Skip to content

Commit bc0612c

Browse files
author
Tiago Brenck
committed
Readme changes
1 parent 1b4959a commit bc0612c

File tree

2 files changed

+15
-2
lines changed

2 files changed

+15
-2
lines changed

1-WebApp-OIDC/1-2-AnyOrg/AppCreationScripts/sample.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,11 @@
2020
"HomePage": "https://localhost:44321/",
2121
"ReplyUrls": "https://localhost:44321/, https://localhost:44321/signin-oidc",
2222
"LogoutUrl": "https://localhost:44321/signout-oidc",
23+
"PasswordCredentials": "Auto",
2324
"RequiredResourcesAccess": [
2425
{
2526
"Resource": "Microsoft Graph",
26-
"DelegatedPermissions": [ "User.Read" ]
27+
"DelegatedPermissions": [ "Directory.Read.All" ]
2728
}
2829
]
2930
}

1-WebApp-OIDC/1-2-AnyOrg/NEW_README.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This sample shows how to build a .NET Core 2.2 MVC Web app that uses OpenID Conn
2121
![Sign in with Azure AD](ReadmeFiles/sign-in.png)
2222

2323
> This is the second chapter of the first phase of this ASP.NET Core Web App tutorial. Once you understand how to sign-in users in an ASP.NET Core Web App with Open Id Connect, can learn how to enable your [Web App to call a Web API on behalf of the signed-in user](../../2-WebApp-graph-user) in a later chapter.
24-
> You can also sign-in users in your own Azure Active Directory organizations, and even with Microsoft personal accounts or social identities. For more details the parent directory's [Readme.md](../README.md)
24+
> You can also sign-in users in your own Azure Active Directory organizations, and even with Microsoft personal accounts or social identities. For more details the parent directory's [Readme.md](../README.md)
2525
2626
## How to run this sample
2727

@@ -44,6 +44,8 @@ or download and extract the repository .zip file.
4444
4545
### Step 2: Register the sample application with your Azure Active Directory tenant
4646

47+
> :warning: **If you had created this sample in the past already**: [Delete its **enterprise app** from the other tenants before re-creating this application](#error-AADSTS650051).
48+
4749
There is one project in this sample. To register it, you can:
4850

4951
- either follow the steps [Step 2: Register the sample with your Azure Active Directory tenant](#step-2-register-the-sample-with-your-azure-active-directory-tenant) and [Step 3: Configure the sample to use your Azure AD tenant](#choose-the-azure-ad-tenant-where-you-want-to-create-your-applications)
@@ -258,6 +260,16 @@ AuthenticationResult result = await confidentialClientApplication
258260
.ConfigureAwait(false);
259261
```
260262

263+
## Troubleshooting
264+
265+
### Error AADSTS650051
266+
267+
If you are receiving the following error message, you might need to **delete older Enterprise Applications**
268+
269+
> OpenIdConnectProtocolException: Message contains error: 'invalid_client', error_description: 'AADSTS650051: Application '{applicationId}' is requesting permissions that are either invalid or out of date.
270+
271+
If you had provisioned a service principle of this app in the past and created a new one, the tenants that had signed-in in the app might still have the previous service principle registered causing a conflict with the new one. The solution for the conflict is to delete the older service principle from each tenant in the **Enterprise Application** menu.
272+
261273
## Contributing
262274

263275
If you'd like to contribute to this sample, see [CONTRIBUTING.MD](/CONTRIBUTING.md).

0 commit comments

Comments
 (0)