Skip to content

Commit 5bdfa3f

Browse files
Merge pull request #209188 from jmprieur/docs-editor/scenario-protected-web-api-app-1661450447
Improving formatting
2 parents ccddd49 + 4309e34 commit 5bdfa3f

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,8 +111,11 @@ Microsoft recommends you use the [Microsoft.Identity.Web](https://www.nuget.org/
111111

112112
_Microsoft.Identity.Web_ provides the glue between ASP.NET Core, the authentication middleware, and the [Microsoft Authentication Library (MSAL)](msal-overview.md) for .NET. It allows for a clearer, more robust developer experience and leverages the power of the Microsoft identity platform and Azure AD B2C.
113113

114+
#### ASP.NET for .NET 6.0
114115

115-
**ASP.NET for .NET 6.0** - To create a new web API project that uses Microsoft.Identity.Web, use a project template in the .NET 6.0 CLI or Visual Studio.
116+
To create a new web API project that uses Microsoft.Identity.Web, use a project template in the .NET 6.0 CLI or Visual Studio.
117+
118+
**Dotnet core CLI**
116119

117120
```dotnetcli
118121
# Create new web API that uses Microsoft.Identity.Web
@@ -212,9 +215,7 @@ public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
212215
```
213216

214217
> [!NOTE]
215-
> If you use Microsoft.Identity.Web and don't set the `Audience` in *appsettings.json*, the following is used:
216-
> - `$"{ClientId}"` if you have set the [access token accepted version](scenario-protected-web-api-app-registration.md#accepted-token-version) to `2`, or for Azure AD B2C web APIs.
217-
> - `$"api://{ClientId}` in all other cases (for v1.0 [access tokens](access-tokens.md)).
218+
> If you use Microsoft.Identity.Web and don't set the `Audience` in *appsettings.json*, `$"{ClientId}"` is automatically used if you have set the [access token accepted version](scenario-protected-web-api-app-registration.md#accepted-token-version) to `2`, or for Azure AD B2C web APIs.
218219

219220
## Token validation
220221

@@ -283,3 +284,4 @@ You can also validate incoming access tokens in Azure Functions. You can find ex
283284

284285
Move on to the next article in this scenario,
285286
[Verify scopes and app roles in your code](scenario-protected-web-api-verification-scope-app-roles.md).
287+

0 commit comments

Comments
 (0)