Skip to content

Commit 6d4a27e

Browse files
Merge pull request #249906 from davidmu1/updatesteps23
updated sign-in steps for admin center
2 parents cefb8af + 4371c52 commit 6d4a27e

File tree

1 file changed

+13
-28
lines changed

1 file changed

+13
-28
lines changed

articles/active-directory/develop/quickstart-daemon-app-java-acquire-token.md

Lines changed: 13 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -28,25 +28,10 @@ To run this sample, you need:
2828
- [Java Development Kit (JDK)](https://openjdk.java.net/) 8 or greater
2929
- [Maven](https://maven.apache.org/)
3030

31-
32-
## Register and download your quickstart app
33-
34-
You have two options to start your quickstart application: Express (Option 1 below), and Manual (Option 2)
35-
36-
### Option 1: Register and auto configure your app and then download your code sample
37-
38-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
39-
1. Browse to **Identity** > **Applications** > **Application registrations**.
40-
1. Select **New registration**.
41-
1. Enter a name for your application and select **Register**.
42-
1. Follow the instructions to download and automatically configure your new application with just one click.
43-
44-
### Option 2: Register and manually configure your application and code sample
45-
46-
#### Step 1: Register your application
47-
4831
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4932

33+
### Step 1: Register the application
34+
5035
To register your application and add the app's registration information to your solution manually, follow these steps:
5136

5237
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
@@ -61,10 +46,10 @@ To register your application and add the app's registration information to your
6146
1. Select **Application permissions**.
6247
1. Under **User** node, select **User.Read.All**, then select **Add permissions**.
6348

64-
#### Step 2: Download the Java project
49+
### Step 2: Download the Java project
6550
[Download the Java daemon project](https://github.com/Azure-Samples/ms-identity-java-daemon/archive/master.zip)
6651

67-
#### Step 3: Configure the Java project
52+
### Step 3: Configure the Java project
6853

6954
1. Extract the zip file to a local folder close to the root of the disk, for example, *C:\Azure-Samples*.
7055
1. Navigate to the sub folder **msal-client-credential-secret**.
@@ -81,18 +66,18 @@ To register your application and add the app's registration information to your
8166
- `Enter_the_Client_Secret_Here` - replace this value with the client secret created on step 1.
8267

8368
>[!TIP]
84-
>To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page in the Azure portal. To generate a new key, go to **Certificates & secrets** page.
69+
>To find the values of **Application (client) ID**, **Directory (tenant) ID**, go to the app's **Overview** page. To generate a new key, go to **Certificates & secrets** page.
8570
86-
#### Step 4: Admin consent
71+
### Step 4: Admin consent
8772

8873
If you try to run the application at this point, you'll receive *HTTP 403 - Forbidden* error: `Insufficient privileges to complete the operation`. This error happens because any *app-only permission* requires Admin consent: a global administrator of your directory must give consent to your application. Select one of the options below depending on your role:
8974

90-
##### Global tenant administrator
75+
#### Global tenant administrator
9176

9277

93-
If you are a global tenant administrator, go to **API Permissions** page in **App registrations** in the Azure portal and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
78+
If you are a global tenant administrator, go to **API Permissions** page in **App registrations** and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
9479

95-
##### Standard user
80+
#### Standard user
9681

9782
If you're a standard user of your tenant, then you need to ask a global administrator to grant admin consent for your application. To do this, give the following URL to your administrator:
9883

@@ -105,7 +90,7 @@ https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_i
10590
* `Enter_the_Application_Id_Here` - is the **Application (client) ID** for the application you registered.
10691

10792

108-
#### Step 5: Run the application
93+
### Step 5: Run the application
10994

11095
You can test the sample directly by running the main method of ClientCredentialGrant.java from your IDE.
11196

@@ -172,8 +157,8 @@ ConfidentialClientApplication cca =
172157

173158
| Where: |Description |
174159
|---------|---------|
175-
| `CLIENT_SECRET` | Is the client secret created for the application in Azure portal. |
176-
| `CLIENT_ID` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
160+
| `CLIENT_SECRET` | Is the client secret created for the application. |
161+
| `CLIENT_ID` | Is the **Application (client) ID** for the registered application. You can find this value in the app's **Overview** page. |
177162
| `AUTHORITY` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant ID.|
178163

179164
### Requesting tokens
@@ -212,7 +197,7 @@ IAuthenticationResult result;
212197

213198
|Where:| Description |
214199
|---------|---------|
215-
| `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
200+
| `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations**.|
216201

217202
[!INCLUDE [Help and support](includes/error-handling-and-tips/help-support-include.md)]
218203

0 commit comments

Comments
 (0)