Skip to content

Commit 39efa0f

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a84698f + 60b6b3e commit 39efa0f

File tree

201 files changed

+5931
-3763
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

201 files changed

+5931
-3763
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56373,6 +56373,11 @@
5637356373
"redirect_url": "/azure/communication-services/quickstarts/identity/service-principal-from-cli",
5637456374
"redirect_document_id": false
5637556375
},
56376+
{
56377+
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/calling-client-samples.md",
56378+
"redirect_url": "/azure/communication-services/quickstarts/voice-video-calling/getting-started-with-calling",
56379+
"redirect_document_id": false
56380+
},
5637656381
{
5637756382
"source_path_from_root": "/articles/virtual-desktop/teams-on-wvd.md",
5637856383
"redirect_url": "/azure/virtual-desktop/teams-on-avd",

articles/active-directory/app-provisioning/on-premises-ecma-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ After waiting, check your data source to see if new users are being provisioned.
163163

164164
1. Use the provisioning logs to determine which users were provisioned successfully or unsuccessfully.
165165
1. Build custom alerts, dashboards, and queries by using the Azure Monitor integration.
166-
1. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about [quarantine states](https://github.com/MicrosoftDocs/azure-docs-pr/compare/application-provisioning-quarantine-status.md?expand=1).
166+
1. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about [quarantine states](https://github.com/MicrosoftDocs/azure-docs-pr/blob/master/articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md).
167167

168168
## Next steps
169169

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following core requirements apply:
9494
|`https://enterpriseregistration.windows.net`|Azure AD Password Protection functionality|
9595

9696
> [!NOTE]
97-
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide#microsoft-365-common-and-office-online).
97+
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
9898
9999
### Azure AD Password Protection DC agent
100100

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Administrators can select published authentication contexts in their Conditional
172172

173173
For more information about authentication context use in applications, see the following articles.
174174

175-
- [Microsoft Information Protection sensitivity labels to protect SharePoint sites](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-worldwide#more-information-about-the-dependencies-for-the-authentication-context-option&preserve-view=true)
175+
- [Microsoft Information Protection sensitivity labels to protect SharePoint sites](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#more-information-about-the-dependencies-for-the-authentication-context-option)
176176
- [Microsoft Cloud App Security](/cloud-app-security/session-policy-aad?branch=pr-en-us-2082#require-step-up-authentication-authentication-context)
177177
- [Custom applications](../develop/developer-guide-conditional-access-authentication-context.md)
178178

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,8 @@
365365
href: msal-net-migration.md
366366
- name: Migrate confidential client apps to MSAL.NET
367367
href: msal-net-migration-confidential-client.md
368+
- name: Migrate public client apps to MSAL.NET
369+
href: msal-net-migration-public-client.md
368370
- name: Migrate Xamarin Android app using broker to MSAL.NET
369371
href: msal-net-migration-android-broker.md
370372
- name: Migrate Xamarin iOS app using broker to MSAL.NET
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Common steps for public client migration to MSAL
3+
description: Include file that explains the common steps you need to take for all public client apps when it comes to migration from ADAL to MSAL.
4+
services: active-directory
5+
author: maliksahil
6+
manager: CelesteDG
7+
8+
ms.service: active-directory
9+
ms.subservice: develop
10+
ms.workload: identity
11+
ms.topic: include
12+
ms.date: 09/08/2021
13+
ms.author: sahmalik
14+
ms.reviewer: jmprieur
15+
ms.custom: aaddev
16+
---
17+
18+
The following steps for updating code apply across all the confidential client scenarios:
19+
20+
1. Add the MSAL.NET namespace in your source code: `using Microsoft.Identity.Client;`.
21+
2. Instead of instantiating `AuthenticationContext`, use `PublicClientApplicationBuilder.Create` to instantiate `IPublicClientApplication`.
22+
3. Instead of the `resourceId` string, MSAL.NET uses scopes. Because applications that use ADAL.NET are preauthorized, you can always use the following scopes: `new string[] { $"{resourceId}/.default" }`.
23+
4. Replace the call to `AuthenticationContext.AcquireTokenAsync` with a call to `IPublicClientApplication.AcquireTokenXXX`, where *XXX* depends on your scenario.

0 commit comments

Comments
 (0)