Skip to content

Commit f948228

Browse files
authored
Update PowerShell cmdlets and OAuth flow details
1 parent 700b53d commit f948228

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

support/entra/entra-id/app-integration/error-code-aadsts50000-issuing-token-sign-in-service.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,20 +56,20 @@ Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate
5656

5757
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Application Manifest Key Credentials" lightbox="/media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
5858

59-
Alternatively, use the AzureAD PowerShell cmdlet [Get-AzureADApplicationKeyCredential](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
59+
Alternatively, use the Microsoft Graph PowerShell cmdlet [Get-MgApplication](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
6060

6161
#### Step 2: Check if symmetric key is used in service principal object
6262

6363
1. If the application is not found in the **App Registrations** page in the Azure portal, browse to the **Enterprise Applications** page.
6464
2. Locate the application, and then get the **Object ID** of the Service Principal.
65-
3. Use the AzureAD PowerShell cmdlet [Get-AzureADServicePrincipalKeyCredential](/powershell/module/azuread/get-azureadserviceprincipalkeycredential) to retrieve key credentials.
65+
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal?view=graph-powershell-1.0) to retrieve key credentials.
6666

6767
#### Step 3: Remove symmetric signing key
6868

6969
If the symmetric key exists, use:
7070

71-
- [Remove-AzureADApplicationKeyCredential](/powershell/module/azuread/remove-azureadapplicationkeycredential) to remove the symmetric key for the app registration.
72-
- [Remove-AzureADServicePrincipalKeyCredential](/powershell/module/azuread/remove-azureadserviceprincipalkeycredential) to remove the symmetric key for the service principal object.
71+
- [Remove-MgApplicationKey](/powershell/module/microsoft.graph.applications/remove-mgapplicationkey) to remove the symmetric key for the app registration.
72+
- [Remove-MgServicePrincipalKey](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipalkey) to remove the symmetric key for the service principal object.
7373

7474
If a signing key is required, use a signing certificate instead. For more information, see [SAML-based single sign-on: Configure a signing certificate](/graph/application-saml-sso-configure-api?tabs=http%2Cpowershell-script#step-6-configure-a-signing-certificate).
7575

@@ -79,7 +79,7 @@ This error can occur in the following scenario:
7979

8080
- You have a multitenant resource application registered in tenant A. This application exposes only **Application Permission** type.
8181
- In a different tenant B, you have a client application registered. In the **API permission** page for this application, you configure the permission for the resource application registered in the other tenant.
82-
- Then, you use an OAuth 2.0 On-Behalf-Of (delegation) flow to request an access token for the resource app with the `/.default` for the web API scope.
82+
- Then, you use an OAuth 2 delegated grant flow (for instance auth code grant flow) to request an access token for the resource app with the `/.default` for the web API scope.
8383

8484
### Solution for cause 5
8585

0 commit comments

Comments
 (0)