Skip to content

Commit 8b04eb7

Browse files
authored
Merge pull request #77548 from rwike77/portalupdates2
Portalupdates2
2 parents 014fac9 + 052e72e commit 8b04eb7

File tree

6 files changed

+38
-35
lines changed

6 files changed

+38
-35
lines changed

articles/active-directory/develop/quickstart-v1-android.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: mobile-android
1414
ms.devlang: java
1515
ms.topic: quickstart
16-
ms.date: 09/24/2018
16+
ms.date: 05/21/2019
1717
ms.author: ryanwi
1818
ms.reviewer: brandwe, jmprieur, saeeda
1919
ms.custom: aaddev
@@ -84,18 +84,17 @@ You will need to have a native client application registered with Microsoft usin
8484
- Select ***Azure Active Directory*** > ***App Registrations***.
8585

8686
2. Create the app
87-
- Select **New application registration**.
87+
- Select **New registration**.
8888
- Enter an app name in the **Name** field.
89-
- In **Application type** select **Native**.
90-
- In **Redirect URI**, enter `http://localhost`.
89+
- Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
90+
- In **Redirect URI**, select **Public client (mobile and desktop)** from the dropdown and enter `http://localhost`.
91+
- Click **Register**.
9192

9293
3. Configure Microsoft Graph
93-
- Select **Settings > Required permissions**.
94-
- Select **Add**, inside **Select an API** select ***Microsoft Graph***.
95-
- Select the permission **Sign in and read user profile**, then hit **Select** to save.
96-
- This permission maps to the `User.Read` scope.
97-
- Optional: Inside **Required permissions > Windows Azure Active Directory**, remove the selected permission **Sign in and read user profile**. This will avoid the user consent page listing the permission twice.
98-
94+
- Select **API permissions**.
95+
- Select **Add a permission**, inside **Select an API** select ***Microsoft Graph***.
96+
- Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save.
97+
9998
4. Congrats! Your app is successfully configured. In the next section, you'll need:
10099
- `Application ID`
101100
- `Redirect URI`

articles/active-directory/develop/quickstart-v1-dotnet.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: dotnet
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/21/2019
1818
ms.author: ryanwi
1919
ms.reviewer: jmprieur
2020
ms.custom: aaddev
@@ -54,13 +54,15 @@ To enable your app to get tokens, register your app in your Azure AD tenant and
5454
1. Sign in to the [Azure portal](https://portal.azure.com).
5555
2. On the top bar, select your account and under the **Directory** list, choose the Active Directory tenant where you wish to register your application.
5656
3. Select on **All services** in the left-hand nav, and choose **Azure Active Directory**.
57-
4. On **App registrations**, choose **Add**.
58-
5. Follow the prompts and create a new **Native** client application.
59-
* The **Name** of the application will describe your application to end users
60-
* The **Redirect Uri** is a scheme and string combination that Azure AD will use to return token responses. Enter a value specific to your application, for example, `http://DirectorySearcher`.
57+
4. On **App registrations**, choose **New registration**.
58+
5. Follow the prompts to create a new client application.
59+
* **Name** is the application name and describes your application to end users.
60+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
61+
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application (for example, `http://DirectorySearcher`) and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
6162

6263
6. Once you've completed registration, AAD will assign your app a unique Application ID. You'll need this value in the next sections, so copy it from the application page.
63-
7. From the **Settings** page, choose **Required permissions** and choose **Add**. Select **Microsoft Graph** as the API, and under **Delegated permissions** add the **Read directory data** permission. Setting this permission enables your application to query the Graph API for users.
64+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
65+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
6466

6567
## Step 2: Install and configure ADAL
6668

articles/active-directory/develop/quickstart-v1-ios.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: mobile-ios
1515
ms.devlang: objective-c
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/21/2019
1818
ms.author: ryanwi
1919
ms.custom: aaddev
2020
ms.reviewer: brandwe
@@ -73,12 +73,13 @@ To set up your app to get tokens, you need to register the app in your Azure AD
7373
1. Sign in to the [Azure portal](https://portal.azure.com).
7474
2. On the top bar, select your account. Under the **Directory** list, choose the Active Directory tenant where you want to register your application.
7575
3. Select **All services** in the leftmost navigation pane, and then select **Azure Active Directory**.
76-
4. Select **App registrations**, and then select **Add**.
77-
5. Follow the prompts to create a new **Native** client application.
76+
4. Select **App registrations**, and then select **New registration**.
77+
5. Follow the prompts to create a new client application.
7878
* **Name** is the application name and describes your application to end users.
79-
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information.
79+
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
8080
6. After you've completed the registration, Azure AD assigns your app a unique application ID. You'll need this value in the next sections, so copy it from the application tab.
81-
7. From the **Settings** page, select **Required permissions > Add > Microsoft Graph**, and then under **Delegated permissions** add the **Read directory data** permission. This permission sets up your application to query the Azure AD Graph API for users.
81+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
82+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
8283

