Skip to content

Commit c8fe046

Browse files
author
Kalyan Krishna
committed
Updated readmes
1 parent 25b7690 commit c8fe046

File tree

6 files changed

+10
-2
lines changed

6 files changed

+10
-2
lines changed

1-WebApp-OIDC/1-2-AnyOrg/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,8 @@ cd "1-WebApp-OIDC\1-2-AnyOrg"
170170
171171
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
172172
173+
> A recording of a Microsoft Identity Platform developer session that covered this topic of developing a multi-tenant app with Azure Active Directory is available at [Develop multi-tenant applications with Microsoft identity platform](https://www.youtube.com/watch?v=B416AxHoMJ4).
174+
173175
## Troubleshooting
174176
175177
### known issue on iOS 12

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README-1-1-to-1-3.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,5 +39,7 @@ In the **appsettings.json** file, replace the `TenantId` value with `"common"`
3939

4040
## Next steps
4141

42+
- A recording of a Microsoft Identity Platform developer session that covered this topic of developing a multi-tenant app with Azure Active Directory is available at [Develop multi-tenant applications with Microsoft identity platform](https://www.youtube.com/watch?v=B416AxHoMJ4).
43+
4244
- Learn how to enable users from [National clouds](../1-4-Sovereign) to sign-in to your application
4345
- Learn how to enable your [Web App to call a Web API on behalf of the signed-in user](../../2-WebApp-graph-user)

2-WebApp-graph-user/2-3-Multi-Tenant/README-National-Cloud.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ In addition to the public cloud​, Azure Active Directory is deployed in th
4444
- Microsoft Cloud Germany
4545
- Azure and Office 365 operated by 21Vianet in China
4646

47+
> A recording of a Microsoft Identity Platform developer session that covered this topic of developing a multi-tenant app with Azure Active Directory is available at [Develop multi-tenant applications with Microsoft identity platform](https://www.youtube.com/watch?v=B416AxHoMJ4).
48+
4749
### Overview
4850

4951
When it comes to developing apps, developers can choose to configure their app to be either single-tenant or multi-tenant during app registration in the [Azure portal](https://portal.azure.com).

2-WebApp-graph-user/2-3-Multi-Tenant/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ When it comes to developing apps, developers can choose to configure their app t
3737

3838
For more information about apps and tenancy, see [Tenancy in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/single-and-multi-tenant-apps)
3939

40+
> A recording of a Microsoft Identity Platform developer session that covered this topic of developing a multi-tenant app with Azure Active Directory is available at [Develop multi-tenant applications with Microsoft identity platform](https://www.youtube.com/watch?v=B416AxHoMJ4).
41+
4042
![Sign in with Azure AD](ReadmeFiles/topology.png)
4143

4244
## Scenario

5-WebApp-AuthZ/5-2-Groups/README-incremental-instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This sample first leverages the ASP.NET Core OpenID Connect middleware to sign i
3535

3636
![Sign in with the Microsoft identity platform](ReadmeFiles/sign-in.png)
3737

38-
> An Identity Office Hours session covered Azure AD App roles and security groups, featuring this scenario and how to handle the overage claim. Watch the video [Using Security Groups and Application Roles in your apps](https://www.youtube.com/watch?v=V8VUPixLSiM)
38+
> An Identity Developer session covered Azure AD App roles and security groups, featuring this scenario and how to handle the overage claim. Watch the video [Using Security Groups and Application Roles in your apps](https://www.youtube.com/watch?v=V8VUPixLSiM)
3939
4040
> Pre-requisites:
4141
>

5-WebApp-AuthZ/5-2-Groups/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This sample first leverages the ASP.NET Core OpenID Connect middleware to sign i
3535

3636
![Sign in with the Microsoft identity platform](ReadmeFiles/sign-in.png)
3737

38-
> An Identity Office Hours session covered Azure AD App roles and security groups, featuring this scenario and how to handle the overage claim. Watch the video [Using Security Groups and Application Roles in your apps](https://www.youtube.com/watch?v=V8VUPixLSiM)
38+
> An Identity Developer session covered Azure AD App roles and security groups, featuring this scenario and how to handle the overage claim. Watch the video [Using Security Groups and Application Roles in your apps](https://www.youtube.com/watch?v=V8VUPixLSiM)
3939
4040
## How to run this sample
4141

0 commit comments

Comments
 (0)