Skip to content

Commit 4c423f6

Browse files
committed
fix acrolinx issues
1 parent abac1bd commit 4c423f6

File tree

5 files changed

+8
-11
lines changed

5 files changed

+8
-11
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -646,7 +646,7 @@
646646
- name: Azure AD blog
647647
href: https://cloudblogs.microsoft.com/enterprisemobility/?product=azure-active-directory
648648
- name: Microsoft identity platform developer blog
649-
href: https://developer.microsoft.com/en-us/identity/blogs/
649+
href: https://developer.microsoft.com/identity/blogs/
650650
- name: Try Sign in with Microsoft
651651
href: https://azure.microsoft.com/develop/identity/signin/
652652
- name: Getting help

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
7878

7979
| Claim | Format | Description |
8080
|-----|--------|-------------|
81-
| `aud` | String, an App ID URI | Identifies the intended recipient of the token. In id tokens, the audience is your app's Application ID, assigned to your app in the Azure portal. Your app should validate this value and reject the token if the value does not match. |
81+
| `aud` | String, an App ID URI | Identifies the intended recipient of the token. In ID tokens, the audience is your app's Application ID, assigned to your app in the Azure portal. Your app should validate this value and reject the token if the value does not match. |
8282
| `iss` | String, an STS URI | Identifies the security token service (STS) that constructs and returns the token, and the Azure AD tenant in which the user was authenticated. If the token issued is a v2.0 token (see the `ver` claim), the URI will end in `/v2.0`. The GUID that indicates that the user is a consumer user from a Microsoft account is `9188040d-6c67-4c5b-b112-36a304b66dad`. Your app should use the GUID portion of the claim to restrict the set of tenants that can sign in to the app, if applicable. |
8383
|`idp`| String, usually an STS URI | Records the identity provider that authenticated the subject of the token. This value is identical to the value of the Issuer claim unless the user account not in the same tenant as the issuer - guests, for instance. If the claim isn't present, it means that the value of `iss` can be used instead. For personal accounts being used in an organizational context (for instance, a personal account invited to an Azure AD tenant), the `idp` claim may be 'live.com' or an STS URI containing the Microsoft account tenant `9188040d-6c67-4c5b-b112-36a304b66dad`. |
8484
| `iat` | int, a UNIX timestamp | "Issued At" indicates when the authentication for this token occurred. |

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize Azure AD tenant app claims (Powershell)
2+
title: Customize Azure AD tenant app claims (PowerShell)
33
titleSuffix: Microsoft identity platform
44
description: This page describes Azure Active Directory claims mapping.
55
services: active-directory
@@ -410,7 +410,7 @@ Based on the method chosen, a set of inputs and outputs is expected. Define the
410410

411411
### Custom signing key
412412

413-
A custom signing key must be assigned to the service principal object for a claims mapping policy to take effect. This ensures acknowledgment that tokens have been modified by the creator of the claims mapping policy and protects applications from claims mapping policies created by malicious actors. In order to add a custom signing key, you can use the Azure Powershell cmdlet `new-azureadapplicationkeycredential` to create a symmetric key credential for your Application object. For more information on this Azure Powershell cmdlet click [here](https://docs.microsoft.com/powershell/module/Azuread/New-AzureADApplicationKeyCredential?view=azureadps-2.0).
413+
A custom signing key must be assigned to the service principal object for a claims mapping policy to take effect. This ensures acknowledgment that tokens have been modified by the creator of the claims mapping policy and protects applications from claims mapping policies created by malicious actors. In order to add a custom signing key, you can use the Azure PowerShell cmdlet `new-azureadapplicationkeycredential` to create a symmetric key credential for your Application object. For more information on this Azure PowerShell cmdlet, see [New-AzureADApplicationKeyCredential](https://docs.microsoft.com/powerShell/module/Azuread/New-AzureADApplicationKeyCredential?view=azureadps-2.0).
414414

415415
Apps that have claims mapping enabled must validate their token signing keys by appending `appid={client_id}` to their [OpenID Connect metadata requests](v2-protocols-oidc.md#fetch-the-openid-connect-metadata-document). Below is the format of the OpenID Connect metadata document you should use:
416416

articles/active-directory/develop/microsoft-graph-intro.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -41,17 +41,14 @@ To read from or write to a resource such as a user or an email message, you cons
4141

4242
For more information about the elements of the constructed request, see [Use the Microsoft Graph API](https://docs.microsoft.com/graph/use-the-api)
4343

44-
Quick start samples are available to show you how to access the power of the Microsoft Graph API. The samples that are available access two services with one authentication: Microsoft account and Outlook. Each quick start accesses information from Microsoft account users' profiles and displays events from their calendar.
45-
The quick starts involve four steps:
44+
Quickstart samples are available to show you how to access the power of the Microsoft Graph API. The samples that are available access two services with one authentication: Microsoft account and Outlook. Each quickstart accesses information from Microsoft account users' profiles and displays events from their calendar.
45+
The quickstarts involve four steps:
4646
- Select your platform
4747
- Get your app ID (client ID)
4848
- Build the sample
4949
- Sign in, and view events on your calendar
5050

51-
52-
53-
54-
When you complete the quick start, you have an app that's ready to run. For more information, see the [Microsoft Graph quick start FAQ](https://docs.microsoft.com/graph/quick-start-faq). To get started with the samples, see [Microsoft Graph Quick Start](https://developer.microsoft.com/en-us/graph/quick-start).
51+
When you complete the quickstart, you have an app that's ready to run. For more information, see the [Microsoft Graph quickstart FAQ](https://docs.microsoft.com/graph/quick-start-faq). To get started with the samples, see [Microsoft Graph QuickStart](https://developer.microsoft.com/graph/quick-start).
5552

5653
## Tools
5754

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ To see a code sample that implements the steps, see the [admin-restricted scopes
162162

163163
### Request the permissions in the app registration portal
164164

165-
Applications are able to note which permissions they require (both delegated and application) in the app registration portal. This allows use of the `/.default` scope and the Azure Portal's "Grant admin consent" option. In general, it's best practice to ensure that the permissions statically defined for a given application are a superset of the permissions that it will be requesting dynamically/incrementally.
165+
Applications are able to note which permissions they require (both delegated and application) in the app registration portal. This allows use of the `/.default` scope and the Azure portal's "Grant admin consent" option. In general, it's best practice to ensure that the permissions statically defined for a given application are a superset of the permissions that it will be requesting dynamically/incrementally.
166166

167167
> [!NOTE]
168168
>Application permissions can only be requested through the use of [`/.default`](#the-default-scope) - so if your app needs application permissions, make sure they're listed in the app registration portal.

0 commit comments

Comments
 (0)