Skip to content

Commit 11733ec

Browse files
committed
Updating portal instructions to admin center
1 parent bc72793 commit 11733ec

15 files changed

+55
-60
lines changed

articles/active-directory/develop/certificate-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Gh95kHCOEGq5E_ArMBbDXhwKR577scxYaoJ1P{a lot of characters here}KKJDEg"
8787

8888
## Register your certificate with Microsoft identity platform
8989

90-
You can associate the certificate credential with the client application in the Microsoft identity platform through the Azure portal using any of the following methods:
90+
You can associate the certificate credential with the client application in the Microsoft identity platform through the Microsoft Entra admin center using any of the following methods:
9191

9292
### Uploading the certificate file
9393

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,15 +66,16 @@ If your multitenant was registered *after November 30, 2020*:
6666

6767
If your app was registered *before May 21, 2019*, your app's consent prompt shows *unverified*, even if you haven't set a publisher domain. We recommend that you set the publisher domain value so that users can see this information in your app's consent prompt.
6868

69-
## Set a publisher domain in the Azure portal
69+
## Set a publisher domain in the Microsoft Entra admin center
7070

7171
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
7272

73-
To set a publisher domain for your app by using the Azure portal:
73+
To set a publisher domain for your app by using the Microsoft Entra admin center:
7474

75-
1. Sign in to the [Azure portal](https://portal.azure.com).
75+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
7676
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the portal global menu to select the tenant where the app is registered.
77-
1. In Azure Active Directory, go to [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908). Search for and select the app you want to configure.
77+
1. In Azure Microsoft Entra admin center browse to **Identity** > **Applications** > **App registrations**.
78+
1. Search for and select the app you want to configure.
7879
1. In **Overview**, in the resource menu under **Manage**, select **Branding**.
7980
1. In **Publisher domain**, select one of the following options:
8081

articles/active-directory/develop/migrate-objc-adal-msal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,9 +218,9 @@ ADAL and MSAL coexistence between multiple applications is fully supported.
218218

219219
You don't need to change your existing Azure AD application to switch to MSAL and enable Azure AD accounts. However, if your ADAL-based application doesn't support brokered authentication, you'll need to register a new redirect URI for the application before you can switch to MSAL.
220220

221-
The redirect URI should be in this format: `msauth.<app.bundle.id>://auth`. Replace `<app.bundle.id>` with your application's bundle ID. Specify the redirect URI in the [Azure portal](https://aka.ms/MobileAppReg).
221+
The redirect URI should be in this format: `msauth.<app.bundle.id>://auth`. Replace `<app.bundle.id>` with your application's bundle ID. Specify the redirect URI in the [Microsoft Entra admin center](https://entra.microsoft.com/?feature.broker=true#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade).
222222

223-
For iOS only, to support cert-based authentication, an additional redirect URI needs to be registered in your application and the Azure portal in the following format: `msauth://code/<broker-redirect-uri-in-url-encoded-form>`. For example, `msauth://code/msauth.com.microsoft.mybundleId%3A%2F%2Fauth`
223+
For iOS only, to support cert-based authentication, an additional redirect URI needs to be registered in your application and the Microsoft Entra admin center in the following format: `msauth://code/<broker-redirect-uri-in-url-encoded-form>`. For example, `msauth://code/msauth.com.microsoft.mybundleId%3A%2F%2Fauth`
224224

225225
We recommend all apps register both redirect URIs.
226226

articles/active-directory/develop/migrate-spa-implicit-to-auth-code.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,12 +33,12 @@ The following sections describe each step in additional detail.
3333

3434
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3535

36-
If you'd like to continue using your existing app registration for your applications, use the Azure portal to update the registration's redirect URIs to the SPA platform. Doing so enables the authorization code flow with PKCE and CORS support for apps that use the registration (you still need to update your application's code to MSAL.js v2.x).
36+
If you'd like to continue using your existing app registration for your applications, use the Microsoft Entra admin center to update the registration's redirect URIs to the SPA platform. Doing so enables the authorization code flow with PKCE and CORS support for apps that use the registration (you still need to update your application's code to MSAL.js v2.x).
3737

3838
Follow these steps for app registrations that are currently configured with **Web** platform redirect URIs:
3939

40-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> and select your **Azure Active Directory** tenant.
41-
1. In **App registrations**, select your application, and then **Authentication**.
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
41+
1. Browse to **Identity** > **Applications** > **App registrations**, select your application, and then **Authentication**.
4242
1. In the **Web** platform tile under **Redirect URIs**, select the warning banner indicating that you should migrate your URIs.
4343

4444
:::image type="content" source="media/migrate-spa-implicit-to-auth-code/portal-01-implicit-warning-banner.png" alt-text="Implicit flow warning banner on web app tile in Azure portal":::

articles/active-directory/develop/msal-js-avoid-page-reloads.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To avoid the entire app reloading again or other errors caused due to this, plea
2727

