You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| OneSpan Inc. |[https://www.onespan.com/sites/default/files/2019-08/Digipass-SecureClick_datasheet.pdf](https://www.onespan.com/sites/default/files/2019-08/Digipass-SecureClick_datasheet.pdf)|
119
+
| OneSpan Inc. |[https://www.onespan.com/sites/default/files/2019-01/OneSpan-FIDO-Authentication.pdf](https://www.onespan.com/sites/default/files/2019-01/OneSpan-FIDO-Authentication.pdf)|
120
120
| IDmelon Technologies Inc. |[https://www.idmelon.com/#idmelon](https://www.idmelon.com/#idmelon)|
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,8 +51,8 @@ MSAL can be used in many application scenarios, including the following:
51
51
|[MSAL.js](https://github.com/AzureAD/microsoft-authentication-library-for-js)| JavaScript/TypeScript frameworks such as AngularJS, Ember.js, or Durandal.js|
52
52
|[MSAL for Android](https://github.com/AzureAD/microsoft-authentication-library-for-android)|Android|
53
53
|[MSAL for iOS and macOS](https://github.com/AzureAD/microsoft-authentication-library-for-objc)|iOS and macOS|
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-angular.md
+1-13Lines changed: 1 addition & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,16 +32,12 @@ This tutorial demonstrates how an Angular single-page application (SPA) can:
32
32
33
33

34
34
35
-
<!--start-collapse-->
36
35
### More information
37
36
38
37
The sample application created in this tutorial enables an Angular SPA to query the Microsoft Graph API or a web API that accepts tokens from the Microsoft identity platform endpoint. The MSAL for Angular library is a wrapper of the core MSAL.js library. It enables Angular (6+) applications to authenticate enterprise users by using Microsoft Azure Active Directory, Microsoft account users, and social identity users (such as Facebook, Google, and LinkedIn). The library also enables the applications to get access to Microsoft cloud services or Microsoft Graph.
39
38
40
39
In this scenario, after a user signs in, an access token is requested and added to HTTP requests through the authorization header. Token acquisition and renewal are handled by MSAL.
41
40
42
-
<!--end-collapse-->
43
-
44
-
<!--start-collapse-->
45
41
### Libraries
46
42
47
43
This tutorial uses the following library:
@@ -52,9 +48,6 @@ This tutorial uses the following library:
52
48
53
49
You can find the source code for the MSAL.js library in the [AzureAD/microsoft-authentication-library-for-js](https://github.com/AzureAD/microsoft-authentication-library-for-js) repository on GitHub.
54
50
55
-
<!--end-collapse-->
56
-
57
-
58
51
## Prerequisites
59
52
60
53
To run this tutorial, you need:
@@ -331,10 +324,7 @@ The first time that you start to sign in to your application, you're prompted to
The Microsoft Graph API requires the *user.read* scope to read a user's profile. By default, this scope is automatically added in every application that's registered on the registration portal. Other APIs for Microsoft Graph, as well as custom APIs for your back-end server, might require additional scopes. For example, the Microsoft Graph API requires the *Calendars.Read* scope in order to list the user's calendars.
340
330
@@ -345,8 +335,6 @@ To access the user's calendars in the context of an application, add the *Calend
345
335
346
336
If a back-end API doesn't require a scope (not recommended), you can use *clientId* as the scope in the calls to acquire tokens.
347
337
348
-
<!--end-collapse-->
349
-
350
338
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-asp-webapp.md
+19-27Lines changed: 19 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,10 +66,8 @@ This section describes how to install and configure the authentication pipeline
66
66
Install-Package Microsoft.Owin.Host.SystemWeb
67
67
```
68
68
69
-
<!--start-collapse-->
70
-
> ### About these libraries
71
-
> These libraries enable single sign-on (SSO) by using OpenID Connect through cookie-based authentication. After authentication is completed and the token representing the user is sent to your application, OWIN middleware creates a session cookie. The browser then uses this cookie on subsequent requests so that the user doesn't have to retype the password, and no additional verification is needed.
72
-
<!--end-collapse-->
69
+
### About these libraries
70
+
These libraries enable single sign-on (SSO) by using OpenID Connect through cookie-based authentication. After authentication is completed and the token representing the user is sent to your application, OWIN middleware creates a session cookie. The browser then uses this cookie on subsequent requests so that the user doesn't have to retype the password, and no additional verification is needed.
73
71
74
72
## Configure the authentication pipeline
75
73
@@ -167,10 +165,9 @@ The following steps are used to create an OWIN middleware Startup class to confi
167
165
> Setting `ValidateIssuer = false` is a simplification for this quickstart. In real applications, you must validate the issuer.
168
166
> See the samples to learn how to do that.
169
167
170
-
<!--start-collapse-->
171
-
> ### More information
172
-
> The parameters you provide in *OpenIDConnectAuthenticationOptions* serve as coordinates for the application to communicate with Microsoft identity platform. Because the OpenID Connect middleware uses cookies in the background, you must also set up cookie authentication as the preceding code shows. The *ValidateIssuer* value tells OpenIdConnect not to restrict access to one specific organization.