8384
## Step 3: Install and configure ADAL
8485

articles/active-directory/develop/quickstart-v1-xamarin.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: mobile-xamarin
1515
ms.devlang: dotnet
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/22/2019
1818
ms.author: ryanwi
1919
ms.reviewer: jmprieur
2020
ms.custom: aaddev
@@ -53,14 +53,14 @@ To enable the app to get tokens, you first need to register it in your Azure AD
5353
1. Sign in to the [Azure portal](https://portal.azure.com).
5454
2. On the top bar, click your account. Then, under the **Directory** list, select the Active Directory tenant where you want to register the app.
5555
3. Click **All services** in the left pane, and then select **Azure Active Directory**.
56-
4. Click **App registrations**, and then select **Add**.
57-
5. To create a new **Native Client Application**, follow the prompts.
56+
4. Click **App registrations**, and then select **New registration**.
57+
5. To create a new client application, follow the prompts.
5858
* **Name** describes the app to users.
59+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
5960
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value (for example, `http://DirectorySearcher`).
6061
6. After you’ve completed registration, Azure AD assigns the app a unique application ID. Copy the value from the **Application** tab, because you'll need it later.
61-
7. On the **Settings** page, select **Required Permissions**, and then select **Add**.
62-
8. Select **Microsoft Graph** as the API. Under **Delegated Permissions**, add the **Read Directory Data** permission.
63-
This action enables the app to query the Graph API for users.
62+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
63+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
6464

6565
## Step 3: Install and configure ADAL
6666

articles/active-directory/develop/v1-protocols-openid-connect-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 03/04/2019
17+
ms.date: 05/22/2019
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin
2020
ms.custom: aaddev

includes/active-directory-protocols-getting-started.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: dotnet
1414
ms.topic: article
15-
ms.date: 04/18/2018
15+
ms.date: 05/22/2019
1616
ms.author: priyamo
1717
---
1818
## Register your application with your AD tenant
@@ -22,10 +22,11 @@ First, you need to register your application with your Azure Active Directory (A
2222
* Choose your Azure AD tenant by clicking on your account in the top right corner of the page, followed by clicking on the **Switch Directory** navigation and then select the appropriate tenant.
2323
* Skip this step, if you've only one Azure AD tenant under your account or if you've already selected the appropriate Azure AD tenant.
2424
* In the left hand navigation pane, click on **Azure Active Directory**.
25-
* Click on **App Registrations** and click on **New application registration**.
26-
* Follow the prompts and create a new application. It doesn't matter if it is a web application or a native application for this tutorial, but if you'd like specific examples for web applications or native applications, check out our [quickstarts](../articles/active-directory/develop/v1-overview.md).
27-
* For Web Applications, provide the **Sign-On URL**, which is the base URL of your app, where users can sign in e.g `http://localhost:12345`.
28-
<!--TODO: add once App ID URI is configurable: The **App ID URI** is a unique identifier for your application. The convention is to use `https://<tenant-domain>/<app-name>`, e.g. `https://contoso.onmicrosoft.com/my-first-aad-app`-->
29-
* For Native Applications provide a **Redirect URI**, which Azure AD will use to return token responses. Enter a value specific to your application, .e.g `http://MyFirstAADApp`
30-
* Once you've completed registration, Azure AD will assign your application a unique client identifier, the **Application ID**. You need this value in the next sections, so copy it from the application page.
25+
* Click on **App Registrations** and click on **New registration**.
26+
* Follow the prompts and create a new application. It doesn't matter if it is a web application or a public client (mobile & desktop) application for this tutorial, but if you'd like specific examples for web applications or public client applications, check out our [quickstarts](../articles/active-directory/develop/v1-overview.md).
27+
* **Name** is the application name and describes your application to end users.
28+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
29+
* Provide the **Redirect URI**. For Web Applications, this is the base URL of your app where users can sign in. For example, `http://localhost:12345`. For public client (mobile & desktop), Azure AD uses it to return token responses. Enter a value specific to your application. For example, `http://MyFirstAADApp`.
30+
<!--TODO: add once App ID URI is configurable: The **App ID URI** is a unique identifier for your application. The convention is to use `https://<tenant-domain>/<app-name>`, e.g. `https://contoso.onmicrosoft.com/my-first-aad-app`-->
31+
* Once you've completed registration, Azure AD will assign your application a unique client identifier (the **Application ID**). You need this value in the next sections, so copy it from the application page.
3132
* To find your application in the Azure portal, click **App registrations**, and then click **View all applications**.

0 commit comments

Comments
 (0)