Skip to content

Commit 4f72a16

Browse files
committed
incorporate feedback from PR review
1 parent 5a2ee81 commit 4f72a16

14 files changed

+37
-37
lines changed

articles/active-directory/develop/quickstart-daemon-app-java-acquire-token.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-jav
1919
In this quickstart, you download and run a code sample that demonstrates how a Java application can get an access token using the app's identity to call the Microsoft Graph API and display a [list of users](/graph/api/user-list) in the directory. The code sample demonstrates how an unattended job or Windows service can run with an application identity, instead of a user's identity.
2020

2121

22-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-java-daemon/java-console-daemon.svg)
22+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-java-daemon/java-console-daemon.svg)
2323

2424
## Prerequisites
2525

@@ -132,7 +132,7 @@ After running, the application should display the list of users in the configure
132132

133133
Add MSAL4J to your application by using Maven or Gradle to manage your dependencies by making the following changes to the application's pom.xml (Maven) or build.gradle (Gradle) file.
134134

135-
In pom.xml:
135+
In *pom.xml*:
136136

137137
```xml
138138
<dependency>
@@ -168,11 +168,11 @@ ConfidentialClientApplication cca =
168168
.build();
169169
```
170170

171-
> | Where: |Description |
172-
> |---------|---------|
173-
> | `CLIENT_SECRET` | Is the client secret created for the application in Azure portal. |
174-
> | `CLIENT_ID` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
175-
> | `AUTHORITY` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
171+
| Where: |Description |
172+
|---------|---------|
173+
| `CLIENT_SECRET` | Is the client secret created for the application in Azure portal. |
174+
| `CLIENT_ID` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
175+
| `AUTHORITY` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
176176

177177
### Requesting tokens
178178

@@ -208,9 +208,9 @@ IAuthenticationResult result;
208208
return result;
209209
```
210210

211-
> |Where:| Description |
212-
> |---------|---------|
213-
> | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
211+
|Where:| Description |
212+
|---------|---------|
213+
| `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
214214

215215
[!INCLUDE [Help and support](includes/error-handling-and-tips/help-support-include.md)]
216216

articles/active-directory/develop/quickstart-daemon-app-python-acquire-token.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
1919

2020
In this quickstart, you download and run a code sample that demonstrates how a Python application can get an access token using the app's identity to call the Microsoft Graph API and display a [list of users](/graph/api/user-list) in the directory. The code sample demonstrates how an unattended job or Windows service can run with an application identity, instead of a user's identity.
2121

22-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-python-daemon/python-console-daemon.svg)
22+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-python-daemon/python-console-daemon.svg)
2323

2424
## Prerequisites
2525

@@ -142,11 +142,11 @@ app = msal.ConfidentialClientApplication(
142142
client_credential=config["secret"])
143143
```
144144

145-
> | Where: |Description |
146-
> |---------|---------|
147-
> | `config["secret"]` | Is the client secret created for the application in Azure portal. |
148-
> | `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
149-
> | `config["authority"]` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
145+
| Where: |Description |
146+
|---------|---------|
147+
| `config["secret"]` | Is the client secret created for the application in Azure portal. |
148+
| `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
149+
| `config["authority"]` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
150150

151151
For more information, please see the [reference documentation for `ConfidentialClientApplication`](https://msal-python.readthedocs.io/en/latest/#confidentialclientapplication).
152152

