Skip to content

Commit 06c106f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into p2sali
2 parents 22d2827 + 8c67675 commit 06c106f

File tree

218 files changed

+2251
-1189
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

218 files changed

+2251
-1189
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15205,11 +15205,6 @@
1520515205
"redirect_url": "/azure/machine-learning/how-to-create-labeling-projects",
1520615206
"redirect_document_id": true
1520715207
},
15208-
{
15209-
"source_path": "articles/machine-learning/service/how-to-create-portal-experiments.md",
15210-
"redirect_url": "/azure/machine-learning/tutorial-first-experiment-automated-ml",
15211-
"redirect_document_id": false
15212-
},
1521315208
{
1521415209
"source_path": "articles/machine-learning/service/how-to-create-register-datasets.md",
1521515210
"redirect_url": "/azure/machine-learning/how-to-create-register-datasets",
@@ -42800,6 +42795,11 @@
4280042795
"redirect_url": "/azure/machine-learning/service/how-to-monitor-data-drift",
4280142796
"redirect_document_id": false
4280242797
},
42798+
{
42799+
"source_path": "articles/machine-learning/service/how-to-create-portal-experiments.md",
42800+
"redirect_url": "/azure/machine-learning/how-to-use-automated-ml-for-ml-models",
42801+
"redirect_document_id": false
42802+
},
4280342803
{
4280442804
"source_path": "articles/governance/policy/samples/allowed-app-gate-sku.md",
4280542805
"redirect_url": "/azure/governance/policy/samples/index",
@@ -47037,7 +47037,7 @@
4703747037
},
4703847038
{
4703947039
"source_path": "articles/iot-central/core/tutorial-connect-device.md",
47040-
"redirect_url": "/azure/iot-central/core/tutorial-connect-device-nodejs/",
47040+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device-nodejs",
4704147041
"redirect_document_id": true
4704247042
},
4704347043
{
27.4 KB
Loading
19.9 KB
Loading
34.7 KB
Loading
44.1 KB
Loading
29.4 KB
Loading
34.2 KB
Loading
36.2 KB
Loading

articles/active-directory-b2c/quickstart-single-page-app.md

Lines changed: 16 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: quickstart
12-
ms.date: 09/12/2019
12+
ms.date: 04/04/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -22,71 +22,63 @@ Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to
2222

2323
## Prerequisites
2424

25-
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload
25+
- [Visual Studio Code](https://code.visualstudio.com/)
2626
- [Node.js](https://nodejs.org/en/download/)
2727
- Social account from Facebook, Google, or Microsoft
2828
- Code sample from GitHub: [active-directory-b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp)
2929

3030
You can [download the zip archive](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the repository:
3131

32-
```
32+
```console
3333
git clone https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp.git
3434
```
3535

3636
## Run the application
3737

3838
1. Start the server by running the following commands from the Node.js command prompt:
3939

40-
```
40+
```console
4141
cd active-directory-b2c-javascript-msal-singlepageapp
4242
npm install && npm update
43-
node server.js
43+
npm start
4444
```
4545

46-
Server.js outputs the port number it's listening on at localhost.
46+
The server started by *server.js* displays the port it's listening on:
4747

48-
```
48+
```console
4949
Listening on port 6420...
5050
```
5151

52-
2. Browse to the URL of the application. For example, `http://localhost:6420`.
53-
54-
## Sign in using your account
55-
56-
1. Click **Login** to start the workflow.
52+
1. Browse to the URL of the application. For example, `http://localhost:6420`.
5753

5854
![Single-page application sample app shown in browser](./media/quickstart-single-page-app/sample-app-spa.png)
5955

60-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
56+
## Sign in using your account
6157

62-
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
58+
1. Select **Sign In** to start the user journey.
59+
1. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, select the button of the identity provider you want to use.
6360

6461
![Sign In or Sign Up page showing identity provider buttons](./media/quickstart-single-page-app/sign-in-or-sign-up-spa.png)
6562

6663
You authenticate (sign in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
6764

68-
3. Finish the sign-in process for the identity provider.
65+
1. Finish the sign-in process for the identity provider.
6966

7067
## Access a protected API resource
7168

72-
Click **Call Web API** to have your display name returned from the Web API call as a JSON object.
69+
Select **Call API** to have your display name returned from the web API as a JSON object.
7370

7471
![Sample application in browser showing the web API response](./media/quickstart-single-page-app/call-api-spa.png)
7572

7673
The sample single-page application includes an access token in the request to the protected web API resource.
7774

78-
## Clean up resources
79-
80-
You can use your Azure AD B2C tenant if you plan to try other Azure AD B2C quickstarts or tutorials. When no longer needed, you can [delete your Azure AD B2C tenant](faq.md#how-do-i-delete-my-azure-ad-b2c-tenant).
81-
8275
## Next steps
8376

8477
In this quickstart, you used a sample single-page application to:
8578

86-
* Sign in with a custom login page
87-
* Sign in with a social identity provider
88-
* Create an Azure AD B2C account
89-
* Call a web API protected by Azure AD B2C
79+
- Sign in with a social identity provider
80+
- Create an Azure AD B2C user account (created automatically at sign-in)
81+
- Call a web API protected by Azure AD B2C
9082

9183
Get started creating your own Azure AD B2C tenant.
9284

0 commit comments

Comments
 (0)