Skip to content

Commit 8f4c67e

Browse files
rwike77jmprieur
authored andcommitted
Branding (#142)
* branding updates * branding updates * branding updates * branding updates * branding updates * branding updates
1 parent 1cd59bf commit 8f4c67e

File tree

22 files changed

+58
-58
lines changed

22 files changed

+58
-58
lines changed

1-WebApp-OIDC/1-1-MyOrg/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: jmprieur
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99

1010
# An ASP.NET Core Web app signing-in users with the Microsoft identity platform in your organization
@@ -85,7 +85,7 @@ As a first step you'll need to:
8585
8686
### Step 2: Download/ Clone this sample code or build the application using a template
8787
88-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
88+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
8989
9090
#### Option 1: Download/ clone this sample
9191
@@ -139,7 +139,7 @@ cd "1-WebApp-OIDC\1-1-MyOrg"
139139
services.AddAzureAdV2Authentication(Configuration);
140140
```
141141
142-
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
142+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
143143
144144
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
145145
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -149,7 +149,7 @@ cd "1-WebApp-OIDC\1-1-MyOrg"
149149
150150
1. Build the solution and run it.
151151
152-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
152+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the identity platform endpoint. Sign in with your personal account or with work or school account.
153153
154154
155155
## Toubleshooting

1-WebApp-OIDC/1-2-AnyOrg/README-1-1-to-1-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: jmprieur
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99
# Change your ASP.NET Core Web app to sign-in users in any org with the Microsoft identity platform
1010

1-WebApp-OIDC/1-2-AnyOrg/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: jmprieur
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99

1010

@@ -86,7 +86,7 @@ As a first step you'll need to:
8686
8787
### Step 2: Download/ Clone this sample code or build the application using a template
8888
89-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
89+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
9090
9191
#### Option 1: Download/ clone this sample
9292
@@ -139,7 +139,7 @@ cd "1-WebApp-OIDC\1-2-AnyOrg"
139139
services.AddAzureAdV2Authentication(Configuration);
140140
```
141141
142-
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
142+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
143143
144144
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
145145
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -149,7 +149,7 @@ cd "1-WebApp-OIDC\1-2-AnyOrg"
149149
150150
1. Build the solution and run it.
151151
152-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
152+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
153153
154154
155155
## Toubleshooting

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README-1-1-to-1-3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: jmprieur
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99
# Change your ASP.NET Core Web app to sign-in users in any org with the Microsoft identity platform
1010

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: jmprieur
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99
# An ASP.NET Core Web app signing-in users with Work or School accounts or Microsoft personal accounts
1010

@@ -100,7 +100,7 @@ As a first step you'll need to:
100100
101101
### Step 2: Download/ Clone this sample code or build the application using a template
102102
103-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
103+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
104104
105105
#### Option 1: Download/ clone this sample
106106
@@ -153,7 +153,7 @@ In the **appsettings.json** file:
153153
services.AddAzureAdV2Authentication(Configuration);
154154
```
155155
156-
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
156+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
157157
158158
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
159159
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -163,11 +163,11 @@ In the **appsettings.json** file:
163163
164164
1. Build the solution and run it.
165165
166-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
166+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
167167
168168
## Optional: Restrict sign-in access to your application
169169
170-
By default, when you use the dotnet core template with `SingleOrg` authentication option and follow the instructions in this guide to configure the application to use the Microsoft identity platform (fomerly Azure AD v2.0) endpoint, both personal accounts - like outlook.com, live.com, and others - as well as Work or school accounts from any organizations that are integrated with Azure AD can sign in to your application. These multi-tenant apps are typically used on SaaS applications.
170+
By default, when you use the dotnet core template with `SingleOrg` authentication option and follow the instructions in this guide to configure the application to use the Microsoft identity platform endpoint, both personal accounts - like outlook.com, live.com, and others - as well as Work or school accounts from any organizations that are integrated with Azure AD can sign in to your application. These multi-tenant apps are typically used on SaaS applications.
171171
172172
It's possible to restric the audience for your application by changing the audience in your application registration.
173173

1-WebApp-OIDC/1-4-Sovereign/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: negoe
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99
# Build an ASP.NET Core Web app signing-in users in sovereign clouds with the Microsoft identity platform
1010

@@ -42,7 +42,7 @@ To run this sample:
4242
4343

4444
### Step 1: Download/Clone this sample code
45-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint.
45+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint.
4646

4747
You can clone this sample from your shell or command line:
4848

@@ -127,7 +127,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
127127
services.AddAzureAdV2Authentication(Configuration);
128128
```
129129
130-
This enables your application to use the Microsoft identity platform (formerly known as Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
130+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
131131
132132
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
133133
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -137,7 +137,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
137137
138138
1. Build the solution and run it.
139139
140-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
140+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
141141
142142
## Troubleshooting
143143

