You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-react.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: tutorial
11
11
ms.workload: identity
12
-
ms.date: 04/16/2021
12
+
ms.date: 05/05/2022
13
13
ms.author: jamesmantu
14
14
ms.custom: aaddev, devx-track-js
15
15
---
@@ -37,9 +37,9 @@ MSAL React supports the authorization code flow in the browser instead of the im
37
37
38
38
:::image type="content" source="media/tutorial-v2-javascript-auth-code/diagram-01-auth-code-flow.png" alt-text="Diagram showing the authorization code flow in a single-page application":::
39
39
40
-
The application you create in this tutorial enables a React SPA to query the Microsoft Graph API by acquiring security tokens from the the Microsoft identity platform. It uses the Microsoft Authentication Library (MSAL) for React, a wrapper of the MSAL.js v2 library. MSAL React enables React 16+ applications to authenticate enterprise users by using Azure Active Directory (Azure AD), and also users with Microsoft accounts and social identities like Facebook, Google, and LinkedIn. The library also enables applications to get access to Microsoft cloud services and Microsoft Graph.
40
+
The application you create in this tutorial enables a React SPA to query the Microsoft Graph API by acquiring security tokens from the Microsoft identity platform. It uses the MSAL for React, a wrapper of the MSAL.js v2 library. MSAL React enables React 16+ applications to authenticate enterprise users by using Azure Active Directory (Azure AD), and also users with Microsoft accounts and social identities like Facebook, Google, and LinkedIn. The library also enables applications to get access to Microsoft cloud services and Microsoft Graph.
41
41
42
-
In this scenario, after a user signs in, an access token is requested and added to HTTP requests in the authorization header. Token acquisition and renewal are handled by the Microsoft Authentication Library for React (MSAL React).
42
+
In this scenario, after a user signs in, an access token is requested and added to HTTP requests in the authorization header. Token acquisition and renewal are handled by the MSAL for React (MSAL React).
43
43
44
44
### Libraries
45
45
@@ -58,7 +58,7 @@ Prefer to download this tutorial's completed sample project instead? To run the
58
58
59
59
Then, to configure the code sample before you execute it, skip to the [configuration step](#register-your-application).
60
60
61
-
To continue with the tutorial and build the application yourself, move on to the next section, [Prerequisites](#prerequisites).
61
+
To continue with the tutorial and build the application yourself, move on to the next section, [Create your project](#create-your-project).
npm install react-bootstrap bootstrap # Install Bootstrap for styling
72
72
```
73
73
74
-
You have now bootstrapped a small React project using [Create React App](https://create-react-app.dev/docs/getting-started). This will be the starting point the rest of this tutorial will build on. If you would like to see the changes to your app as you are working through this tutorial you can run the following command:
74
+
You've now bootstrapped a small React project using [Create React App](https://create-react-app.dev/docs/getting-started). This will be the starting point the rest of this tutorial will build on. If you'd like to see the changes to your app as you're working through this tutorial you can run the following command:
75
75
76
76
```console
77
77
npm start
78
78
```
79
79
80
-
A browser window should be opened to your app automatically. If it does not, open your browser and navigate to http://localhost:3000. Each time you save a file with updated code the page will reload to reflect the changes.
80
+
A browser window should be opened to your app automatically. If it doesn't, open your browser and navigate to http://localhost:3000. Each time you save a file with updated code the page will reload to reflect the changes.
Your app now has a sign-in button which is only displayed for unauthenticated users!
265
+
Your app now has a sign-in button, which is only displayed for unauthenticated users!
266
266
267
267
When a user selects the **Sign in using Popup** or **Sign in using Redirect** button for the first time, the `onClick` handler calls `loginPopup` (or `loginRedirect`) to sign in the user. The`loginPopup` method opens a pop-up windowwith the *Microsoft identity platform endpoint* to prompt and validate the user's credentials. After a successful sign-in, *msal.js* initiates the [authorization code flow](v2-oauth2-auth-code-flow.md).
268
268
@@ -439,7 +439,7 @@ In order to render certain components only for authenticated or unauthenticated
439
439
};
440
440
```
441
441
442
-
1. Update your imports in*src/App.js* to match the following:
442
+
1. Update your imports in*src/App.js* to match the following snippet:
443
443
444
444
```js
445
445
import React, { useState } from "react";
@@ -477,8 +477,7 @@ After a user signs in, your app shouldn't ask users to reauthenticate every time
477
477
478
478
Calling `acquireTokenPopup` opens a pop-up window (or `acquireTokenRedirect` redirects users to the Microsoft identity platform). In that window, users need to interact by confirming their credentials, giving consent to the required resource, or completing the two-factor authentication.
