You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/includes/scenario-secure-app-clean-up-resources.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: app-service
9
9
ms.topic: include
10
10
ms.workload: identity
11
-
ms.date: 10/26/2021
11
+
ms.date: 09/15/2023
12
12
ms.author: ryanwi
13
13
ms.reviewer: stsoneff
14
14
ms.custom: azureday1
@@ -36,7 +36,7 @@ This command might take several minutes to run.
36
36
37
37
### Delete the app registration
38
38
39
-
From the portal menu, select **Azure Active Directory** > **App registrations**. Then select the application you created.
39
+
In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** > **App registrations**. Then select the application you created.
40
40
:::image type="content" alt-text="Screenshot that shows selecting app registration." source="../media/scenario-secure-app-clean-up-resources/select-app-registration.png":::
41
41
42
42
In the app registration overview, select **Delete**.
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-connect-app-access-microsoft-graph-as-user/intro.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: app-service
9
9
ms.topic: include
10
10
ms.workload: identity
11
-
ms.date: 11/02/2021
11
+
ms.date: 09/15/2023
12
12
ms.author: ryanwi
13
13
ms.reviewer: stsoneff
14
14
ms.devlang: csharp, javascript
@@ -40,7 +40,7 @@ In this tutorial, you learn how to:
40
40
41
41
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
42
42
43
-
1. In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
43
+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications**.
44
44
45
45
1. Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-microsoft-graph-as-app/introduction.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ If you create and publish your web app through Visual Studio, the managed identi
46
46
47
47
## Grant access to Microsoft Graph
48
48
49
-
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Azure portal.
49
+
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Microsoft Entra admin center.
50
50
51
51
1. Run the following script to add the requested Microsoft Graph API permissions to the managed identity service principal object.
52
52
@@ -109,9 +109,9 @@ When accessing the Microsoft Graph, the managed identity needs to have proper pe
109
109
110
110
---
111
111
112
-
1. After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
112
+
1. After executing the script, you can verify in the [Microsoft Entra admin center](https://entra.microsoft.com) that the requested API permissions are assigned to the managed identity.
113
113
114
-
1. Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In **Managed Identities**, select the service principal for the managed identity.
114
+
1. Go to **Applications**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. **Add a filter** for "Application type==Managed identities" and select the service principal for the managed identity.
115
115
116
116
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal that appears in **Managed Identities** should *not* have a **Homepage URL** listed and the **Object ID** should match the object ID value of the managed identity in the [previous step](#enable-managed-identity-on-app).
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ Now that you have a web app running on App Service, enable authentication and au
74
74
75
75
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your Azure AD tenant. The app registration has the same display name as your web app.
76
76
77
-
1. To check the settings, select **Azure Active Directory** from the portal menu, and select **App registrations**.
77
+
1. To check the settings, go to the [Microsoft Entra admin center](https://entra.microsoft.com)and select **Applications** and then **App registrations** from the menu.
78
78
1. Select the app registration that was created.
79
79
1. In the overview, verify that **Supported account types** is set to **My organization only**.
Copy file name to clipboardExpand all lines: articles/app-service/scenario-secure-app-access-microsoft-graph-as-user.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: app-service
9
9
ms.topic: tutorial
10
10
ms.workload: identity
11
-
ms.date: 06/28/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: ryanwi
13
13
ms.reviewer: stsoneff
14
14
ms.devlang: csharp
@@ -108,7 +108,7 @@ public class Startup
108
108
109
109
### appsettings.json
110
110
111
-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
111
+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
112
112
113
113
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
114
114
@@ -117,9 +117,9 @@ public class Startup
117
117
"AzureAd": {
118
118
"Instance": "https://login.microsoftonline.com/",
119
119
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
120
-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
121
-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
122
-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
120
+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Microsoft Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
121
+
"ClientId": "[Enter the Client Id (Application ID obtained from the Microsoft Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
122
+
"ClientSecret": "[Copy the client secret added to the app from the Microsoft Entra admin center]",
123
123
"ClientCertificates": [
124
124
],
125
125
// the following is required to handle Continuous Access Evaluation challenges
0 commit comments