Skip to content

Commit 519ff4d

Browse files
authored
Update resilience-daemon-app.md
1 parent 9753bcd commit 519ff4d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/fundamentals/resilience-daemon-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,29 +14,29 @@ ms.date: 03/03/2023
1414

1515
# Increase the resilience of authentication and authorization in daemon applications you develop
1616

17-
Learn to use the Microsoft identity platform and Azure Active Directory (Azure AD) to increase the resilience of daemon applications. This includes background processes, services, server to server apps, and applications without users.
17+
Learn to use the Microsoft identity platform and Azure Active Directory (Azure AD) to increase the resilience of daemon applications. Find information about background processes, services, server to server apps, and applications without users.
1818

1919
See, [What is the Microsoft identity platform?](../develop/v2-overview.md)
2020

2121
![A daemon application making a call to Microsoft identity platform.](media/resilience-daemon-app/calling-microsoft-identity.png)
2222

2323
## Managed identities for Azure resources
2424

25-
If you are building daemon apps on Microsoft Azure, use managed identities for Azure resources, which manages secrets and credentials. The feature improves resilience by handling certificate expiry, rotation, or trust.
25+
If you're building daemon apps on Microsoft Azure, use managed identities for Azure resources, which handle secrets and credentials. The feature improves resilience by handling certificate expiry, rotation, or trust.
2626

2727
See, [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)
2828

29-
Managed identities use long-lived access tokens and information from Microsoft identity platform to acquire new tokens before tokens expires. Your app runs while acquiring new tokens.
29+
Managed identities use long-lived access tokens and information from Microsoft identity platform to acquire new tokens before tokens expire. Your app runs while acquiring new tokens.
3030

31-
Managed identities use regional endpoints which helps prevent out-of-region failures by consolidating service dependencies. Regional endpoints help keep traffic in a geographical area. For example, if your Azure resource is in WestUS2, all traffic stays in WestUS2.
31+
Managed identities use regional endpoints, which help prevent out-of-region failures by consolidating service dependencies. Regional endpoints help keep traffic in a geographical area. For example, if your Azure resource is in WestUS2, all traffic stays in WestUS2.
3232

3333
## Microsoft Authentication Library
3434

3535
If you develop daemon apps and don't use managed identities, use the Microsoft Authentication Library (MSAL) for authentication and authorization. MSAL eases the process of providing client credentials. For example, your application doesn't need to create and sign JSON web token assertions with certificate-based credentials.
3636

3737
See, [Overview of the Microsoft Authentication Library (MSAL)](../develop/msal-overview.md)
3838

39-
### Microsoft.Identity.Web for .NET Developers
39+
### Microsoft.Identity.Web for .NET developers
4040

4141
If you develop daemon apps on ASP.NET Core, use the Microsoft.Identity.Web library to ease authorization. It includes distributed token cache strategies for distributed apps that run in multiple regions.
4242

@@ -51,7 +51,7 @@ If you don't use MSAL for authentication and authorization, there are best pract
5151

5252
An application acquires tokens from an identity provider (IdP) to authorize the application to call protected APIs. When your app receives tokens, the response with the tokens contains an `expires\_in` property that tells the application how long to cache, and reuse, the token. Ensure applications use the `expires\_in` property to determine token lifespan. Confirm application don't attempt to decode an API access token. Using the cached token prevents unnecessary traffic between an app and Microsoft identity platform. Users are signed in to your application for the token's lifetime.
5353

54-
## Error response handling
54+
## HTTP 429 and 5x error codes
5555

5656
Use the following sections to learn about HTTP 429 and 5x error codes
5757

0 commit comments

Comments
 (0)