user are received on the device that the user has signed into.
  • Signing in on a device is not retroactive: the user does not receive push notifications that were sent to him prior to signing in on that device, and past error or crash reports are not updated with the new user information.
  • The SDK automatically saves the signed-in users' information so they do not have to sign in to your app again.
  • If the app calls signIn again, the SDK shows the sign-in UI again only if the saved sign-in information has expired or has been revoked by the authentication server.

Sign out

To sign out the user and clear all associated authentication tokens, call the signOut method:

[MSAuth signOut];

Enable or disable App Center Auth at runtime

As with every other App Center service, the app can disable the Auth service within the app. When disabled, the SDK signs the user out and ignores all other Auth method calls. In particular, signIn will not do anything and no UI will be shown while Auth is disabled.

[MSAuth setEnabled:NO];

To re-enable Auth, use the same API but pass true as a parameter.

[MSAuth setEnabled:YES];

The enabled/disabled state is stored by the SDK and does not change when the app restarts.

Check if App Center Auth is enabled

Check to see if App Center Auth is enabled using the following:

[MSAuth isEnabled];

Disable automatic forwarding of the app delegate's methods to App Center services

App Center uses swizzling to automatically forward the app delegate's methods to App Center services to improve SDK integration. Method swizzling is a way to change the implementation of methods at runtime. There is a possibility of conflicts with other third party libraries or the app delegate itself. You may want to disable App Center app delegate forwarding for all App Center services by following the steps below:

  1. Open the the project's Info.plist file.
  2. Add AppCenterAppDelegateForwarderEnabled key and set the value to 0. This disables app delegate forwarding for all App Center services.
  3. Add the openURL callback in the the project's AppDelegate file.
- (BOOL)application:(UIApplication *)application
	            openURL:(NSURL *)url
	  sourceApplication:(NSString *)sourceApplication
	         annotation:(id)annotation {

	// Pass the url to MSAuth.
	return [MSAuth openURL:url];
func application(_ application: UIApplication, open url: URL, sourceApplication: String?, annotation: Any) -> Bool {

  // Pass the URL to MSAuth.
  return as URL!)


This method is not called starting iOS 12. In order to test your integration with disabled swizzling, you must use a simulator or a device running an iOS version lower than 12.