479
479
480
-
> [!NOTE]
481
-
> If you're using Internet Explorer, we recommend that you use the `loginRedirect` and `acquireTokenRedirect` methods due to a [known issue](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/internet-explorer.md#popups) with Internet Explorer and pop-up windows.
480
+
If you're using Internet Explorer, we recommend that you use the `loginRedirect` and `acquireTokenRedirect` methods due to a [known issue](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/internet-explorer.md#popups) with Internet Explorer and pop-up windows.
482
481
483
482
## Call the Microsoft Graph API
484
483
@@ -527,7 +526,7 @@ Calling `acquireTokenPopup` opens a pop-up window (or `acquireTokenRedirect` red
527
526
};
528
527
```
529
528
530
-
1. Next, open *src/App.js* and add these to the imports:
529
+
1. Next, open *src/App.js* and add the following imports:
531
530
532
531
```javascript
533
532
import { ProfileData } from "./components/ProfileData";
@@ -583,7 +582,7 @@ You've completed creation of the application and are now ready to launch the web
583
582
```console
584
583
npm start
585
584
```
586
-
1.A browser window should be opened to your app automatically. If it does not, open your browser and navigate to `http://localhost:3000`. You should see a page that looks like the one below.
585
+
1.A browser window should be opened to your app automatically. If it doesn't, open your browser and navigate to `http://localhost:3000`. You should see a page that looks like the one below.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/external-collaboration-settings-configure.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,11 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: how-to
9
-
ms.date: 04/26/2022
9
+
ms.date: 05/05/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
13
13
manager: celestedg
14
-
ms.reviewer: mal
15
14
16
15
ms.collection: M365-identity-device-management
17
16
---
@@ -41,7 +40,7 @@ For B2B collaboration with other Azure AD organizations, you should also review
41
40
42
41
-**Guest users have the same access as members (most inclusive)**: This option gives guests the same access to Azure AD resources and directory data as member users.
43
42
44
-
-**Guest users have limited access to properties and memberships of directory objects**: (Default) This setting blocks guests from certain directory tasks, like enumerating users, groups, or other directory resources. Guests can see membership of all non-hidden groups.
43
+
-**Guest users have limited access to properties and memberships of directory objects**: (Default) This setting blocks guests from certain directory tasks, like enumerating users, groups, or other directory resources. Guests can see membership of all non-hidden groups.[Learn more about default guest permissions](../fundamentals/users-default-permissions.md#member-and-guest-users).
45
44
46
45
-**Guest user access is restricted to properties and memberships of their own directory objects (most restrictive)**: With this setting, guests can access only their own profiles. Guests are not allowed to see other users' profiles, groups, or group memberships.
Copy file name to clipboardExpand all lines: articles/automation/extension-based-hybrid-runbook-worker-install.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Azure Automation stores and manages runbooks and then delivers them to one or mo
35
35
36
36
| Windows | Linux (x64)|
37
37
|---|---|
38
-
|● Windows Server 2019 (including Server Core), <br> ● Windows Server 2016, version 1709 and 1803 (excluding Server Core), and <br> ● Windows Server 2012, 2012 R2 <br><br>|● Debian GNU/Linux 7 and 8, <br> ● Ubuntu 18.04, and 20.04 LTS, <br> ● SUSE Linux Enterprise Server 15, and 15.1 (SUSE didn't release versions numbered 13 or 14), and <br> ● Red Hat Enterprise Linux Server 7 and 8 |
38
+
|● Windows Server 2022 (including Server Core) <br> ● Windows Server 2019 (including Server Core) <br> ● Windows Server 2016, version 1709 and 1803 (excluding Server Core), and <br> ● Windows Server 2012, 2012 R2 |● Debian GNU/Linux 7 and 8 <br> ● Ubuntu 18.04, and 20.04 LTS <br> ● SUSE Linux Enterprise Server 15, and 15.1 (SUSE didn't release versions numbered 13 or 14), and <br> ● Red Hat Enterprise Linux Server 7 and 8 |
0 commit comments