@@ -163,9 +163,9 @@ if not result:
163163
result = app.acquire_token_for_client(scopes=config["scope"])
164164
```
165165

166-
> |Where:| Description |
167-
> |---------|---------|
168-
> | `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
166+
|Where:| Description |
167+
|---------|---------|
168+
| `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
169169

170170
For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
171171

articles/active-directory/develop/quickstart-desktop-app-uwp-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ When the app's window appears, you can select the **Call Microsoft Graph API** b
9595

9696
## How the sample works
9797

98-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-uwp/uwp-intro.svg)
98+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-uwp/uwp-intro.svg)
9999

100100
### MSAL.NET
101101

articles/active-directory/develop/quickstart-desktop-app-wpf-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ If you're running the application for the first time, you'll be prompted to prov
9595
## More information
9696

9797
### How the sample works
98-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-windows-desktop/windesktop-intro.svg)
98+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-windows-desktop/windesktop-intro.svg)
9999

100100
### MSAL.NET
101101
MSAL ([Microsoft.Identity.Client](https://www.nuget.org/packages/Microsoft.Identity.Client)) is the library used to sign in users and request tokens used to access an API protected by Microsoft identity platform. You can install MSAL by running the following command in Visual Studio's **Package Manager Console**:

articles/active-directory/develop/quickstart-mobile-app-android-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Select your emulator, or physical device, from Android Studio's **available devi
3838

3939
The sample app starts on the **Single Account Mode** screen. A default scope, **user.read**, is provided by default, which is used when reading your own profile data during the Microsoft Graph API call. The URL for the Microsoft Graph API call is provided by default. You can change both of these if you wish.
4040

41-
![MSAL sample app showing single and multiple account usage](media/quickstart-v2-android/quickstart-sample-app.png)
41+
![Screenshot of the MSAL sample app showing single and multiple account usage.](media/quickstart-v2-android/quickstart-sample-app.png)
4242

4343
Use the app menu to change between single and multiple account modes.
4444

@@ -51,7 +51,7 @@ In multiple account mode, you can repeat the same steps. Additionally, you can r
5151

5252
## How the sample works
5353

54-
![Screenshot of the sample app](media/quickstart-v2-android/android-intro.svg)
54+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-android/android-intro.svg)
5555

5656
The code is organized into fragments that show how to write a single and multiple accounts MSAL app. The code files are organized as follows:
5757

articles/active-directory/develop/quickstart-mobile-app-ios-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The quickstart applies to both iOS and macOS apps. Some steps are needed only fo
3030

3131
## How the sample works
3232

33-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-ios/ios-intro.svg)
33+
![Diagram showing how the sample app generated by this quickstart works.](media/quickstart-v2-ios/ios-intro.svg)
3434

3535
## Register and download your quickstart app
3636
You have two options to start your quickstart application:

articles/active-directory/develop/quickstart-single-page-app-angular-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To start your quickstart application, use either of the following options.
3838

3939
### Option 1 (Express): Register and auto configure your app and then download your code sample
4040

41-
1. Go to the <a href="https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/AngularSpaQuickstartPage/sourceType/docs" target="_blank">Azure portal - App registrations</a> quickstart experience.
41+
1. Go to the [Azure portal - App registrations]("https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/AngularSpaQuickstartPage/sourceType/docs) quickstart experience.
4242
1. Enter a name for your application.
4343
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
4444
1. Select **Register**.
@@ -48,7 +48,7 @@ To start your quickstart application, use either of the following options.
4848

4949
#### Step 1: Register your application
5050

51-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
51+
1. Sign in to the [Azure portal](https://portal.azure.com/).
5252
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
5353
1. Search for and select **Azure Active Directory**.
5454
1. Under **Manage**, select **App registrations** > **New registration**.

articles/active-directory/develop/quickstart-single-page-app-javascript-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To start your quickstart application, use either of the following options.
3737

3838
### Option 1 (Express): Register and auto configure your app and then download your code sample
3939

40-
1. Go to the <a href="https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/JavascriptSpaQuickstartPage/sourceType/docs" target="_blank">Azure portal - App registrations</a>.
40+
1. Go to the [Azure portal - App registrations]("https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/AngularSpaQuickstartPage/sourceType/docs) quickstart experience.
4141
1. Enter a name for your application.
4242
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
4343
1. Select **Register**.
@@ -47,7 +47,7 @@ To start your quickstart application, use either of the following options.
4747

4848
#### Step 1: Register your application
4949

50-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
50+
1. Sign in to the [Azure portal](https://portal.azure.com/).
5151
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
5252
1. Search for and select **Azure Active Directory**.
5353
1. Under **Manage**, select **App registrations** > **New registration**.

articles/active-directory/develop/quickstart-single-page-app-react-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To start your quickstart application, use either of the following options.
3838

3939
### Option 1 (Express): Register and auto configure your app and then download your code sample
4040

41-
1. Go to the <a href="https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/ReactSpaQuickstartPage/sourceType/docs" target="_blank">Azure portal - App registrations</a> quickstart experience.
41+
1. Go to the [Azure portal - App registrations]("https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/AngularSpaQuickstartPage/sourceType/docs) quickstart experience.
4242
1. Enter a name for your application.
4343
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
4444
1. Select **Register**.
@@ -50,7 +50,7 @@ To start your quickstart application, use either of the following options.
5050

5151
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5252

53-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
53+
1. Sign in to the [Azure portal](https://portal.azure.com/).
5454
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
5555
1. Search for and select **Azure Active Directory**.
5656
Under **Manage**, select **App registrations** > **New registration**.

articles/active-directory/develop/quickstart-web-app-aspnet-core-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ A prompt for credentials will appear, and then a request for consent to the perm
8686

8787
After consenting to the requested permissions, the app displays that sign-in has been successful using correct Azure Active Directory credentials. The user's account email address will be displayed in the *API result* section of the page. This was extracted using the Microsoft Graph API.
8888

89-
:::image type="content" source="media/quickstart-v2-aspnet-core-webapp-calls-graph/webapp-02-signed-in.png" alt-text="Web browser displaying the running web app and the user signed in":::
89+
:::image type="content" source="media/quickstart-v2-aspnet-core-webapp-calls-graph/webapp-02-signed-in.png" alt-text="Screenshot of the web browser displaying the running web app and the user signed in.":::
9090

9191
## More information
9292

0 commit comments

Comments
 (0)