Skip to content

Commit 3230157

Browse files
committed
improving article and fixing TOC
1 parent 1cb5596 commit 3230157

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@
6060
- name: .NET Core console (daemon)
6161
href: quickstart-v2-netcore-daemon.md
6262
- name: Python console daemon
63-
href: quickstart-v2-python-webapp.md
63+
href: quickstart-v2-python-daemon.md
6464
- name: ASP.NET daemon web app
6565
href: https://github.com/Azure-Samples/active-directory-dotnet-daemon-v2
6666
- name: Tutorials

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft identity platform Python daemon | Azure
3-
description: Learn how a Python process can get an access token and call an API protected by Microsoft identity platform endpoint using the app's own identity
3+
description: Learn how a Python process can get an access token and call an API protected by Microsoft identity platform endpoint, using the app's own identity
44
services: active-directory
55
documentationcenter: dev-center-name
66
author: jmprieur
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Quickstart: Acquire a token and call Microsoft Graph API from a Python console app using app's identity
2525

26-
In this quickstart, you'll learn how to write a Python application that can get an access token using the app's own identity and then call the Microsoft Graph API to display a [list of users](https://docs.microsoft.com/graph/api/user-list) in the directory. This scenario is useful for situations where headless, unattended job or a windows service needs to run with an application identity, instead of a user's identity.
26+
In this quickstart, you'll learn how to write a Python application that can get an access token using the app's own identity, and then call the Microsoft Graph API to display a [list of users](https://docs.microsoft.com/graph/api/user-list) in the directory. This scenario is useful for situations where headless, unattended job or a windows service needs to run with an application identity, instead of a user's identity.
2727

2828
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-netcore-daemon/netcore-daemon-intro.svg)
2929

@@ -84,7 +84,7 @@ To run this sample, you will need:
8484

8585
1. Extract the zip file to a local folder close to the root of the disk, for example, **C:\Azure-Samples**.
8686
1. navigate to the sub folder **1-Call-MsGraph-WithSecret"**.
87-
1. Edit **parameters.json** and replace the values of the fields `authority`, `client_id` and `secret` with the following:
87+
1. Edit **parameters.json** and replace the values of the fields `authority`, `client_id`, and `secret` with the following snippet:
8888

8989
```json
9090
"authority": "https://login.microsoftonline.com/Enter_the_Tenant_Id_Here",
@@ -110,7 +110,7 @@ To run this sample, you will need:
110110

111111
#### Step 4: Admin consent
112112

113-
If you try to run the application at this point, you'll receive *HTTP 403 - Forbidden* error: `Insufficient privileges to complete the operation`. This happens because any *app-only permission* requires Admin consent, which means that a global administrator of your directory must give consent to your application. Select one of the options below depending on your role:
113+
If you try to run the application at this point, you'll receive *HTTP 403 - Forbidden* error: `Insufficient privileges to complete the operation`. This error happens because any *app-only permission* requires Admin consent: a global administrator of your directory must give consent to your application. Select one of the options below depending on your role:
114114

115115
##### Global tenant administrator
116116

0 commit comments

Comments
 (0)