You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-protected-web-api-app-configuration.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,8 +111,11 @@ Microsoft recommends you use the [Microsoft.Identity.Web](https://www.nuget.org/
111
111
112
112
_Microsoft.Identity.Web_ provides the glue between ASP.NET Core, the authentication middleware, and the [Microsoft Authentication Library (MSAL)](msal-overview.md) for .NET. It allows for a clearer, more robust developer experience and leverages the power of the Microsoft identity platform and Azure AD B2C.
113
113
114
+
#### ASP.NET for .NET 6.0
114
115
115
-
**ASP.NET for .NET 6.0** - To create a new web API project that uses Microsoft.Identity.Web, use a project template in the .NET 6.0 CLI or Visual Studio.
116
+
To create a new web API project that uses Microsoft.Identity.Web, use a project template in the .NET 6.0 CLI or Visual Studio.
117
+
118
+
**Dotnet core CLI**
116
119
117
120
```dotnetcli
118
121
# Create new web API that uses Microsoft.Identity.Web
@@ -212,9 +215,7 @@ public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
212
215
```
213
216
214
217
> [!NOTE]
215
-
>IfyouuseMicrosoft.Identity.Webanddon't set the `Audience` in *appsettings.json*, the following is used:
216
-
>- `$"{ClientId}"` ifyouhavesetthe [accesstokenacceptedversion](scenario-protected-web-api-app-registration.md#accepted-token-version) to `2`, orforAzureADB2CwebAPIs.
217
-
>- `$"api://{ClientId}` in all other cases (for v1.0 [access tokens](access-tokens.md)).
218
+
>IfyouuseMicrosoft.Identity.Webanddon't set the `Audience` in *appsettings.json*, `$"{ClientId}"` is automatically used if you have set the [access token accepted version](scenario-protected-web-api-app-registration.md#accepted-token-version) to `2`, or for Azure AD B2C web APIs.
218
219
219
220
## Token validation
220
221
@@ -283,3 +284,4 @@ You can also validate incoming access tokens in Azure Functions. You can find ex
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-web-api-call-api-app-configuration.md
+24-48Lines changed: 24 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,27 +81,19 @@ Instead of a client secret, you can provide a client certificate. The following
81
81
82
82
Microsoft.Identity.Web provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web wiki - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
83
83
84
-
## Startup.cs
84
+
## Program.cs
85
85
86
-
Your web API will need to acquire a token for the downstream API. You specify it by adding the `.EnableTokenAcquisitionToCallDownstreamApi()` line after `.AddMicrosoftIdentityWebApi(Configuration)`. This line exposes the `ITokenAcquisition` service, that you can use in your controller/pages actions. However, as you'll see in the next two bullet points, you can do even simpler. You'll also need to choose a token cache implementation, for example `.AddInMemoryTokenCaches()`, in *Startup.cs*:
86
+
Your web API will need to acquire a token for the downstream API. You specify it by adding the `.EnableTokenAcquisitionToCallDownstreamApi()` line after `.AddMicrosoftIdentityWebApi(Configuration)`. This line exposes the `ITokenAcquisition` service, that you can use in your controller/pages actions. However, as you'll see in the next two bullet points, you can do even simpler. You'll also need to choose a token cache implementation, for example `.AddInMemoryTokenCaches()`, in *Program.cs*. If you use ASP.NET Core 3.1 or 5.0 the code will be similar but in the *Startup.cs* file.
If you don't want to acquire the token yourself, *Microsoft.Identity.Web* provides two mechanisms for calling a downstream web API from another API. The option you choose depends on whether you want to call Microsoft Graph or another API.
@@ -111,26 +103,18 @@ If you don't want to acquire the token yourself, *Microsoft.Identity.Web* provid
111
103
If you want to call Microsoft Graph, Microsoft.Identity.Web enables you to directly use the `GraphServiceClient` (exposed by the Microsoft Graph SDK) in your API actions. To expose Microsoft Graph:
112
104
113
105
1. Add the [Microsoft.Identity.Web.MicrosoftGraph](https://www.nuget.org/packages/Microsoft.Identity.Web.MicrosoftGraph) NuGet package to your project.
114
-
1. Add `.AddMicrosoftGraph()` after `.EnableTokenAcquisitionToCallDownstreamApi()` in the *Startup.cs* file. `.AddMicrosoftGraph()` has several overrides. Using the override that takes a configuration section as a parameter, the code becomes:
106
+
1. Add `.AddMicrosoftGraph()` after `.EnableTokenAcquisitionToCallDownstreamApi()` in the *Program.cs* file. `.AddMicrosoftGraph()` has several overrides. Using the override that takes a configuration section as a parameter, the code becomes:
As with web apps, you can choose various token cache implementations. For details, see [Microsoft identity web - Token cache serialization](https://aka.ms/ms-id-web/token-cache-serialization) on GitHub.
161
137
162
-
The following image shows the various possibilities of *Microsoft.Identity.Web* and their impact on the *Startup.cs* file:
138
+
The following image shows the various possibilities of *Microsoft.Identity.Web* and their impact on the *Program.cs* file:
163
139
164
140
:::image type="content" source="media/scenarios/microsoft-identity-web-startup-cs.svg" alt-text="Block diagram showing service configuration options in startup dot C S for calling a web API and specifying a token cache implementation":::
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-activate-roles.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,22 +4,22 @@ description: Learn how to activate your privileged access group roles in Azure A
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
7
-
manager: karenhoran
7
+
manager: amycolannino
8
8
ms.service: active-directory
9
9
ms.topic: how-to
10
10
ms.tgt_pltfrm: na
11
11
ms.workload: identity
12
12
ms.subservice: pim
13
-
ms.date: 02/24/2022
13
+
ms.date: 08/24/2022
14
14
ms.author: amsliu
15
-
ms.reviewer: shaunliu
15
+
ms.reviewer: ilyal
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
20
# Activate my privileged access group roles in Privileged Identity Management
21
21
22
-
Use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra,to allow eligible role members for privileged access groups to schedule role activation for a specified date and time. They can also select a activation duration up to the maximum duration configured by administrators.
22
+
Use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra,to allow eligible role members for privileged access groups to schedule role activation for a specified date and time. They can also select an activation duration up to the maximum duration configured by administrators.
23
23
24
24
This article is for eligible members who want to activate their privileged access group role in Privileged Identity Management.
0 commit comments