You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/certificate-credentials.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ Gh95kHCOEGq5E_ArMBbDXhwKR577scxYaoJ1P{a lot of characters here}KKJDEg"
87
87
88
88
## Register your certificate with Microsoft identity platform
89
89
90
-
You can associate the certificate credential with the client application in the Microsoft identity platform through the Azure portal using any of the following methods:
90
+
You can associate the certificate credential with the client application in the Microsoft identity platform through the Microsoft Entra admin center using any of the following methods:
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-configure-publisher-domain.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,15 +66,16 @@ If your multitenant was registered *after November 30, 2020*:
66
66
67
67
If your app was registered *before May 21, 2019*, your app's consent prompt shows *unverified*, even if you haven't set a publisher domain. We recommend that you set the publisher domain value so that users can see this information in your app's consent prompt.
68
68
69
-
## Set a publisher domain in the Azure portal
69
+
## Set a publisher domain in the Microsoft Entra admin center
To set a publisher domain for your app by using the Azure portal:
73
+
To set a publisher domain for your app by using the Microsoft Entra admin center:
74
74
75
-
1. Sign in to the [Azure portal](https://portal.azure.com).
75
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
76
76
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the portal global menu to select the tenant where the app is registered.
77
-
1. In Azure Active Directory, go to [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908). Search for and select the app you want to configure.
77
+
1. In Azure Microsoft Entra admin center browse to **Identity** > **Applications** > **App registrations**.
78
+
1. Search for and select the app you want to configure.
78
79
1. In **Overview**, in the resource menu under **Manage**, select **Branding**.
79
80
1. In **Publisher domain**, select one of the following options:
Copy file name to clipboardExpand all lines: articles/active-directory/develop/migrate-objc-adal-msal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -218,9 +218,9 @@ ADAL and MSAL coexistence between multiple applications is fully supported.
218
218
219
219
You don't need to change your existing Azure AD application to switch to MSAL and enable Azure AD accounts. However, if your ADAL-based application doesn't support brokered authentication, you'll need to register a new redirect URI for the application before you can switch to MSAL.
220
220
221
-
The redirect URI should be in this format: `msauth.<app.bundle.id>://auth`. Replace `<app.bundle.id>` with your application's bundle ID. Specify the redirect URI in the [Azure portal](https://aka.ms/MobileAppReg).
221
+
The redirect URI should be in this format: `msauth.<app.bundle.id>://auth`. Replace `<app.bundle.id>` with your application's bundle ID. Specify the redirect URI in the [Microsoft Entra admin center](https://entra.microsoft.com/?feature.broker=true#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade).
222
222
223
-
For iOS only, to support cert-based authentication, an additional redirect URI needs to be registered in your application and the Azure portal in the following format: `msauth://code/<broker-redirect-uri-in-url-encoded-form>`. For example, `msauth://code/msauth.com.microsoft.mybundleId%3A%2F%2Fauth`
223
+
For iOS only, to support cert-based authentication, an additional redirect URI needs to be registered in your application and the Microsoft Entra admin center in the following format: `msauth://code/<broker-redirect-uri-in-url-encoded-form>`. For example, `msauth://code/msauth.com.microsoft.mybundleId%3A%2F%2Fauth`
224
224
225
225
We recommend all apps register both redirect URIs.
If you'd like to continue using your existing app registration for your applications, use the Azure portal to update the registration's redirect URIs to the SPA platform. Doing so enables the authorization code flow with PKCE and CORS support for apps that use the registration (you still need to update your application's code to MSAL.js v2.x).
36
+
If you'd like to continue using your existing app registration for your applications, use the Microsoft Entra admin center to update the registration's redirect URIs to the SPA platform. Doing so enables the authorization code flow with PKCE and CORS support for apps that use the registration (you still need to update your application's code to MSAL.js v2.x).
37
37
38
38
Follow these steps for app registrations that are currently configured with **Web** platform redirect URIs:
39
39
40
-
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a> and select your **Azure Active Directory** tenant.
41
-
1.In**App registrations**, select your application, and then **Authentication**.
40
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
41
+
1.Browse to **Identity** > **Applications** >**App registrations**, select your application, and then **Authentication**.
42
42
1. In the **Web** platform tile under **Redirect URIs**, select the warning banner indicating that you should migrate your URIs.
