Skip to content

Commit f84854e

Browse files
committed
Fixing README.md
1 parent 66fadc9 commit f84854e

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

Microsoft.Identity.Web/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -341,7 +341,7 @@ In both cases, you can set a breakpoint in the methods of the `OpenIdConnectMid
341341

342342
If you want to customize the `OpenIdConnectOption` or `JwtBearerOption` but still want to benefit from the implementation provided by Microsoft.Identity.Web, you can easily do it from your `Startup.cs` file:
343343

344-
Lets take for example the method `AddProtectedWebApi`. If you check the code inside it, you have this event setup:
344+
Let's take for example the method `AddProtectedWebApi`. If you check the code inside it, you have this event setup:
345345

346346
```
347347
options.Events.OnTokenValidated = async context =>
@@ -358,7 +358,7 @@ options.Events.OnTokenValidated = async context =>
358358
};
359359
```
360360

361-
Lets say you want to augment the current `ClaimsPrincipal` by adding claims to it, and you have to do it on `OnTokenValidated `, however you don't want to lose this `UnauthorizedAccessException` check existing in the event. To do so, on your `Startup.cs` you would have:
361+
Let's say you want to augment the current `ClaimsPrincipal` by adding claims to it, and you have to do it on `OnTokenValidated `, however you don't want to lose this `UnauthorizedAccessException` check existing in the event. To do so, on your `Startup.cs` you would have:
362362

363363
```
364364
services.AddProtectedWebApi(Configuration);
@@ -374,12 +374,12 @@ services.Configure<JwtBearerOptions>(AzureADDefaults.JwtBearerAuthenticationSche
374374

375375
```
376376

377-
## Learn more how the library works
377+
## Learn more about how the library works
378378

379379
You can learn more about the tokens by looking at the following articles in MSAL.NET's conceptual documentation:
380380

381381
- The [Authorization code flow](https://aka.ms/msal-net-authorization-code), which is used, after the user signed-in with Open ID Connect, in order to get a token and cache it for a later use. See [TokenAcquisition L 107](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/f99e913cc032e16c59b748241111e97108e87918/Extensions/TokenAcquisition.cs#L107) for details of this code
382-
- [AcquireTokenSilent](https://aka.ms/msal-net-acquiretokensilent ), which is used by the controller to get an access token for the downstream API. See [TokenAcquisition L 168](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/f99e913cc032e16c59b748241111e97108e87918/Extensions/TokenAcquisition.cs#L168) for details of this code
382+
- [AcquireTokenSilent](https://aka.ms/msal-net-acquiretokensilent), which is used by the controller to get an access token for the downstream API. See [TokenAcquisition L 168](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/f99e913cc032e16c59b748241111e97108e87918/Extensions/TokenAcquisition.cs#L168) for details of this code
383383
- [Token cache serialization](msal-net-token-cache-serialization)
384384

385385
The token validation is performed by the classes of the [Identity Model Extensions for DotNet](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet) library. Learn about customizing

0 commit comments

Comments
 (0)