Skip to content

Commit 08ec85e

Browse files
committed
Certificates and secrets UI update
1 parent 17e5e35 commit 08ec85e

7 files changed

+8
-8
lines changed

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ You can associate the certificate credential with the client application in the
9292
### Uploading the certificate file
9393

9494
In the Azure app registration for the client application:
95-
1. Select **Certificates & secrets**.
95+
1. Select **Certificates & secrets** > **Certificates**.
9696
2. Click on **Upload certificate** and select the certificate file to upload.
9797
3. Click **Add**.
9898
Once the certificate is uploaded, the thumbprint, start date, and expiration values are displayed.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ To upload the certificate:
153153
1. Select **Azure Active Directory**.
154154
1. From **App registrations** in Azure AD, select your application.
155155
1. Select **Certificates & secrets**.
156-
1. Select **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
156+
1. Select **Certificates** > **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
157157

158158
![Select Upload certificate and select the one you want to add](./media/howto-create-service-principal-portal/upload-cert.png)
159159

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp-calls-graph.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
4242
> 1. Under **Manage**, select **Authentication**.
4343
> 1. Enter a **Front-channel logout URL** of `https://localhost:44321/signout-oidc`.
4444
> 1. Select **Save**.
45-
> 1. Under **Manage**, select **Certificates & secrets** > **New client secret**.
45+
> 1. Under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
4646
> 1. Enter a **Description**, for example `clientsecret1`.
4747
> 1. Select **In 1 year** for the secret's expiration.
4848
> 1. Select **Add** and immediately record the secret's **Value** for use in a later step. The secret value is *never displayed again* and is irretrievable by any other means. Record it in a secure location as you would any password.

articles/active-directory/develop/quickstart-v2-nodejs-webapp-msal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This quickstart uses the Microsoft Authentication Library for Node.js (MSAL Node
4343
> 1. Set the **Redirect URI** value to `http://localhost:3000/redirect`.
4444
> 1. Select **Register**.
4545
> 1. On the app **Overview** page, note the **Application (client) ID** value for later use.
46-
> 1. Under **Manage**, select **Certificates & secrets** > **New client secret**. Leave the description blank and default expiration, and then select **Add**.
46+
> 1. Under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**. Leave the description blank and default expiration, and then select **Add**.
4747
> 1. Note the value of **Client secret** for later use.
4848
4949
> [!div class="sxs-lookup" renderon="portal"]

articles/active-directory/develop/quickstart-v2-nodejs-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ In this quickstart, you download and run a code sample that demonstrates how to
4444
1. Enter a **Front-channel logout URL** `https://localhost:3000`.
4545
1. In the **Implicit grant and hybrid flows** section, select **ID tokens** as this sample requires the [Implicit grant flow](./v2-oauth2-implicit-grant-flow.md) to be enabled to sign-in the user.
4646
1. Select **Configure**.
47-
1. Under **Manage**, select **Certificates & secrets** > **New client secret**.
47+
1. Under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
4848
1. Enter a key description (for instance app secret).
4949
1. Select a key duration of either **In 1 year, In 2 years,** or **Never Expires**.
5050
1. Select **Add**. The key value will be displayed. Copy the key value and save it in a safe location for later use.

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
5757
> 1. Select **Add a platform** > **Web**.
5858
> 1. Add `http://localhost:5000/getAToken` as **Redirect URIs**.
5959
> 1. Select **Configure**.
60-
> 1. Under **Manage**, select the **Certificates & secrets** and from the **Client secrets** section, select **New client secret**.
60+
> 1. Under **Manage**, select the **Certificates & secrets** and from the **Client secrets** section, select **New client secret**.
6161
> 1. Type a key description (for instance app secret), leave the default expiration, and select **Add**.
6262
> 1. Note the **Value** of the **Client Secret** for later use.
6363
> 1. Under **Manage**, select **API permissions** > **Add a permission**.
@@ -109,7 +109,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
109109
> Where:
110110
>
111111
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
112-
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
112+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
113113
> - `Enter_the_Tenant_Name_Here` - is the **Directory (tenant) ID** value of the application you registered.
114114
115115
> [!div class="sxs-lookup" renderon="portal"]

articles/active-directory/develop/tutorial-blazor-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Under **Manage**, select **Authentication** > **Implicit grant and hybrid flows*
4141

4242
Finally, because the app calls a protected API (in this case Microsoft Graph), it needs a client secret in order to verify its identity when it requests an access token to call that API.
4343

44-
1. Within the same app registration, under **Manage**, select **Certificates & secrets**.
44+
1. Within the same app registration, under **Manage**, select **Certificates & secrets** and then **Client secrets**.
4545
2. Create a **New client secret** that never expires.
4646
3. Make note of the secret's **Value** as you will use it in the next step. You can’t access it again once you navigate away from this pane. However, you can recreate it as needed.
4747

0 commit comments

Comments
 (0)