You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/resilience-daemon-app.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,29 +14,29 @@ ms.date: 03/03/2023
14
14
15
15
# Increase the resilience of authentication and authorization in daemon applications you develop
16
16
17
-
Learn to use the Microsoft identity platform and Azure Active Directory (Azure AD) to increase the resilience of daemon applications. This includes background processes, services, server to server apps, and applications without users.
17
+
Learn to use the Microsoft identity platform and Azure Active Directory (Azure AD) to increase the resilience of daemon applications. Find information about background processes, services, server to server apps, and applications without users.
18
18
19
19
See, [What is the Microsoft identity platform?](../develop/v2-overview.md)
20
20
21
21

22
22
23
23
## Managed identities for Azure resources
24
24
25
-
If you are building daemon apps on Microsoft Azure, use managed identities for Azure resources, which manages secrets and credentials. The feature improves resilience by handling certificate expiry, rotation, or trust.
25
+
If you're building daemon apps on Microsoft Azure, use managed identities for Azure resources, which handle secrets and credentials. The feature improves resilience by handling certificate expiry, rotation, or trust.
26
26
27
27
See, [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)
28
28
29
-
Managed identities use long-lived access tokens and information from Microsoft identity platform to acquire new tokens before tokens expires. Your app runs while acquiring new tokens.
29
+
Managed identities use long-lived access tokens and information from Microsoft identity platform to acquire new tokens before tokens expire. Your app runs while acquiring new tokens.
30
30
31
-
Managed identities use regional endpoints which helps prevent out-of-region failures by consolidating service dependencies. Regional endpoints help keep traffic in a geographical area. For example, if your Azure resource is in WestUS2, all traffic stays in WestUS2.
31
+
Managed identities use regional endpoints, which help prevent out-of-region failures by consolidating service dependencies. Regional endpoints help keep traffic in a geographical area. For example, if your Azure resource is in WestUS2, all traffic stays in WestUS2.
32
32
33
33
## Microsoft Authentication Library
34
34
35
35
If you develop daemon apps and don't use managed identities, use the Microsoft Authentication Library (MSAL) for authentication and authorization. MSAL eases the process of providing client credentials. For example, your application doesn't need to create and sign JSON web token assertions with certificate-based credentials.
36
36
37
37
See, [Overview of the Microsoft Authentication Library (MSAL)](../develop/msal-overview.md)
38
38
39
-
### Microsoft.Identity.Web for .NET Developers
39
+
### Microsoft.Identity.Web for .NET developers
40
40
41
41
If you develop daemon apps on ASP.NET Core, use the Microsoft.Identity.Web library to ease authorization. It includes distributed token cache strategies for distributed apps that run in multiple regions.
42
42
@@ -51,7 +51,7 @@ If you don't use MSAL for authentication and authorization, there are best pract
51
51
52
52
An application acquires tokens from an identity provider (IdP) to authorize the application to call protected APIs. When your app receives tokens, the response with the tokens contains an `expires\_in` property that tells the application how long to cache, and reuse, the token. Ensure applications use the `expires\_in` property to determine token lifespan. Confirm application don't attempt to decode an API access token. Using the cached token prevents unnecessary traffic between an app and Microsoft identity platform. Users are signed in to your application for the token's lifetime.
53
53
54
-
## Error response handling
54
+
## HTTP 429 and 5x error codes
55
55
56
56
Use the following sections to learn about HTTP 429 and 5x error codes
0 commit comments