Skip to content

Commit 5818f29

Browse files
authored
custom authentication extension > custom extension
I've excluded references in the "Error codes reference" section because the descriptions may be embedded in the product currently. I recommend that the descriptions be updated in the product and then the changes propagated to the docs.
1 parent c49a3b2 commit 5818f29

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ To access the Azure AD sign-in logs:
4545
1. Sign in to the [Azure portal](https://portal.azure.com).
4646
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
4747
1. Select the latest sign-in log.
48-
1. For more details, select the **Authentication Events** tab. Information related to the custom extension REST API call is displayed, including any [error codes](#error-codes-reference).
48+
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
4949

5050
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
5151

@@ -85,7 +85,7 @@ Use the following table to diagnose an error code.
8585

8686
## Call your REST API directly
8787

88-
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
88+
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
8989

9090
1. Sign in to the [Azure portal](https://portal.azure.com/) with your Azure administrator account.
9191
1. Select **Azure Active Directory** > **App registrations**.
@@ -135,7 +135,7 @@ To test your API directly from the Postman, follow these steps:
135135
"@odata.type": "microsoft.graph.onTokenIssuanceStartCalloutData",
136136
"tenantId": "<Your tenant GUID>",
137137
"authenticationEventListenerId": "<GUID>",
138-
"customAuthenticationExtensionId": "<Your custom extension ID>",
138+
"customAuthenticationExtensionId": "<Your custom authentication extension ID>",
139139
"authenticationContext": {
140140
"correlationId": "fcef74ef-29ea-42ca-b150-8f45c8f31ee6",
141141
"client": {
@@ -189,4 +189,4 @@ One of the most common issues is that your custom claims provider API doesn't re
189189
190190
- Learn how to [create and register a custom claims provider](custom-extension-get-started.md) with a sample Open ID Connect application.
191191
- If you already have a custom claims provider registered, you can configure a [SAML application](custom-extension-configure-saml-app.md) to receive tokens with claims sourced from an external store.
192-
- Learn more about custom claims providers with the [custom claims provider reference](custom-claims-provider-reference.md) article.
192+
- Learn more about custom claims providers with the [custom claims provider reference](custom-claims-provider-reference.md) article.

0 commit comments

Comments
 (0)