Skip to content

Commit 0439311

Browse files
committed
Updates for Entra admin center
1 parent fe9a771 commit 0439311

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-user.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ In this tutorial, you learn how to:
4242

4343
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
4444

45-
In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
45+
In the [Microsoft Entra admin center](https://entra.microsoft.com) menu, select **Applications**.
4646

4747
Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
4848

@@ -208,7 +208,7 @@ public class Startup
208208

209209
### appsettings.json
210210

211-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
211+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
212212

213213
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
214214

@@ -217,9 +217,9 @@ public class Startup
217217
"AzureAd": {
218218
"Instance": "https://login.microsoftonline.com/",
219219
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
220-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
220+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221+
"ClientId": "[Enter the Client Id (Application ID obtained from the Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222+
"ClientSecret": "[Copy the client secret added to the app from the Entra admin center]",
223223
"ClientCertificates": [
224224
],
225225
// the following is required to handle Continuous Access Evaluation challenges

0 commit comments

Comments
 (0)