Skip to content

Commit 549077c

Browse files
committed
Updates for Entra admin center
1 parent e5411db commit 549077c

File tree

5 files changed

+13
-13
lines changed

5 files changed

+13
-13
lines changed

articles/app-service/includes/scenario-secure-app-clean-up-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service
99
ms.topic: include
1010
ms.workload: identity
11-
ms.date: 10/26/2021
11+
ms.date: 09/15/2023
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.custom: azureday1
@@ -36,7 +36,7 @@ This command might take several minutes to run.
3636

3737
### Delete the app registration
3838

39-
From the portal menu, select **Azure Active Directory** > **App registrations**. Then select the application you created.
39+
In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** > **App registrations**. Then select the application you created.
4040
:::image type="content" alt-text="Screenshot that shows selecting app registration." source="../media/scenario-secure-app-clean-up-resources/select-app-registration.png":::
4141

4242
In the app registration overview, select **Delete**.

articles/app-service/includes/tutorial-connect-app-access-microsoft-graph-as-user/intro.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service
99
ms.topic: include
1010
ms.workload: identity
11-
ms.date: 11/02/2021
11+
ms.date: 09/15/2023
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp, javascript
@@ -40,7 +40,7 @@ In this tutorial, you learn how to:
4040

4141
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
4242

43-
1. In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
43+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications**.
4444

4545
1. Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
4646

articles/app-service/includes/tutorial-microsoft-graph-as-app/introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you create and publish your web app through Visual Studio, the managed identi
4646

4747
## Grant access to Microsoft Graph
4848

49-
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Azure portal.
49+
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Microsoft Entra admin center.
5050

5151
1. Run the following script to add the requested Microsoft Graph API permissions to the managed identity service principal object.
5252

@@ -109,9 +109,9 @@ When accessing the Microsoft Graph, the managed identity needs to have proper pe
109109
110110
---
111111
112-
1. After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
112+
1. After executing the script, you can verify in the [Microsoft Entra admin center](https://entra.microsoft.com) that the requested API permissions are assigned to the managed identity.
113113
114-
1. Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In **Managed Identities**, select the service principal for the managed identity.
114+
1. Go to **Applications**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. **Add a filter** for "Application type==Managed identities" and select the service principal for the managed identity.
115115
116116
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal that appears in **Managed Identities** should *not* have a **Homepage URL** listed and the **Object ID** should match the object ID value of the managed identity in the [previous step](#enable-managed-identity-on-app).
117117

articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Now that you have a web app running on App Service, enable authentication and au
7474

7575
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your Azure AD tenant. The app registration has the same display name as your web app.
7676

77-
1. To check the settings, select **Azure Active Directory** from the portal menu, and select **App registrations**.
77+
1. To check the settings, go to the [Microsoft Entra admin center](https://entra.microsoft.com) and select **Applications** and then **App registrations** from the menu.
7878
1. Select the app registration that was created.
7979
1. In the overview, verify that **Supported account types** is set to **My organization only**.
8080

articles/app-service/scenario-secure-app-access-microsoft-graph-as-user.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service
99
ms.topic: tutorial
1010
ms.workload: identity
11-
ms.date: 06/28/2023
11+
ms.date: 09/15/2023
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp
@@ -108,7 +108,7 @@ public class Startup
108108

109109
### appsettings.json
110110

111-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
111+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
112112

113113
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
114114

@@ -117,9 +117,9 @@ public class Startup
117117
"AzureAd": {
118118
"Instance": "https://login.microsoftonline.com/",
119119
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
120-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
121-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
122-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
120+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Microsoft Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
121+
"ClientId": "[Enter the Client Id (Application ID obtained from the Microsoft Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
122+
"ClientSecret": "[Copy the client secret added to the app from the Microsoft Entra admin center]",
123123
"ClientCertificates": [
124124
],
125125
// the following is required to handle Continuous Access Evaluation challenges

0 commit comments

Comments
 (0)