Skip to content

Commit 56e2395

Browse files
authored
Merge pull request #8442 from MicrosoftDocs/genlin-patch-8
Add include for support contact
2 parents 584b513 + 030061a commit 56e2395

File tree

4 files changed

+14
-3
lines changed

4 files changed

+14
-3
lines changed

support/entra/entra-id/app-integration/enable-msal4j-logging-spring-boot-webapp.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,3 +87,9 @@ Example configuration:
8787
If the app is configured correctly, the logging output should resemble the following output.
8888

8989
:::image type="content" source="media/enable-msal4j-logging-spring-boot-webapp/log-sample.png" alt-text="Diagram that shows logging output." border="true" lightbox="media/enable-msal4j-logging-spring-boot-webapp/log-sample.png":::
90+
91+
[!INCLUDE [third-party-disclaimer](../../../includes/third-party-disclaimer.md)]
92+
93+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
94+
95+

support/entra/entra-id/app-integration/error-code-aadsts50173-grant-expired-revoked.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,3 +52,5 @@ If the application isn't using MSAL, follow this guidance to [handle errors and
5252
For a full list of authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/entra/identity-platform/reference-error-codes).
5353

5454
To investigate individual errors, go to [https://login.microsoftonline.com/error](https://login.microsoftonline.com/error).
55+
56+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/entra/entra-id/app-integration/troubleshoot-authorization-requestdenied-graph-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,8 @@ This error typically occurs because the user or app doesn't have sufficient perm
2222
- The appropriate Microsoft Entra RBAC role for the required access level. For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
2323
- The necessary API permissions to access Microsoft Graph.
2424

25-
2625
## Troubleshooting Microsoft Graph API by using Postman
2726

28-
2927
### Step 1: Assign Microsoft Entra RBAC role to the app registration (Service Principal)
3028

3129
1. Log in to the [Azure portal](https://portal.azure.com), and go to **Microsoft Entra ID**.
@@ -109,4 +107,6 @@ This error typically occurs because the user or app doesn't have sufficient perm
109107
1. You must also select **Grant admin consent for default directory** for the permissions. Select **Yes** to confirm that you want to grant admin consent.
110108
1. Send the PATCH request to disable a user. If the request is successful, you should receive a `204 No Content` response.
111109
112-
[!INCLUDE [third-party-disclaimer](../../../includes/third-party-disclaimer.md)]
110+
[!INCLUDE [third-party-disclaimer](../../../includes/third-party-disclaimer.md)]
111+
112+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/entra/entra-id/app-integration/troubleshoot-wif10201-no-validkey-securitytoken-mvc.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,3 +54,6 @@ The Entra ID uses a [signing key rollover mechanism](/entra/identity-platform/si
5454
## Solution
5555

5656
You can either manually update the certificate thumbprints that are in the **Web.config** file or automate the process through code. For more information, see [Best practices for keys metadata caching and validation](/entra/identity-platform/signing-key-rollover#best-practices-for-keys-metadata-caching-and-validation).
57+
58+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
59+

0 commit comments

Comments
 (0)