2828
## Specify different HTML for the iframe
2929

30-
Set the `redirect_uri` property on config to a simple page, that does not require authentication. You have to make sure that it matches with the `redirect_uri` registered in Azure portal. This will not affect user's login experience as MSAL saves the start page when user begins the login process and redirects back to the exact location after login is completed.
30+
Set the `redirect_uri` property on config to a simple page, that does not require authentication. You have to make sure that it matches with the `redirect_uri` registered in Microsoft Entra admin center. This will not affect user's login experience as MSAL saves the start page when user begins the login process and redirects back to the exact location after login is completed.
3131

3232
## Initialization in your main app file
3333

articles/active-directory/develop/msal-js-initializing-client-applications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ To learn more about the client application types and application configuration o
2626

2727
## Prerequisites
2828

29-
Before initializing an application, you first need to [register it with the Azure portal](scenario-spa-app-registration.md), establishing a trust relationship between your application and the Microsoft identity platform.
29+
Before initializing an application, you first need to [register it in the Microsoft Entra admin center](scenario-spa-app-registration.md), establishing a trust relationship between your application and the Microsoft identity platform.
3030

31-
After registering your app, you'll need some or all of the following values that can be found in the Azure portal.
31+
After registering your app, you'll need some or all of the following values that can be found in the Microsoft Entra admin center.
3232

3333
| Value | Required | Description |
3434
| :---------------------- | :------: | :------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
@@ -39,7 +39,7 @@ After registering your app, you'll need some or all of the following values that
3939

4040
## Initialize MSAL.js 2.x apps
4141

42-
Initialize the MSAL.js authentication context by instantiating a [PublicClientApplication][msal-js-publicclientapplication] with a [Configuration][msal-js-configuration] object. The minimum required configuration property is the `clientID` of the application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Azure portal.
42+
Initialize the MSAL.js authentication context by instantiating a [PublicClientApplication][msal-js-publicclientapplication] with a [Configuration][msal-js-configuration] object. The minimum required configuration property is the `clientID` of the application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Microsoft Entra admin center.
4343

4444
Here's an example configuration object and instantiation of a `PublicClientApplication`:
4545

@@ -116,7 +116,7 @@ Three outcomes are possible from the promise:
116116

117117
## Initialize MSAL.js 1.x apps
118118

119-
Initialize the MSAL 1.x authentication context by instantiating a UserAgentApplication with a configuration object. The minimum required configuration property is the `clientID` of your application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Azure portal.
119+
Initialize the MSAL 1.x authentication context by instantiating a UserAgentApplication with a configuration object. The minimum required configuration property is the `clientID` of your application, shown as **Application (client) ID** on the **Overview** page of the app registration in the Microsoft Entra admin center.
120120

121121
For authentication methods with redirect flows (loginRedirect and acquireTokenRedirect) in MSAL.js 1.2.x or earlier, you must explicitly register a callback for success or error through the `handleRedirectCallback()` method. Explicitly registering the callback is required in MSAL.js 1.2.x and earlier because redirect flows don't return promises like the methods with a pop-up experience do. Registering the callback is _optional_ in MSAL.js version 1.3.x and later.
122122

articles/active-directory/develop/quickstart-console-app-netcore-acquire-token.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The application can be built using either an automatic or manual configuration.
3535

3636
To register and automatically configure the app and then download the code sample, follow these steps:
3737

38-
1. Go to the [Azure portal page for app registration](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs).
38+
1. Go to the [Microsoft Entra admin center page for app registration](https://entra.microsoft.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs).
3939
1. Enter a name for your application and select **Register**.
4040
1. Follow the instructions to download and automatically configure your new application in one click.
4141

@@ -49,10 +49,9 @@ To manually configure your application and code sample, use the following proced
4949

5050
To register the application and add the registration information to the solution manually, follow these steps:
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com).
52+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
5353
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which to register the application.
54-
1. Search for and select **Azure Active Directory**.
55-
1. Under **Manage**, select **App registrations** > **New registration**.
54+
1. Browse to **Identity** > **Applications** > **App registrations**, select **New registration**.
5655
1. For **Name**, enter a name for the application. For example, enter **Daemon-console**. Users of the app will see this name, and can be changed later.
5756
1. Select **Register** to create the application.
5857
1. Under **Manage**, select **Certificates & secrets**.
@@ -74,7 +73,7 @@ This project can be run in either Visual Studio or Visual Studio for Mac and can
7473
1. Extract the *.zip* file to a local folder that's close to the root of the disk to avoid errors caused by path length limitations on Windows. For example, extract to *C:\Azure-Samples*.
7574