43
43
44
44
:::image type="content" source="media/migrate-spa-implicit-to-auth-code/portal-01-implicit-warning-banner.png" alt-text="Implicit flow warning banner on web app tile in Azure portal":::
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-js-avoid-page-reloads.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ To avoid the entire app reloading again or other errors caused due to this, plea
27
27
28
28
## Specify different HTML for the iframe
29
29
30
-
Set the `redirect_uri` property on config to a simple page, that does not require authentication. You have to make sure that it matches with the `redirect_uri` registered in Azure portal. This will not affect user's login experience as MSAL saves the start page when user begins the login process and redirects back to the exact location after login is completed.
30
+
Set the `redirect_uri` property on config to a simple page, that does not require authentication. You have to make sure that it matches with the `redirect_uri` registered in Microsoft Entra admin center. This will not affect user's login experience as MSAL saves the start page when user begins the login process and redirects back to the exact location after login is completed.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-js-initializing-client-applications.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,9 @@ To learn more about the client application types and application configuration o
26
26
27
27
## Prerequisites
28
28
29
-
Before initializing an application, you first need to [register it with the Azure portal](scenario-spa-app-registration.md), establishing a trust relationship between your application and the Microsoft identity platform.
29
+
Before initializing an application, you first need to [register it in the Microsoft Entra admin center](scenario-spa-app-registration.md), establishing a trust relationship between your application and the Microsoft identity platform.
30
30
31
-
After registering your app, you'll need some or all of the following values that can be found in the Azure portal.
31
+
After registering your app, you'll need some or all of the following values that can be found in the Microsoft Entra admin center.
@@ -39,7 +39,7 @@ After registering your app, you'll need some or all of the following values that
39
39
40
40
## Initialize MSAL.js 2.x apps
41
41
42
-
Initialize the MSAL.js authentication context by instantiating a [PublicClientApplication][msal-js-publicclientapplication] with a [Configuration][msal-js-configuration] object. The minimum required configuration property is the `clientID` of the application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Azure portal.
42
+
Initialize the MSAL.js authentication context by instantiating a [PublicClientApplication][msal-js-publicclientapplication] with a [Configuration][msal-js-configuration] object. The minimum required configuration property is the `clientID` of the application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Microsoft Entra admin center.
43
43
44
44
Here's an example configuration object and instantiation of a `PublicClientApplication`:
45
45
@@ -116,7 +116,7 @@ Three outcomes are possible from the promise:
116
116
117
117
## Initialize MSAL.js 1.x apps
118
118
119
-
Initialize the MSAL 1.x authentication context by instantiating a UserAgentApplication with a configuration object. The minimum required configuration property is the `clientID` of your application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Azure portal.
119
+
Initialize the MSAL 1.x authentication context by instantiating a UserAgentApplication with a configuration object. The minimum required configuration property is the `clientID` of your application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Microsoft Entra admin center.
120
120
121
121
For authentication methods with redirect flows (loginRedirect and acquireTokenRedirect) in MSAL.js 1.2.x or earlier, you must explicitly register a callback for success or error through the `handleRedirectCallback()` method. Explicitly registering the callback is required in MSAL.js 1.2.x and earlier because redirect flows don't return promises like the methods with a pop-up experience do. Registering the callback is _optional_ in MSAL.js version 1.3.x and later.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-console-app-netcore-acquire-token.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The application can be built using either an automatic or manual configuration.
35
35
36
36
To register and automatically configure the app and then download the code sample, follow these steps:
37
37
38
-
1. Go to the [Azure portal page for app registration](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs).
38
+
1. Go to the [Microsoft Entra admin center page for app registration](https://entra.microsoft.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs).
39
39
1. Enter a name for your application and select **Register**.
40
40
1. Follow the instructions to download and automatically configure your new application in one click.
41
41
@@ -49,10 +49,9 @@ To manually configure your application and code sample, use the following proced
49
49
50
50
To register the application and add the registration information to the solution manually, follow these steps:
51
51
52
-
1. Sign in to the [Azure portal](https://portal.azure.com).
52
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
53
53
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which to register the application.
54
-
1. Search for and select **Azure Active Directory**.
55
-
1. Under **Manage**, select **App registrations** > **New registration**.
1. For **Name**, enter a name for the application. For example, enter **Daemon-console**. Users of the app will see this name, and can be changed later.
57
56
1. Select **Register** to create the application.
58
57
1. Under **Manage**, select **Certificates & secrets**.
@@ -74,7 +73,7 @@ This project can be run in either Visual Studio or Visual Studio for Mac and can
74
73
1. Extract the *.zip* file to a local folder that's close to the root of the disk to avoid errors caused by path length limitations on Windows. For example, extract to *C:\Azure-Samples*.
