Skip to content

Commit 04724ed

Browse files
committed
Edits
1 parent e9de3f8 commit 04724ed

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

articles/search/search-security-trimming-for-azure-search-with-aad.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@ Your application must also be registered with Azure AD as a multi-tenant app, as
3939

4040
This step integrates your application with Azure AD for the purpose of accepting sign-ins of user and group accounts. If you aren't a tenant admin in your organization, you might need to [create a new tenant](../active-directory/develop/quickstart-create-new-tenant.md) to perform the following steps.
4141

42-
1. In [Azure portal](https://portal.azure.com), find the Azure Active Directory resource for your subscription.
42+
1. In [Azure portal](https://portal.azure.com), find the Azure Active Directory tenant.
4343

4444
1. On the left, under **Manage**, select **App registrations**, and then select **New registration**.
4545

46-
1. Give the registration a name, perhaps a name that is similar to the search application name. Select **Register**.
46+
1. Give the registration a name, perhaps a name that's similar to the search application name. Select **Register**.
4747

48-
1. Once the app registration is created, copy the Application ID. You'll need to provide this string to your application.
48+
1. Once the app registration is created, copy the Application (client) ID. You'll need to provide this string to your application.
4949

5050
If you're stepping through the [DotNetHowToSecurityTrimming](https://github.com/Azure-Samples/search-dotnet-getting-started/tree/master/DotNetHowToSecurityTrimming), paste this value into the **app.config** file.
5151

@@ -63,7 +63,9 @@ This step integrates your application with Azure AD for the purpose of accepting
6363
- **Group.ReadWrite.All**
6464
- **User.ReadWrite.All**
6565

66-
Microsoft Graph provides an API that allows programmatic access to Azure AD through a REST API. The code sample for this walkthrough uses the permissions to call the Microsoft Graph API for creating groups, users, and associations. The APIs are also used to cache group identifiers for faster filtering.
66+
Microsoft Graph provides an API that allows programmatic access to Azure AD through a REST API. The code sample for this walkthrough uses the permissions to call the Microsoft Graph API for creating groups, users, and associations. The APIs are also used to cache group identifiers for faster filtering.
67+
68+
1. Select **Grant admin consent for <tenant-name>** to complete the consent process.
6769

6870
## Create users and groups
6971

articles/search/search-security-trimming-for-azure-search.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,14 +42,14 @@ A better solution is using the `search.in` function for security filters, as des
4242
```json
4343
{
4444
"Employee-1": {
45-
"id": "000-0000-00-0-00000-1",
45+
"id": "100-1000-10-1-10000-1",
4646
"name": "Abram",
4747
"salary": 75000,
4848
"married": true,
4949
"security_id": "10011"
5050
},
5151
"Employee-2": {
52-
"id": "000-0000-00-0-00000-2",
52+
"id": "200-2000-20-2-20000-2",
5353
"name": "Adams",
5454
"salary": 75000,
5555
"married": true,

0 commit comments

Comments
 (0)