7675
1. Open the solution in Visual Studio: *1-Call-MSGraph\daemon-console.sln* (optional).
77-
1. In *appsettings.json*, replace the values of `Tenant`, `ClientId`, and `ClientSecret`. The value for the application (client) ID and the directory (tenant) ID, can be found in the app's **Overview** page on the Azure portal.
76+
1. In *appsettings.json*, replace the values of `Tenant`, `ClientId`, and `ClientSecret`. The value for the application (client) ID and the directory (tenant) ID, can be found in the app's **Overview** page on the Microsoft Entra admin center.
7877

7978
```json
8079
"TenantId": "Enter_the_Tenant_Id_Here",
@@ -94,7 +93,7 @@ Running the application now results in the output `HTTP 403 - Forbidden* error:
9493

9594
##### Global tenant administrator
9695

97-
For a global tenant administrator, go to **Enterprise applications** in the Azure portal. Select the app registration, and select **Permissions** from the **Security** section of the left pane. Then select the large button labeled **Grant admin consent for {Tenant Name}** (where **{Tenant Name}** is the name of the directory).
96+
For a global tenant administrator, go to **Enterprise applications** in the Microsoft Entra admin center. Select the app registration, and select **Permissions** from the **Security** section of the left pane. Then select the large button labeled **Grant admin consent for {Tenant Name}** (where **{Tenant Name}** is the name of the directory).
9897

9998
##### Standard user
10099

@@ -193,8 +192,8 @@ This code uses the configuration defined in the appsettings.json file:
193192

194193
| Element | Description |
195194
|---------|---------|
196-
| `ClientSecret` | The client secret created for the application in the Azure portal. |
197-
| `ClientId` | The application (client) ID for the application registered in the Azure portal. This value can be found on the app's **Overview** page in the Azure portal. |
195+
| `ClientSecret` | The client secret created for the application in the Microsoft Entra admin center. |
196+
| `ClientId` | The application (client) ID for the application registered in the Microsoft Entra admin center. This value can be found on the app's **Overview** page in the Microsoft Entra admin center. |
198197
| `Instance` | (Optional) The security token service (STS) could instance endpoint for the app to authenticate. It's usually `https://login.microsoftonline.com/` for the public cloud.|
199198
| `TenantId` | Name of the tenant or the tenant ID.|
200199

articles/active-directory/develop/quickstart-daemon-app-python-acquire-token.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,9 @@ To run this sample, you need:
3737

3838
To register your application and add the app's registration information to your solution manually, follow these steps:
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com).
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
4141
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
42-
1. Search for and select **Azure Active Directory**.
43-
1. Under **Manage**, select **App registrations** > **New registration**.
42+
1. Browse to **Identity** > **Applications** > **App registrations**, select **New registration**.
4443
1. Enter a **Name** for your application, for example `Daemon-console`. Users of your app might see this name, and you can change it later.
4544
1. Select **Register**.
4645
1. Under **Manage**, select **Certificates & secrets**.
@@ -70,7 +69,7 @@ To register your application and add the app's registration information to your
7069
- `Enter_the_Client_Secret_Here` - replace this value with the client secret created on step 1.
7170

7271
> [!TIP]
73-
> To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page in the Azure portal. To generate a new key, go to **Certificates & secrets** page.
72+
> To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page in the Microsoft Entra admin center. To generate a new key, go to **Certificates & secrets** page.
7473
7574

7675
#### Step 4: Admin consent
@@ -79,7 +78,7 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
7978

8079
##### Global tenant administrator
8180

82-
If you're a global tenant administrator, go to **API Permissions** page in **App registrations** in the Azure portal and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
81+
If you're a global tenant administrator, go to **API Permissions** page in **App registrations** in the Microsoft Entra admin center and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
8382

8483

8584
##### Standard user
@@ -144,8 +143,8 @@ app = msal.ConfidentialClientApplication(
144143

145144
| Where: |Description |
146145
|---------|---------|
147-
| `config["secret"]` | Is the client secret created for the application in Azure portal. |
148-
| `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
146+
| `config["secret"]` | Is the client secret created for the application in Microsoft Entra admin center. |
147+
| `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Microsoft Entra admin center. You can find this value in the app's **Overview** page in the Microsoft Entra admin center. |
149148
| `config["authority"]` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant ID.|
150149

151150
For more information, please see the [reference documentation for `ConfidentialClientApplication`](https://msal-python.readthedocs.io/en/latest/#confidentialclientapplication).
@@ -165,7 +164,7 @@ if not result:
165164

166165
|Where:| Description |
167166
|---------|---------|
168-
| `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
167+
| `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Microsoft Entra admin center (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Microsoft Entra admin center.|
169168

170169
For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
171170

0 commit comments

Comments
 (0)