75
74
76
75
1. Open the solution in Visual Studio: *1-Call-MSGraph\daemon-console.sln* (optional).
77
-
1. In *appsettings.json*, replace the values of `Tenant`, `ClientId`, and `ClientSecret`. The value for the application (client) ID and the directory (tenant) ID, can be found in the app's **Overview** page on the Azure portal.
76
+
1. In *appsettings.json*, replace the values of `Tenant`, `ClientId`, and `ClientSecret`. The value for the application (client) ID and the directory (tenant) ID, can be found in the app's **Overview** page on the Microsoft Entra admin center.
78
77
79
78
```json
80
79
"TenantId": "Enter_the_Tenant_Id_Here",
@@ -94,7 +93,7 @@ Running the application now results in the output `HTTP 403 - Forbidden* error:
94
93
95
94
##### Global tenant administrator
96
95
97
-
For a global tenant administrator, go to **Enterprise applications** in the Azure portal. Select the app registration, and select **Permissions** from the **Security** section of the left pane. Then select the large button labeled **Grant admin consent for {Tenant Name}** (where **{Tenant Name}** is the name of the directory).
96
+
For a global tenant administrator, go to **Enterprise applications** in the Microsoft Entra admin center. Select the app registration, and select **Permissions** from the **Security** section of the left pane. Then select the large button labeled **Grant admin consent for {Tenant Name}** (where **{Tenant Name}** is the name of the directory).
98
97
99
98
##### Standard user
100
99
@@ -193,8 +192,8 @@ This code uses the configuration defined in the appsettings.json file:
193
192
194
193
| Element | Description |
195
194
|---------|---------|
196
-
|`ClientSecret`| The client secret created for the application in the Azure portal. |
197
-
|`ClientId`| The application (client) ID for the application registered in the Azure portal. This value can be found on the app's **Overview** page in the Azure portal. |
195
+
|`ClientSecret`| The client secret created for the application in the Microsoft Entra admin center. |
196
+
|`ClientId`| The application (client) ID for the application registered in the Microsoft Entra admin center. This value can be found on the app's **Overview** page in the Microsoft Entra admin center. |
198
197
|`Instance`| (Optional) The security token service (STS) could instance endpoint for the app to authenticate. It's usually `https://login.microsoftonline.com/` for the public cloud.|
199
198
|`TenantId`| Name of the tenant or the tenant ID.|
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-daemon-app-python-acquire-token.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,10 +37,9 @@ To run this sample, you need:
37
37
38
38
To register your application and add the app's registration information to your solution manually, follow these steps:
39
39
40
-
1. Sign in to the [Azure portal](https://portal.azure.com).
40
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
41
41
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
42
-
1. Search for and select **Azure Active Directory**.
43
-
1. Under **Manage**, select **App registrations** > **New registration**.
1. Enter a **Name** for your application, for example `Daemon-console`. Users of your app might see this name, and you can change it later.
45
44
1. Select **Register**.
46
45
1. Under **Manage**, select **Certificates & secrets**.
@@ -70,7 +69,7 @@ To register your application and add the app's registration information to your
70
69
-`Enter_the_Client_Secret_Here` - replace this value with the client secret created on step 1.
71
70
72
71
> [!TIP]
73
-
> To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page in the Azure portal. To generate a new key, go to **Certificates & secrets** page.
72
+
> To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page in the Microsoft Entra admin center. To generate a new key, go to **Certificates & secrets** page.
74
73
75
74
76
75
#### Step 4: Admin consent
@@ -79,7 +78,7 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
79
78
80
79
##### Global tenant administrator
81
80
82
-
If you're a global tenant administrator, go to **API Permissions** page in **App registrations** in the Azure portal and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
81
+
If you're a global tenant administrator, go to **API Permissions** page in **App registrations** in the Microsoft Entra admin center and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
|`config["secret"]`| Is the client secret created for the application in Azure portal. |
148
-
|`config["client_id"]`| Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
146
+
|`config["secret"]`| Is the client secret created for the application in Microsoft Entra admin center. |
147
+
|`config["client_id"]`| Is the **Application (client) ID** for the application registered in the Microsoft Entra admin center. You can find this value in the app's **Overview** page in the Microsoft Entra admin center. |
149
148
|`config["authority"]`| The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant ID.|
150
149
151
150
For more information, please see the [reference documentation for `ConfidentialClientApplication`](https://msal-python.readthedocs.io/en/latest/#confidentialclientapplication).
@@ -165,7 +164,7 @@ if not result:
165
164
166
165
|Where:| Description |
167
166
|---------|---------|
168
-
|`config["scope"]`| Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
167
+
|`config["scope"]`| Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Microsoft Entra admin center (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Microsoft Entra admin center.|
169
168
170
169
For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
0 commit comments