173
-
<!--end-collapse-->
168
+
### More information
169
+
170
+
The parameters you provide in *OpenIDConnectAuthenticationOptions* serve as coordinates for the application to communicate with Microsoft identity platform. Because the OpenID Connect middleware uses cookies in the background, you must also set up cookie authentication as the preceding code shows. The *ValidateIssuer* value tells OpenIdConnect not to restrict access to one specific organization.
174
171
175
172
## Add a controller to handle sign-in and sign-out requests
176
173
@@ -262,10 +259,8 @@ In Visual Studio, create a new view to add the sign-in button and to display use
262
259
</html>
263
260
```
264
261
265
-
<!--start-collapse-->
266
-
> ### More information
267
-
> This page adds a sign-in button in SVG format with a black background:<br/><br/> For more sign-in buttons, go to the [Branding guidelines](https://docs.microsoft.com/azure/active-directory/develop/active-directory-branding-guidelines "Branding guidelines").
268
-
<!--end-collapse-->
262
+
### More information
263
+
This page adds a sign-in button in SVG format with a black background:<br/><br/> For more sign-in buttons, go to the [Branding guidelines](https://docs.microsoft.com/azure/active-directory/develop/active-directory-branding-guidelines "Branding guidelines").
269
264
270
265
## Add a controller to display user's claims
271
266
This controller demonstrates the uses of the `[Authorize]` attribute to protect a controller. This attribute restricts access to the controller by allowing only authenticated users. The following code makes use of the attribute to display user claims that were retrieved as part of sign-in:
@@ -305,10 +300,8 @@ This controller demonstrates the uses of the `[Authorize]` attribute to protect
305
300
}
306
301
```
307
302
308
-
<!--start-collapse-->
309
-
> ### More information
310
-
> Because of the use of the `[Authorize]` attribute, all methods of this controller can be executed only if the user is authenticated. If the user isn't authenticated and tries to access the controller, OWIN initiates an authentication challenge and forces the user to authenticate. The preceding code looks at the list of claims for specific user attributes included in the user’s Id token. These attributes include the user’s full name and username, as well as the global user identifier subject. It also contains the *Tenant ID*, which represents the ID for the user’s organization.
311
-
<!--end-collapse-->
303
+
### More information
304
+
Because of the use of the `[Authorize]` attribute, all methods of this controller can be executed only if the user is authenticated. If the user isn't authenticated and tries to access the controller, OWIN initiates an authentication challenge and forces the user to authenticate. The preceding code looks at the list of claims for specific user attributes included in the user’s Id token. These attributes include the user’s full name and username, as well as the global user identifier subject. It also contains the *Tenant ID*, which represents the ID for the user’s organization.
312
305
313
306
## Create a view to display the user's claims
314
307
@@ -399,16 +392,16 @@ When you're ready to run your test, use an Azure AD account (work or school acco
399
392
<br/><br/>
400
393

401
394
402
-
<!--start-collapse-->
403
-
> ### Permissions and consent in the Microsoft identity platform endpoint
404
-
> Applications that integrate with Microsoft identity platform follow an authorization model that gives users and administrators control over how data can be accessed. After a user authenticates with Microsoft identity platform to access this application, they will be prompted to consent to the permissions requested by the application ("View your basic profile" and "Maintain access to data you have given it access to"). After accepting these permissions, the user will continue on to the application results. However, the user may instead be prompted with a **Need admin consent** page if either of the following occur:
405
-
> > - The application developer adds any additional permissions that require **Admin consent**.
406
-
> > - Or the tenant is configured (in **Enterprise Applications -> User Settings**) where users cannot consent to apps accessing company data on their behalf.
407
-
>
408
-
> For more information, refer to [Permissions and consent in the Microsoft identity platform endpoint](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent).
409
-
<!--end-collapse-->
395
+
#### Permissions and consent in the Microsoft identity platform endpoint
396
+
397
+
Applications that integrate with Microsoft identity platform follow an authorization model that gives users and administrators control over how data can be accessed. After a user authenticates with Microsoft identity platform to access this application, they will be prompted to consent to the permissions requested by the application ("View your basic profile" and "Maintain access to data you have given it access to"). After accepting these permissions, the user will continue on to the application results. However, the user may instead be prompted with a **Need admin consent** page if either of the following occur:
410
398
411
-
#### View application results
399
+
- The application developer adds any additional permissions that require **Admin consent**.
400
+
- Or the tenant is configured (in **Enterprise Applications -> User Settings**) where users cannot consent to apps accessing company data on their behalf.
401
+
402
+
For more information, refer to [Permissions and consent in the Microsoft identity platform endpoint](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent).
403
+
404
+
### View application results
412
405
413
406
After you sign in, the user is redirected to the home page of your website. The home page is the HTTPS URL that's specified in your application registration info in the Microsoft Application Registration Portal. The home page includes a *"Hello \<user>"* welcome message, a link to sign out, and a link to view the user’s claims. The link for the user's claims connects to the Claims controller that you created earlier.
414
407
@@ -442,14 +435,13 @@ You're prompted to authenticate to use the protected controller view.
442
435
443
436
## Advanced options
444
437
445
-
<!--start-collapse-->
446
438
### Protect your entire website
439
+
447
440
To protect your entire website, in the **Global.asax** file, add the `AuthorizeAttribute` attribute to the `GlobalFilters` filter in the `Application_Start` method:
0 commit comments