Skip to content

Commit 1eacbc2

Browse files
authored
adjust meta title, add titleSuffix per mmacy, adjust indentation for H4 section
1 parent 1426efe commit 1eacbc2

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

articles/active-directory/develop/tutorial-v2-angular.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: Angular single-page app tutorial - Microsoft identity platform | Azure
2+
title: Angular single-page app tutorial - Azure
3+
titleSuffix: Microsoft identity platform
34
description: Learn how Angular SPA applications can call an API that requires access tokens from the Microsoft identity platform endpoint
45
services: active-directory
56
documentationcenter: dev-center-name
@@ -269,27 +270,27 @@ this.authService.acquireTokenSilent(requestObj).then(function (tokenResponse) {
269270
console.log(error);
270271
});
271272
```
273+
272274
Where `scopes` contains scopes being requested to be returned in the access token for the API.
273275
274276
For example:
275277
276278
* `["user.read"]` for Microsoft Graph
277279
* `["<Application ID URL>/scope"]` for custom Web APIs (that is, `api://<Application ID>/access_as_user`)
278280
281+
#### Get a user token interactively
279282
280-
#### Get a user token interactively
281-
282-
Sometimes you need the user to interact with the Microsoft identity platform endpoint. For example:
283+
Sometimes you need the user to interact with the Microsoft identity platform endpoint. For example:
283284
284-
* Users might need to reenter their credentials because their password has expired.
285-
* Your application is requesting access to additional resource scopes that the user needs to consent to.
286-
* Two-factor authentication is required.
285+
* Users might need to reenter their credentials because their password has expired.
286+
* Your application is requesting access to additional resource scopes that the user needs to consent to.
287+
* Two-factor authentication is required.
287288
288-
The recommended pattern for most applications is to call `acquireTokenSilent` first, then catch the exception, and then call `acquireTokenPopup` (or `acquireTokenRedirect`) to start an interactive request.
289+
The recommended pattern for most applications is to call `acquireTokenSilent` first, then catch the exception, and then call `acquireTokenPopup` (or `acquireTokenRedirect`) to start an interactive request.
289290
290-
Calling `acquireTokenPopup` results in a popup sign-in window. Alternatively, `acquireTokenRedirect` redirects users to the Microsoft identity platform endpoint. In that window, users need to confirm their credentials, give consent to the required resource, or complete two-factor authentication.
291+
Calling `acquireTokenPopup` results in a popup sign-in window. Alternatively, `acquireTokenRedirect` redirects users to the Microsoft identity platform endpoint. In that window, users need to confirm their credentials, give consent to the required resource, or complete two-factor authentication.
291292
292-
```javascript
293+
```javascript
293294
const requestObj = {
294295
scopes: ["user.read"]
295296
};
@@ -300,10 +301,10 @@ For example:
300301
}).catch(function (error) {
301302
console.log(error);
302303
});
303-
```
304+
```
304305
305-
> [!NOTE]
306-
> This quickstart uses the `loginRedirect` and `acquireTokenRedirect` methods with Microsoft Internet Explorer because of a [known issue](https://github.com/AzureAD/microsoft-authentication-library-for-js/wiki/Known-issues-on-IE-and-Edge-Browser#issues) related to the handling of popup windows by Internet Explorer.
306+
> [!NOTE]
307+
> This quickstart uses the `loginRedirect` and `acquireTokenRedirect` methods with Microsoft Internet Explorer because of a [known issue](https://github.com/AzureAD/microsoft-authentication-library-for-js/wiki/Known-issues-on-IE-and-Edge-Browser#issues) related to the handling of popup windows by Internet Explorer.
307308
308309
## Log out
309310

0 commit comments

Comments
 (0)