Skip to content

Commit 0b2922c

Browse files
authored
Merge pull request #219555 from cilwerner/content-health-bulk
[msid][content-health] (ADO-2011508, 2011509, 2011529 2011532)
2 parents 55e58e4 + 5287e99 commit 0b2922c

File tree

4 files changed

+16
-17
lines changed

4 files changed

+16
-17
lines changed

articles/active-directory/develop/msal-net-migration.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 06/08/2021
12+
ms.date: 11/25/2022
1313
ms.author: jmprieur
1414
ms.reviewer: saeeda
15-
ms.custom: "devx-track-csharp, aaddev, has-adal-ref"
15+
ms.custom: "devx-track-csharp, aaddev, has-adal-ref, engagement-fy23"
1616
#Customer intent: As an application developer, I want to learn why and how to migrate from ADAL.NET and MSAL.NET or Microsoft.Identity.Web libraries.
1717
---
1818

@@ -30,13 +30,13 @@ MSAL comes with benefits over ADAL. Some of these benefits are listed below:
3030
- You benefit from continuous innovation in term of security and resilience,
3131
- Your application implements the best practices in term of resilience and security.
3232

33-
**MSAL.NET or Microsoft.Identity.Web are now the recommended auth libraries to use with the Microsoft identity platform**. No new features will be implemented on ADAL.NET. The efforts are focused on improving MSAL.NET. For details see the announcement: [Update your applications to use Microsoft Authentication Library and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363)
33+
**MSAL.NET or Microsoft.Identity.Web are now the recommended auth libraries to use with the Microsoft identity platform**. No new features will be implemented on ADAL.NET. The efforts are focused on improving MSAL.NET. For details see the announcement: [Update your applications to use Microsoft Authentication Library and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363).
3434

3535
## Should you migrate to MSAL.NET or to Microsoft.Identity.Web
3636

37-
Before digging in the details of MSAL.NET vs ADAL.NET, you might want to check if you want to use MSAL.NET or a higher-level abstraction like [Microsoft.Identity.Web](microsoft-identity-web.md)
37+
Before digging in the details of MSAL.NET vs ADAL.NET, you might want to check if you want to use MSAL.NET or a higher-level abstraction like [Microsoft.Identity.Web](microsoft-identity-web.md).
3838

39-
For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.Web?](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/MSAL.NET-or-Microsoft.Identity.Web)
39+
For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/MSAL.NET-or-Microsoft.Identity.Web).
4040

4141
!["Block diagram explaining how to choose if you need to use MSAL.NET and Microsoft.Identity.Web or both when migrating from ADAL.NET"](media/msal-net-migration/decision-diagram.png)
4242

articles/active-directory/develop/scenario-spa-call-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 09/27/2021
12+
ms.date: 11/25/2022
1313
ms.author: owenrichards
14-
ms.custom: aaddev
14+
ms.custom: aaddev, engagement-fy23
1515
#Customer intent: As an application developer, I want to know how to write a single-page application by using the Microsoft identity platform.
1616
---
1717

1818
# Single-page application: Call a web API
1919

20-
We recommend that you call the `acquireTokenSilent` method to acquire or renew an access token before you call a web API. After you have a token, you can call a protected web API.
20+
We recommend that you call the `acquireTokenSilent` method to acquire or renew an access token before calling a web API. After you have a token, you can call a protected web API.
2121

2222
## Call a web API
2323

articles/active-directory/develop/scenario-web-api-call-api-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/24/2022
12+
ms.date: 11/25/2022
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, engagement-fy23
1515
#Customer intent: As an application developer, I want to know how to write a web API that calls web APIs by using the Microsoft identity platform.

articles/active-directory/develop/single-sign-out-saml-protocol.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/24/2021
11+
ms.date: 11/25/2022
1212
ms.author: kenwith
13-
ms.custom: aaddev
13+
ms.custom: aaddev, engagement-fy23
1414
ms.reviewer: paulgarn
1515
---
1616

@@ -24,10 +24,8 @@ The following diagram shows the workflow of the Azure AD single sign-out process
2424

2525
![Azure AD Single Sign Out Workflow](./media/single-sign-out-saml-protocol/active-directory-saml-single-sign-out-workflow.png)
2626

27-
> [!NOTE]
28-
> Per section 3.7 of the [SAML 2.0 core specification](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf), there can be multiple participants (other applications) in a session besides your application. If one of the other participants sends a `LogoutRequest` to Microsoft identity platform (the session authority), then Microsoft identity platform will send a `LogoutRequest` back to all the session participants except the participant which sent the initial `LogoutRequest`. Additionally, if one of the other participants happened to initiate sign-out at the same time, there would be a race to see which `LogoutRequest` reaches Microsoft identity platform first. As a result, an application should always be prepared to handle a `LogoutRequest`.
29-
3027
## LogoutRequest
28+
3129
The cloud service sends a `LogoutRequest` message to Azure AD to indicate that a session has been terminated. The following excerpt shows a sample `LogoutRequest` element.
3230

3331
```
@@ -37,14 +35,16 @@ The cloud service sends a `LogoutRequest` message to Azure AD to indicate that a
3735
</samlp:LogoutRequest>
3836
```
3937

40-
### LogoutRequest
4138
The `LogoutRequest` element sent to Azure AD requires the following attributes:
4239

43-
* `ID` - This identifies the sign-out request. The value of `ID` should not begin with a number. The typical practice is to append **id** to the string representation of a GUID.
40+
* `ID` - This identifies the sign-out request. The value of `ID` shouldn't begin with a number. The typical practice is to append **id** to the string representation of a GUID.
4441
* `Version` - Set the value of this element to **2.0**. This value is required.
4542
* `IssueInstant` - This is a `DateTime` string with a Coordinate Universal Time (UTC) value and [round-trip format ("o")](/dotnet/standard/base-types/standard-date-and-time-format-strings). Azure AD expects a value of this type, but doesn't enforce it.
4643

44+
Per section 3.7 of the [SAML 2.0 core specification](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf), there can be multiple participants (other applications) in a session besides your application. If one of the other participants sends a `LogoutRequest` to the Microsoft identity platform (the session authority), it will send a `LogoutRequest` back to all the session participants except the participant who sent the initial `LogoutRequest`. If another participant simultaneously initiated sign-out, there would be a race to see which `LogoutRequest` reaches Microsoft identity platform first. Therefore, an application should always be prepared to handle a `LogoutRequest`.
45+
4746
### Issuer
47+
4848
The `Issuer` element in a `LogoutRequest` must exactly match one of the **ServicePrincipalNames** in the cloud service in Azure AD. Typically, this is set to the **App ID URI** that is specified during application registration.
4949

5050
### NameID
@@ -62,7 +62,6 @@ Azure AD sends a `LogoutResponse` in response to a `LogoutRequest` element. The
6262
</samlp:LogoutResponse>
6363
```
6464

65-
### LogoutResponse
6665
Azure AD sets the `ID`, `Version` and `IssueInstant` values in the `LogoutResponse` element. It also sets the `InResponseTo` element to the value of the `ID` attribute of the `LogoutRequest` that elicited the response.
6766

6867
### Issuer

0 commit comments

Comments
 (0)