You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/authentication-flows-app-scenarios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ Though we don't recommend that you use it, the [username/password flow](scenario
135
135
136
136
Using the username/password flow constrains your applications. For instance, applications can't sign in a user who needs to use multifactor authentication or the Conditional Access tool in Azure AD. Your applications also don't benefit from single sign-on. Authentication with the username/password flow goes against the principles of modern authentication and is provided only for legacy reasons.
137
137
138
-
In desktop apps, if you want the token cache to persist, you can customize the [token cache serialization](msal-net-token-cache-serialization.md). By implementing [dual token cache serialization](msal-net-token-cache-serialization.md#dual-token-cache-serialization-msal-unified-cache-and-adal-v3), you can use backward-compatible and forward-compatible token caches. These tokens support previous generations of authentication libraries. Specific libraries include Azure AD Authentication Library for .NET (ADAL.NET) version 3 and version 4.
138
+
In desktop apps, if you want the token cache to persist, you can customize the [token cache serialization](msal-net-token-cache-serialization.md). By implementing dual token cache serialization, you can use backward-compatible and forward-compatible token caches. These tokens support previous generations of authentication libraries. Specific libraries include Azure AD Authentication Library for .NET (ADAL.NET) version 3 and version 4.
139
139
140
140
For more information, see [Desktop app that calls web APIs](scenario-desktop-overview.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/mark-app-as-publisher-verified.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: develop
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 11/12/2022
11
+
ms.date: 03/16/2023
12
12
ms.author: ryanwi
13
13
ms.custom: aaddev
14
14
ms.reviewer: xurobert, brianokoyo, ardhanap
@@ -23,7 +23,7 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
23
23
24
24
1. Sign into the [App Registration portal](https://aka.ms/PublisherVerificationPreview) using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md)
25
25
26
-
1. Choose an app and click **Branding**.
26
+
1. Choose an app and click **Branding & properties**.
27
27
28
28
1. Click **Add MPN ID to verify publisher** and review the listed requirements.
29
29
@@ -32,25 +32,25 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
32
32
For more details on specific benefits, requirements, and frequently asked questions see the [overview](publisher-verification-overview.md).
33
33
34
34
## Mark your app as publisher verified
35
-
Make sure you have met the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
35
+
Make sure you meet the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
36
36
37
-
1.Ensure you are signed in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account that is authorized to make changes to the app(s) you want to mark as Publisher Verified and on the MPN Account in Partner Center.
37
+
1.Sign in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account authorized to make changes to the app you want to mark as Publisher Verified and on the MPN Account in Partner Center.
38
38
39
-
-In Azure AD this user must be a member of one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
39
+
-The Azure AD user must have one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
40
40
41
-
-In Partner Center this user must have of the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (this is a shared role mastered in Azure AD).
41
+
-The user in Partner Center must have the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (a shared role mastered in Azure AD).
42
42
43
43
1. Navigate to the **App registrations** blade:
44
44
45
-
1. Click on an app you would like to mark as Publisher Verified and open the **Branding** blade.
45
+
1. Click on an app you would like to mark as Publisher Verified and open the **Branding & properties** blade.
46
46
47
47
1. Ensure the app’s [publisher domain](howto-configure-publisher-domain.md) is set.
48
48
49
49
1. Ensure that either the publisher domain or a DNS-verified [custom domain](../fundamentals/add-custom-domain.md) on the tenant matches the domain of the email address used during the verification process for your MPN account.
50
50
51
51
1. Click **Add MPN ID to verify publisher** near the bottom of the page.
52
52
53
-
1. Enter your**MPN ID**. This MPN ID must be for:
53
+
1. Enter the**MPN ID** for:
54
54
55
55
- A valid Microsoft Partner Network account that has completed the verification process.
56
56
@@ -60,13 +60,13 @@ Make sure you have met the [pre-requisites](publisher-verification-overview.md#r
60
60
61
61
1. Wait for the request to process, this may take a few minutes.
62
62
63
-
1. If the verification was successful, the publisher verification window will close, returning you to the Branding blade. You will see a blue verified badge next to your verified **Publisher display name**.
63
+
1. If the verification was successful, the publisher verification window closes, returning you to the **Branding & properties**blade. You see a blue verified badge next to your verified **Publisher display name**.
64
64
65
-
1. Users who get prompted to consent to your app will start seeing the badge soon after you have gone through the process successfully, although it may take some time for this to replicate throughout the system.
65
+
1. Users who get prompted to consent to your app start seeing the badge soon after you've gone through the process successfully, although it may take some time for updates to replicate throughout the system.
66
66
67
-
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you are signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
67
+
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you're signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
68
68
69
-
1. Repeat this process as needed for any additional apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
69
+
1. Repeat these steps as needed for any more apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
70
70
71
71
That’s it! Let us know if you have any feedback about the process, the results, or the feature in general.
0 commit comments