Skip to content

Commit f582acb

Browse files
committed
Addressing PR comments for ReadMe
1 parent 9ee34f5 commit f582acb

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

README.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,22 @@ endpoint: Microsoft Identity platform (formerly Azure AD v2.0)
1515
1616
### Overview
1717

18-
This sample demonstrates a Python Web Application application calling The Microsoft Graph.
18+
This sample demonstrates a Python web application that signs-in users with the Microsoft identity platform and calls the Microsoft Graph
1919

20-
1. The python web application uses the MicroSoft Authentication Library (MSAL) to obtain a JWT access token from Azure Active Directory (Azure AD):
20+
1. The python web application uses the Microsoft Authentication Library (MSAL) to obtain a JWT access token from the Microsoft identity platform (formerly Azure AD v2.0):
2121
2. The access token is used as a bearer token to authenticate the user when calling the Microsoft Graph.
2222

2323
![Overview](./ReadmeFiles/topology.png)
2424

2525
### Scenario
2626

27-
This sample shows how to build a Python web app that uses OAuth2 to get access to Microsoft Graph using MSAL Python.For more information about how th eprotocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-authentication-scenarios).
27+
This sample shows how to build a Python web app that uses OAuth2 to get access to Microsoft Graph using MSAL Python. For more information about how th eprotocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-authentication-scenarios).
2828

2929
## How to run this sample
3030

3131
To run this sample, you'll need:
3232

3333
> To run this sample you will need:
34-
> - An internet connection.
3534
> - [Python 2.7+](https://www.python.org/downloads/release/python-2713/) or [Python 3+](https://www.python.org/downloads/release/python-364/)
3635
> - [Flask](http://flask.pocoo.org/), [Flask-Session](https://pythonhosted.org/Flask-Session/), [requests](https://2.python-requests.org/en/master/)
3736
> - [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
@@ -43,12 +42,12 @@ To run this sample, you'll need:
4342
From your shell or command line:
4443

4544
```Shell
46-
git clone https://github.com/Azure-Samples/https://github.com/Azure-Samples/ms-identity-python-webapp.git
45+
git clone https://github.com/Azure-Samples/ms-identity-python-webapp.git
4746
```
4847

4948
or download and extract the repository .zip file.
5049

51-
> Given that the name of the sample is quiet long, and so are the names of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
50+
> Given that the name of the sample is quiet long, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
5251
5352
### Step 2: Register the sample application with your Azure Active Directory tenant
5453

@@ -123,9 +122,9 @@ In the steps below, "ClientID" is the same as "Application ID" or "AppId".
123122
> Note: if you used the setup scripts, the changes below will have been applied for you
124123
125124
1. Open the `app_config.py` file
126-
1. Find the app key `tenant-name` and replace the existing value with your Azure AD tenant name.
127-
1. Find the app key `client-secret-obtained-during-app-registration` and replace the existing value with the key you saved during the creation of the `python-webapp` app, in the Azure portal.
128-
1. Find the app key `client-id-as-obtained-during-app-registration` and replace the existing value with the application ID (clientId) of the `python-webapp` application copied from the Azure portal.
125+
1. Find the app key `Enter_the_Tenant_Name_Here` and replace the existing value with your Azure AD tenant name.
126+
1. Find the app key `Enter_the_Client_Secret_Here` and replace the existing value with the key you saved during the creation of the `python-webapp` app, in the Azure portal.
127+
1. Find the app key `Enter_the_Application_Id_here` and replace the existing value with the application ID (clientId) of the `python-webapp` application copied from the Azure portal.
129128

130129

131130
### Step 4: Run the sample
@@ -170,7 +169,7 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
170169

171170
## More information
172171

173-
For more information, see MSAL.Python's [conceptual documentation]("https://msal-python.readthedocs.io/en/latest/"):
172+
For more information, see MSAL.Python's [conceptual documentation]("https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki"):
174173

175174

176175
For more information about web apps scenarios on the Microsoft identity platform see [Scenario: Web app that calls web APIs](https://docs.microsoft.com/en-us/azure/active-directory/develop/scenario-web-app-call-api-overview)

0 commit comments

Comments
 (0)