You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v1-android.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: mobile-android
14
14
ms.devlang: java
15
15
ms.topic: quickstart
16
-
ms.date: 09/24/2018
16
+
ms.date: 05/21/2019
17
17
ms.author: ryanwi
18
18
ms.reviewer: brandwe, jmprieur, saeeda
19
19
ms.custom: aaddev
@@ -84,18 +84,17 @@ You will need to have a native client application registered with Microsoft usin
84
84
- Select ***Azure Active Directory*** > ***App Registrations***.
85
85
86
86
2. Create the app
87
-
- Select **New application registration**.
87
+
- Select **New registration**.
88
88
- Enter an app name in the **Name** field.
89
-
- In **Application type** select **Native**.
90
-
- In **Redirect URI**, enter `http://localhost`.
89
+
- Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
90
+
- In **Redirect URI**, select **Public client (mobile and desktop)** from the dropdown and enter `http://localhost`.
91
+
- Click **Register**.
91
92
92
93
3. Configure Microsoft Graph
93
-
- Select **Settings > Required permissions**.
94
-
- Select **Add**, inside **Select an API** select ***Microsoft Graph***.
95
-
- Select the permission **Sign in and read user profile**, then hit **Select** to save.
96
-
- This permission maps to the `User.Read` scope.
97
-
- Optional: Inside **Required permissions > Windows Azure Active Directory**, remove the selected permission **Sign in and read user profile**. This will avoid the user consent page listing the permission twice.
98
-
94
+
- Select **API permissions**.
95
+
- Select **Add a permission**, inside **Select an API** select ***Microsoft Graph***.
96
+
- Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save.
97
+
99
98
4. Congrats! Your app is successfully configured. In the next section, you'll need:
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v1-dotnet.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: dotnet
16
16
ms.topic: quickstart
17
-
ms.date: 09/24/2018
17
+
ms.date: 05/21/2019
18
18
ms.author: ryanwi
19
19
ms.reviewer: jmprieur
20
20
ms.custom: aaddev
@@ -54,13 +54,15 @@ To enable your app to get tokens, register your app in your Azure AD tenant and
54
54
1. Sign in to the [Azure portal](https://portal.azure.com).
55
55
2. On the top bar, select your account and under the **Directory** list, choose the Active Directory tenant where you wish to register your application.
56
56
3. Select on **All services** in the left-hand nav, and choose **Azure Active Directory**.
57
-
4. On **App registrations**, choose **Add**.
58
-
5. Follow the prompts and create a new **Native** client application.
59
-
* The **Name** of the application will describe your application to end users
60
-
* The **Redirect Uri** is a scheme and string combination that Azure AD will use to return token responses. Enter a value specific to your application, for example, `http://DirectorySearcher`.
57
+
4. On **App registrations**, choose **New registration**.
58
+
5. Follow the prompts to create a new client application.
59
+
***Name** is the application name and describes your application to end users.
60
+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
61
+
***Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application (for example, `http://DirectorySearcher`) and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
61
62
62
63
6. Once you've completed registration, AAD will assign your app a unique Application ID. You'll need this value in the next sections, so copy it from the application page.
63
-
7. From the **Settings** page, choose **Required permissions** and choose **Add**. Select **Microsoft Graph** as the API, and under **Delegated permissions** add the **Read directory data** permission. Setting this permission enables your application to query the Graph API for users.
64
+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
65
+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v1-ios.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: mobile-ios
15
15
ms.devlang: objective-c
16
16
ms.topic: quickstart
17
-
ms.date: 09/24/2018
17
+
ms.date: 05/21/2019
18
18
ms.author: ryanwi
19
19
ms.custom: aaddev
20
20
ms.reviewer: brandwe
@@ -73,12 +73,13 @@ To set up your app to get tokens, you need to register the app in your Azure AD
73
73
1. Sign in to the [Azure portal](https://portal.azure.com).
74
74
2. On the top bar, select your account. Under the **Directory** list, choose the Active Directory tenant where you want to register your application.
75
75
3. Select **All services** in the leftmost navigation pane, and then select **Azure Active Directory**.
76
-
4. Select **App registrations**, and then select **Add**.
77
-
5. Follow the prompts to create a new **Native**client application.
76
+
4. Select **App registrations**, and then select **New registration**.
77
+
5. Follow the prompts to create a new client application.
78
78
***Name** is the application name and describes your application to end users.
79
-
***Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information.
79
+
***Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
80
80
6. After you've completed the registration, Azure AD assigns your app a unique application ID. You'll need this value in the next sections, so copy it from the application tab.
