You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As an application developer, I want to learn why and how to migrate from ADAL.NET and MSAL.NET or Microsoft.Identity.Web libraries.
17
17
---
18
18
@@ -30,13 +30,13 @@ MSAL comes with benefits over ADAL. Some of these benefits are listed below:
30
30
- You benefit from continuous innovation in term of security and resilience,
31
31
- Your application implements the best practices in term of resilience and security.
32
32
33
-
**MSAL.NET or Microsoft.Identity.Web are now the recommended auth libraries to use with the Microsoft identity platform**. No new features will be implemented on ADAL.NET. The efforts are focused on improving MSAL.NET. For details see the announcement: [Update your applications to use Microsoft Authentication Library and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363)
33
+
**MSAL.NET or Microsoft.Identity.Web are now the recommended auth libraries to use with the Microsoft identity platform**. No new features will be implemented on ADAL.NET. The efforts are focused on improving MSAL.NET. For details see the announcement: [Update your applications to use Microsoft Authentication Library and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363).
34
34
35
35
## Should you migrate to MSAL.NET or to Microsoft.Identity.Web
36
36
37
-
Before digging in the details of MSAL.NET vs ADAL.NET, you might want to check if you want to use MSAL.NET or a higher-level abstraction like [Microsoft.Identity.Web](microsoft-identity-web.md)
37
+
Before digging in the details of MSAL.NET vs ADAL.NET, you might want to check if you want to use MSAL.NET or a higher-level abstraction like [Microsoft.Identity.Web](microsoft-identity-web.md).
38
38
39
-
For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.Web?](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/MSAL.NET-or-Microsoft.Identity.Web)
39
+
For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/MSAL.NET-or-Microsoft.Identity.Web).
40
40
41
41

Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-spa-call-api.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,15 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 09/27/2021
12
+
ms.date: 11/25/2022
13
13
ms.author: owenrichards
14
-
ms.custom: aaddev
14
+
ms.custom: aaddev, engagement-fy23
15
15
#Customer intent: As an application developer, I want to know how to write a single-page application by using the Microsoft identity platform.
16
16
---
17
17
18
18
# Single-page application: Call a web API
19
19
20
-
We recommend that you call the `acquireTokenSilent` method to acquire or renew an access token before you call a web API. After you have a token, you can call a protected web API.
20
+
We recommend that you call the `acquireTokenSilent` method to acquire or renew an access token before calling a web API. After you have a token, you can call a protected web API.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/single-sign-out-saml-protocol.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ ms.service: active-directory
8
8
ms.subservice: develop
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 08/24/2021
11
+
ms.date: 11/25/2022
12
12
ms.author: kenwith
13
-
ms.custom: aaddev
13
+
ms.custom: aaddev, engagement-fy23
14
14
ms.reviewer: paulgarn
15
15
---
16
16
@@ -24,10 +24,8 @@ The following diagram shows the workflow of the Azure AD single sign-out process
24
24
25
25

26
26
27
-
> [!NOTE]
28
-
> Per section 3.7 of the [SAML 2.0 core specification](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf), there can be multiple participants (other applications) in a session besides your application. If one of the other participants sends a `LogoutRequest` to Microsoft identity platform (the session authority), then Microsoft identity platform will send a `LogoutRequest` back to all the session participants except the participant which sent the initial `LogoutRequest`. Additionally, if one of the other participants happened to initiate sign-out at the same time, there would be a race to see which `LogoutRequest` reaches Microsoft identity platform first. As a result, an application should always be prepared to handle a `LogoutRequest`.
29
-
30
27
## LogoutRequest
28
+
31
29
The cloud service sends a `LogoutRequest` message to Azure AD to indicate that a session has been terminated. The following excerpt shows a sample `LogoutRequest` element.
32
30
33
31
```
@@ -37,14 +35,16 @@ The cloud service sends a `LogoutRequest` message to Azure AD to indicate that a
37
35
</samlp:LogoutRequest>
38
36
```
39
37
40
-
### LogoutRequest
41
38
The `LogoutRequest` element sent to Azure AD requires the following attributes:
42
39
43
-
*`ID` - This identifies the sign-out request. The value of `ID`should not begin with a number. The typical practice is to append **id** to the string representation of a GUID.
40
+
*`ID` - This identifies the sign-out request. The value of `ID`shouldn't begin with a number. The typical practice is to append **id** to the string representation of a GUID.
44
41
*`Version` - Set the value of this element to **2.0**. This value is required.
45
42
*`IssueInstant` - This is a `DateTime` string with a Coordinate Universal Time (UTC) value and [round-trip format ("o")](/dotnet/standard/base-types/standard-date-and-time-format-strings). Azure AD expects a value of this type, but doesn't enforce it.
46
43
44
+
Per section 3.7 of the [SAML 2.0 core specification](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf), there can be multiple participants (other applications) in a session besides your application. If one of the other participants sends a `LogoutRequest` to the Microsoft identity platform (the session authority), it will send a `LogoutRequest` back to all the session participants except the participant who sent the initial `LogoutRequest`. If another participant simultaneously initiated sign-out, there would be a race to see which `LogoutRequest` reaches Microsoft identity platform first. Therefore, an application should always be prepared to handle a `LogoutRequest`.
45
+
47
46
### Issuer
47
+
48
48
The `Issuer` element in a `LogoutRequest` must exactly match one of the **ServicePrincipalNames** in the cloud service in Azure AD. Typically, this is set to the **App ID URI** that is specified during application registration.
49
49
50
50
### NameID
@@ -62,7 +62,6 @@ Azure AD sends a `LogoutResponse` in response to a `LogoutRequest` element. The
62
62
</samlp:LogoutResponse>
63
63
```
64
64
65
-
### LogoutResponse
66
65
Azure AD sets the `ID`, `Version` and `IssueInstant` values in the `LogoutResponse` element. It also sets the `InResponseTo` element to the value of the `ID` attribute of the `LogoutRequest` that elicited the response.
0 commit comments