Skip to content

Commit 13570af

Browse files
Merge pull request #228153 from Dickson-Mwendia/update-AAD-references
Update AAD mentions to Azure AD
2 parents 8e873b4 + ccb0f35 commit 13570af

6 files changed

+11
-11
lines changed

articles/active-directory/develop/daemon-quickstart-portal-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
139139
> result = app.acquire_token_silent(config["scope"], account=None)
140140
>
141141
> if not result:
142-
> logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
142+
> logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
143143
> result = app.acquire_token_for_client(scopes=config["scope"])
144144
> ```
145145
>

articles/active-directory/develop/desktop-quickstart-portal-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: "Quickstart: Sign in users and call Microsoft Graph in a Universal Windows Platform app"
33
description: In this quickstart, learn how a Universal Windows Platform (UWP) application can get an access token and call an API protected by Microsoft identity platform.
44
services: active-directory
5-
author: OwenRichards1
5+
author: Dickson-Mwendia
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: quickstart
1010
ms.workload: identity
1111
ms.date: 08/18/2022
1212
ROBOTS: NOINDEX
13-
ms.author: owenrichards
13+
ms.author: dmwendia
1414
ms.custom: aaddev, identityplatformtop40, "scenarios:getting-started", "languages:UWP", mode-api
1515
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by the Microsoft identity platform.
1616
---

articles/active-directory/develop/msal-net-migration-public-client.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
192192
// to a URL to consent: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id={clientId}&response_type=code&scope=user.read
193193
194194
// AADSTS50079: The user is required to use multi-factor authentication.
195-
// There is no mitigation - if MFA is configured for your tenant and AAD decides to enforce it,
195+
// There is no mitigation - if MFA is configured for your tenant and Azure AD decides to enforce it,
196196
// you need to fallback to an interactive flows such as AcquireTokenInteractive or AcquireTokenByDeviceCode
197197
}
198198
catch (MsalServiceException ex)
@@ -210,7 +210,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
210210
catch (MsalClientException ex)
211211
{
212212
// Error Code: unknown_user Message: Could not identify logged in user
213-
// Explanation: the library was unable to query the current Windows logged-in user or this user is not AD or AAD
213+
// Explanation: the library was unable to query the current Windows logged-in user or this user is not AD or Azure AD
214214
// joined (work-place joined users are not supported).
215215
216216
// Mitigation 1: on UWP, check that the application has the following capabilities: Enterprise Authentication,
@@ -222,7 +222,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
222222
// Error Code: integrated_windows_auth_not_supported_managed_user
223223
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
224224
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
225-
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
225+
// Azure AD ("federated" users) can benefit from this non-interactive method of authentication.
226226
// Mitigation: Use interactive authentication
227227
}
228228
}
@@ -394,7 +394,7 @@ static async Task<AuthenticationResult> GetATokenForGraph()
394394
}
395395
catch (MsalUiRequiredException ex)
396396
{
397-
// No token found in the cache or AAD insists that a form interactive auth is required (e.g. the tenant admin turned on MFA)
397+
// No token found in the cache or Azure AD insists that a form interactive auth is required (e.g. the tenant admin turned on MFA)
398398
// If you want to provide a more complex user experience, check out ex.Classification
399399
400400
return await AcquireByDeviceCodeAsync(pca);

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
138138
> result = app.acquire_token_silent(config["scope"], account=None)
139139
>
140140
> if not result:
141-
> logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
141+
> logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
142142
> result = app.acquire_token_for_client(scopes=config["scope"])
143143
> ```
144144
>

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ result = None
175175
result = app.acquire_token_silent(config["scope"], account=None)
176176

177177
if not result:
178-
logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
178+
logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
179179
result = app.acquire_token_for_client(scopes=config["scope"])
180180

181181
if "access_token" in result:

articles/active-directory/develop/scenario-daemon-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ When you build a confidential client with client secrets, the [parameters.json](
105105
"authority": "https://login.microsoftonline.com/<your_tenant_id>",
106106
"client_id": "your_client_id",
107107
"scope": [ "https://graph.microsoft.com/.default" ],
108-
"secret": "The secret generated by AAD during your confidential app registration",
108+
"secret": "The secret generated by Azure AD during your confidential app registration",
109109
"endpoint": "https://graph.microsoft.com/v1.0/users"
110110
}
111111
```
@@ -117,7 +117,7 @@ When you build a confidential client with certificates, the [parameters.json](ht
117117
"authority": "https://login.microsoftonline.com/<your_tenant_id>",
118118
"client_id": "your_client_id",
119119
"scope": [ "https://graph.microsoft.com/.default" ],
120-
"thumbprint": "790E... The thumbprint generated by AAD when you upload your public cert",
120+
"thumbprint": "790E... The thumbprint generated by Azure AD when you upload your public cert",
121121
"private_key_file": "server.pem",
122122
"endpoint": "https://graph.microsoft.com/v1.0/users"
123123
}

0 commit comments

Comments
 (0)