Skip to content

Commit 31b7159

Browse files
committed
fix busted anchor links
1 parent 9bbbeb5 commit 31b7159

7 files changed

+65
-78
lines changed

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Acquire tokens to call a web API (daemon app) - The Microsoft identity platform | Azure
2+
title: Acquire tokens to call a web API (daemon app) - The Microsoft identity platform
33
description: Learn how to build a daemon app that calls web APIs (acquiring tokens)
44
services: active-directory
55
author: jmprieur
@@ -8,13 +8,9 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
11-
ms.workload: identity
12-
ms.date: 10/30/2019
11+
ms.date: 05/12/2022
1312
ms.author: jmprieur
14-
ms.custom: aaddev
15-
1613
#Customer intent: As an application developer, I want to know how to write a daemon app that can call web APIs by using the Microsoft identity platform.
17-
1814
---
1915

2016
# Daemon app that calls web APIs - acquire a token
@@ -42,7 +38,7 @@ final static String GRAPH_DEFAULT_SCOPE = "https://graph.microsoft.com/.default"
4238

4339
```JavaScript
4440
const tokenRequest = {
45-
scopes: [process.env.GRAPH_ENDPOINT + '.default'], // e.g. 'https://graph.microsoft.com/.default'
41+
scopes: [process.env.GRAPH_ENDPOINT + '.default'], // e.g. 'https://graph.microsoft.com/.default'
4642
};
4743
```
4844

@@ -252,9 +248,7 @@ Content: {
252248

253249
### Are you calling your own API?
254250

255-
If you call your own web API and couldn't add an app permission to the app registration for your daemon app, did you expose an app role in your web API?
256-
257-
For details, see [Exposing application permissions (app roles)](scenario-protected-web-api-app-registration.md#exposing-application-permissions-app-roles) and, in particular, [Ensuring that Azure AD issues tokens for your web API to only allowed clients](scenario-protected-web-api-app-registration.md#ensuring-that-azure-ad-issues-tokens-for-your-web-api-to-only-allowed-clients).
251+
If your daemon app calls your own web API and you weren't able to add an app permission to the daemon's app registration, you need to [Add app roles to the web API's app registration](howto-add-app-roles-in-azure-ad-apps.md).
258252

259253
## Next steps
260254

articles/active-directory/develop/scenario-daemon-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ A daemon application can request only application permissions to APIs (not deleg
3636

3737
![App permissions and admin consent](media/scenario-daemon-app/app-permissions-and-admin-consent.png)
3838

39-
The web API that you want to call needs to define _Application permissions (app roles)_, not delegated permissions. For details on how to expose such an API, see [Protected web API: App registration - when your web API is called by a daemon app](scenario-protected-web-api-app-registration.md#if-your-web-api-is-called-by-a-daemon-app).
39+
The web API that you want to call needs to define _Application permissions (app roles)_, not delegated permissions. For details on how to expose such an API, see [Protected web API: App registration - when your web API is called by a daemon app](scenario-protected-web-api-app-registration.md#if-your-web-api-is-called-by-a-service-or-daemon-app).
4040

4141
Daemon applications require that a tenant admin pre-consent to the application calling the web API. Tenant admins provide this consent on the same **API permission** page by selecting **Grant admin consent to _our organization_**
4242

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
title: Configure protected web API apps | Azure
3-
titleSuffix: Microsoft identity platform
2+
title: Configure protected web API apps
43
description: Learn how to build a protected web API and configure your application's code.
54
services: active-directory
65
author: jmprieur
@@ -9,10 +8,8 @@ manager: CelesteDG
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual
12-
ms.workload: identity
13-
ms.date: 07/15/2020
11+
ms.date: 05/12/2022
1412
ms.author: jmprieur
15-
ms.custom: aaddev
1613
#Customer intent: As an application developer, I want to know how to write a protected web API using the Microsoft identity platform for developers.
1714
---
1815

@@ -90,7 +87,7 @@ This section describes how to configure a bearer token.
9087

9188
#### Case where you used a custom App ID URI for your web API
9289

93-
If you've accepted the App ID URI proposed by the app registration portal, you don't need to specify the audience (see [Application ID URI and scopes](scenario-protected-web-api-app-registration.md#application-id-uri-and-scopes)). Otherwise, you should add an `Audience` property whose value is the App ID URI for your web API.
90+
If you've accepted the default App ID URI proposed by the Azure portal, you don't need to specify the audience (see [Application ID URI and scopes](scenario-protected-web-api-app-registration.md#scopes-and-the-application-id-uri)). Otherwise, add an `Audience` property whose value is the App ID URI for your web API.
9491