1-WebApp-OIDC/1-5-B2C/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ platforms: dotnet
44
author: TiagoBrenck
55
level: 100
66
client: ASP.NET Core Web App
7-
endpoint: AAD v2.0
7+
endpoint: Microsoft identity platform
88
---
99
# An ASP.NET Core Web app signing-in users with the Microsoft identity platform in Azure AD B2C
1010

1-WebApp-OIDC/1-6-SignOut/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ This page explains how sign-out works
77
## What sign out involves
88

99
Signing out from a Web app is about more than removing the information about the signed-in account from the Web App's state.
10-
The Web app must also redirect the user to the Microsoft identity platform v2.0 `logout` endpoint to sign out. When your web app redirects the user to the `logout` endpoint, this endpoint clears the user's session from the browser. If your app did not go to the `logout` endpoint, the user would reauthenticate to your app without entering their credentials again, because they would have a valid single sign-in session with the Microsoft Identity platform v2.0 endpoint.
10+
The Web app must also redirect the user to the Microsoft identity platform `logout` endpoint to sign out. When your web app redirects the user to the `logout` endpoint, this endpoint clears the user's session from the browser. If your app did not go to the `logout` endpoint, the user would reauthenticate to your app without entering their credentials again, because they would have a valid single sign-in session with the Microsoft identity platform endpoint.
1111

12-
To learn more, see the [Send a sign-out request](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc#send-a-sign-out-request) paragraph in the [Microsoft Identity platform v2.0 and the OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) conceptual documentation
12+
To learn more, see the [Send a sign-out request](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc#send-a-sign-out-request) paragraph in the [Microsoft identity platform and the OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) conceptual documentation
1313

1414
## Application registration
1515

1-WebApp-OIDC/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: jmprieur
55
level: 200
66
client: ASP.NET Core .Web App
77
service: Microsoft Graph, Azure Storage, ASP.NET Core Web API
8-
endpoint: AAD v2.0
8+
endpoint: Microsoft identity platform
99
---
1010
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/ASP.NET%20Core%20Web%20App%20tutorial)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=819)
1111

2-WebApp-graph-user/2-1-Call-MSGraph/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: jmprieur
55
level: 200
66
client: ASP.NET Core 2.x Web App
77
service: Microsoft Graph
8-
endpoint: AAD v2.0
8+
endpoint: Microsoft identity platform
99
---
1010

1111
# Using the Microsoft identity platform to call the Microsoft Graph API from an An ASP.NET Core 2.x Web App, on behalf of a user signing-in using their work and school or Microsoft personal account
@@ -16,7 +16,7 @@ endpoint: AAD v2.0
1616

1717
Starting from a .NET Core 2.2 MVC Web app that uses OpenID Connect to sign in users, this phase of the tutorial shows how to call Microsoft Graph /me endpoint on behalf of the signed-in user. It leverages the ASP.NET Core OpenID Connect middleware and Microsoft Authentication Library for .NET (MSAL.NET). Their complexities where encapsultated into the `Microsoft.Identity.Web` reusable library project part of this tutorial. Once again the notion of ASP.NET services injected by dependency injection is heavily used.
1818

19-
![Sign in with the Microsoft identity platform for developers (fomerly Azure AD v2.0)](ReadmeFiles/sign-in.png)
19+
![Sign in with the Microsoft identity platform](ReadmeFiles/sign-in.png)
2020

2121
## How to run this sample
2222

@@ -72,7 +72,7 @@ Go to the `"2-WebApp-graph-user\2-1-Call-MSGraph"` folder
7272

7373
1. Build the solution and run it.
7474

75-
2. Open your web browser and make a request to the app. The app immediately attempts to authenticate you via the Microsoft identity platform (fomerly Azure AD v2.0) endpoint. Sign in with your personal account or with a work or school account.
75+
2. Open your web browser and make a request to the app. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with a work or school account.
7676

7777
3. Go to the **Profile** page, you should now see all kind of information about yourself as well as your picture (a call was made to the Microsoft Graph */me* endpoint)
7878

0 commit comments

Comments
 (0)