You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-user.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ In this tutorial, you learn how to:
42
42
43
43
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
44
44
45
-
In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
45
+
In the [Microsoft Entra admin center](https://entra.microsoft.com) menu, select **Applications**.
46
46
47
47
Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
48
48
@@ -208,7 +208,7 @@ public class Startup
208
208
209
209
### appsettings.json
210
210
211
-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
211
+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
212
212
213
213
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
214
214
@@ -217,9 +217,9 @@ public class Startup
217
217
"AzureAd": {
218
218
"Instance": "https://login.microsoftonline.com/",
219
219
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
220
-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221
-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222
-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
220
+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221
+
"ClientId": "[Enter the Client Id (Application ID obtained from the Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222
+
"ClientSecret": "[Copy the client secret added to the app from the Entra admin center]",
223
223
"ClientCertificates": [
224
224
],
225
225
// the following is required to handle Continuous Access Evaluation challenges
0 commit comments