9592
```Json
9693
{

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ To expose delegated permissions, or _scopes_, follow the steps in [Configure an
7575

7676
If you're following along with the web API scenario described in this set of articles, use these settings:
7777

78-
- **Application ID URI**: Accept the proposed application ID URI (_api://<clientId>_) (if prompted)
78+
- **Application ID URI**: Accept the proposed application ID URI (_api://\<clientId\>_) (if prompted)
7979
- **Scope name**: _access_as_user_
8080
- **Who can consent**: _Admins and users_
8181
- **Admin consent display name**: _Access TodoListService as a user_
@@ -104,10 +104,9 @@ To add another layer of security, an Azure AD tenant administrator can configure
104104
To increase security by restricting token issuance only to client apps that have been assigned app roles:
105105

106106
1. In the Azure portal, select your app in **Azure Active Directory** > **App registrations**.
107-
1. On application's overview page, select **Managed application in local directory** (it might be ), select your application to go to its **Enterprise Application Overview** page.
108-
107+
1. On the application's overview page, select its **Managed application in local directory** link to navigate to its **Enterprise Application Overview** page.
109108
1. Under **Manage**, select **Properties**.
110-
1. Set **User assignment required?** to **Yes**.
109+
1. Set **Assignment required?** to **Yes**.
111110
1. Select **Save**.
112111

113112
Azure AD will now check for app role assignments of client applications that request access tokens for your web API. If a client app hasn't been assigned any app roles, Azure AD returns an error message to the client similar to _invalid_client: AADSTS501051: Application \<application name\> isn't assigned to a role for the \<web API\>_.

articles/active-directory/develop/scenario-protected-web-api-verification-scope-app-roles.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
title: Verify scopes and app roles protected web API | Azure
3-
titleSuffix: Microsoft identity platform
2+
title: Verify scopes and app roles protected web API
43
description: Verify that the API is only called by applications on behalf of users who have the right scopes and by daemon apps that have the right application roles.
54
services: active-directory
65
author: jmprieur
@@ -9,10 +8,8 @@ manager: CelesteDG
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual
12-
ms.workload: identity
13-
ms.date: 10/19/2021
11+
ms.date: 05/12/2022
1412
ms.author: jmprieur
15-
ms.custom: aaddev
1613
#Customer intent: As an application developer, I want to learn how to write a protected web API using the Microsoft identity platform for developers.
1714
---
1815

@@ -256,7 +253,7 @@ For a full version of `ValidateScopes` for ASP.NET Core, [_ScopesRequiredHttpCon
256253

257254
## Verify app roles in APIs called by daemon apps
258255

259-
If your web API is called by a [daemon app](scenario-daemon-overview.md), that app should require an application permission to your web API. As shown in [Exposing application permissions (app roles)](./scenario-protected-web-api-app-registration.md#exposing-application-permissions-app-roles), your API exposes such permissions. One example is the `access_as_application` app role.
256+
If your web API is called by a [daemon app](scenario-daemon-overview.md), that app should require an application permission to your web API. As shown in [Exposing application permissions (app roles)](./scenario-protected-web-api-app-registration.md#expose-application-permissions-app-roles), your API exposes such permissions. One example is the `access_as_application` app role.
260257

261258
You now need to have your API verify that the token it receives contains the `roles` claim and that this claim has the expected value. The verification code is similar to the code that verifies delegated permissions, except that your controller action tests for roles instead of scopes:
262259

@@ -335,7 +332,7 @@ For a full version of `ValidateAppRole` for ASP.NET Core, see [_RolesRequiredHtt
335332

336333
Users can also use roles claims in user assignment patterns, as shown in [How to add app roles in your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md). If the roles are assignable to both, checking roles will let apps sign in as users and users sign in as apps. We recommend that you declare different roles for users and apps to prevent this confusion.
337334

338-
If you have defined app roles with user/group, then roles claim can also be verified in the API along with scopes. The verification logic of the app roles in this scenario remains same as if API is called by the daemon apps since there is no differentiation in the role claim for user/group and application.
335+
If you have defined app roles with user/group, then roles claim can also be verified in the API along with scopes. The verification logic of the app roles in this scenario remains same as if API is called by the daemon apps since there is no differentiation in the role claim for user/group and application.
339336

340337
### Accepting app-only tokens if the web API should be called only by daemon apps
341338

articles/active-directory/develop/test-setup-environment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: develop
1111
ms.topic: how-to
1212
ms.date: 05/11/2022
1313
ms.author: arcrowe
14-
ms.reviewer: marsma
14+
ms.reviewer: marsma, ryanwi
1515
# Customer intent: As a developer, I want to set up a test environment so that I can test my app integrated with Microsoft identity platform.
1616
---
1717

@@ -21,9 +21,9 @@ To help move your app through the development, test, and production lifecycle, s
2121

2222
## Dedicated test tenant or production Azure AD tenant?
2323

24-
Your first task is to decide between using Azure AD tenant dedicated to testing or using your production tenant as your test environment.
24+
Your first task is to decide between using an Azure AD tenant dedicated to testing or your production tenant as your test environment.
2525

26-
Using a production tenant can make some aspects application testing easier, but it requires the right level of isolation between test and production resources. Isolation is especially important for high-privilege scenarios.
26+
Using a production tenant can make some aspects of application testing easier, but it requires the right level of isolation between test and production resources. Isolation is especially important for high-privilege scenarios.
2727

2828
Don't use your production Azure AD tenant if:
2929

@@ -34,7 +34,7 @@ Don't use your production Azure AD tenant if:
3434
- Policies are enabled in your production tenant that require user interaction during authentication. For example, if multi-factor authentication is required for all users, you can't use automated sign-ins for integration testing.
3535
- Adding non-production resources and/or workload to your production tenant would [exceed service or throttling limits](test-throttle-service-limits.md) for the tenant.
3636

37-
If _any_ of these restrictions apply, set up a [test environment in a separate tenant](#set-up-a-test-environment-in-a-separate-tenant).
37+
If any of these restrictions apply, set up a [test environment in a separate tenant](#set-up-a-test-environment-in-a-separate-tenant).
3838

3939
If none of these restrictions apply, you can set up a [test environment in your production tenant](#set-up-a-test-environment-in-your-production-tenant). Be aware that global administrators in your production tenant can access its resources and change its configuration at any time. To prevent access to any test resources or configuration, put that data in a separate tenant.
4040

0 commit comments

Comments
 (0)