You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-security-trimming-for-azure-search-with-aad.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,13 +39,13 @@ Your application must also be registered with Azure AD as a multi-tenant app, as
39
39
40
40
This step integrates your application with Azure AD for the purpose of accepting sign-ins of user and group accounts. If you aren't a tenant admin in your organization, you might need to [create a new tenant](../active-directory/develop/quickstart-create-new-tenant.md) to perform the following steps.
41
41
42
-
1. In [Azure portal](https://portal.azure.com), find the Azure Active Directory resource for your subscription.
42
+
1. In [Azure portal](https://portal.azure.com), find the Azure Active Directory tenant.
43
43
44
44
1. On the left, under **Manage**, select **App registrations**, and then select **New registration**.
45
45
46
-
1. Give the registration a name, perhaps a name that is similar to the search application name. Select **Register**.
46
+
1. Give the registration a name, perhaps a name that's similar to the search application name. Select **Register**.
47
47
48
-
1. Once the app registration is created, copy the Application ID. You'll need to provide this string to your application.
48
+
1. Once the app registration is created, copy the Application (client) ID. You'll need to provide this string to your application.
49
49
50
50
If you're stepping through the [DotNetHowToSecurityTrimming](https://github.com/Azure-Samples/search-dotnet-getting-started/tree/master/DotNetHowToSecurityTrimming), paste this value into the **app.config** file.
51
51
@@ -63,7 +63,9 @@ This step integrates your application with Azure AD for the purpose of accepting
63
63
-**Group.ReadWrite.All**
64
64
-**User.ReadWrite.All**
65
65
66
-
Microsoft Graph provides an API that allows programmatic access to Azure AD through a REST API. The code sample for this walkthrough uses the permissions to call the Microsoft Graph API for creating groups, users, and associations. The APIs are also used to cache group identifiers for faster filtering.
66
+
Microsoft Graph provides an API that allows programmatic access to Azure AD through a REST API. The code sample for this walkthrough uses the permissions to call the Microsoft Graph API for creating groups, users, and associations. The APIs are also used to cache group identifiers for faster filtering.
67
+
68
+
1. Select **Grant admin consent for <tenant-name>** to complete the consent process.
0 commit comments