81
-
7. From the **Settings** page, select **Required permissions > Add > Microsoft Graph**, and then under **Delegated permissions** add the **Read directory data** permission. This permission sets up your application to query the Azure AD Graph API for users.
81
+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
82
+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v1-xamarin.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: mobile-xamarin
15
15
ms.devlang: dotnet
16
16
ms.topic: quickstart
17
-
ms.date: 09/24/2018
17
+
ms.date: 05/22/2019
18
18
ms.author: ryanwi
19
19
ms.reviewer: jmprieur
20
20
ms.custom: aaddev
@@ -53,14 +53,14 @@ To enable the app to get tokens, you first need to register it in your Azure AD
53
53
1. Sign in to the [Azure portal](https://portal.azure.com).
54
54
2. On the top bar, click your account. Then, under the **Directory** list, select the Active Directory tenant where you want to register the app.
55
55
3. Click **All services** in the left pane, and then select **Azure Active Directory**.
56
-
4. Click **App registrations**, and then select **Add**.
57
-
5. To create a new **Native Client Application**, follow the prompts.
56
+
4. Click **App registrations**, and then select **New registration**.
57
+
5. To create a new client application, follow the prompts.
58
58
***Name** describes the app to users.
59
+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
59
60
***Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value (for example, `http://DirectorySearcher`).
60
61
6. After you’ve completed registration, Azure AD assigns the app a unique application ID. Copy the value from the **Application** tab, because you'll need it later.
61
-
7. On the **Settings** page, select **Required Permissions**, and then select **Add**.
62
-
8. Select **Microsoft Graph** as the API. Under **Delegated Permissions**, add the **Read Directory Data** permission.
63
-
This action enables the app to query the Graph API for users.
62
+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
63
+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
Copy file name to clipboardExpand all lines: includes/active-directory-protocols-getting-started.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: dotnet
14
14
ms.topic: article
15
-
ms.date: 04/18/2018
15
+
ms.date: 05/22/2019
16
16
ms.author: priyamo
17
17
---
18
18
## Register your application with your AD tenant
@@ -22,10 +22,11 @@ First, you need to register your application with your Azure Active Directory (A
22
22
* Choose your Azure AD tenant by clicking on your account in the top right corner of the page, followed by clicking on the **Switch Directory** navigation and then select the appropriate tenant.
23
23
* Skip this step, if you've only one Azure AD tenant under your account or if you've already selected the appropriate Azure AD tenant.
24
24
* In the left hand navigation pane, click on **Azure Active Directory**.
25
-
* Click on **App Registrations** and click on **New application registration**.
26
-
* Follow the prompts and create a new application. It doesn't matter if it is a web application or a native application for this tutorial, but if you'd like specific examples for web applications or native applications, check out our [quickstarts](../articles/active-directory/develop/v1-overview.md).
27
-
* For Web Applications, provide the **Sign-On URL**, which is the base URL of your app, where users can sign in e.g `http://localhost:12345`.
28
-
<!--TODO: add once App ID URI is configurable: The **App ID URI** is a unique identifier for your application. The convention is to use `https://<tenant-domain>/<app-name>`, e.g. `https://contoso.onmicrosoft.com/my-first-aad-app`-->
29
-
* For Native Applications provide a **Redirect URI**, which Azure AD will use to return token responses. Enter a value specific to your application, .e.g `http://MyFirstAADApp`
30
-
* Once you've completed registration, Azure AD will assign your application a unique client identifier, the **Application ID**. You need this value in the next sections, so copy it from the application page.
25
+
* Click on **App Registrations** and click on **New registration**.
26
+
* Follow the prompts and create a new application. It doesn't matter if it is a web application or a public client (mobile & desktop) application for this tutorial, but if you'd like specific examples for web applications or public client applications, check out our [quickstarts](../articles/active-directory/develop/v1-overview.md).
27
+
***Name** is the application name and describes your application to end users.
28
+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
29
+
* Provide the **Redirect URI**. For Web Applications, this is the base URL of your app where users can sign in. For example, `http://localhost:12345`. For public client (mobile & desktop), Azure AD uses it to return token responses. Enter a value specific to your application. For example, `http://MyFirstAADApp`.
30
+
<!--TODO: add once App ID URI is configurable: The **App ID URI** is a unique identifier for your application. The convention is to use `https://<tenant-domain>/<app-name>`, e.g. `https://contoso.onmicrosoft.com/my-first-aad-app`-->
31
+
* Once you've completed registration, Azure AD will assign your application a unique client identifier (the **Application ID**). You need this value in the next sections, so copy it from the application page.
31
32
* To find your application in the Azure portal, click **App registrations**, and then click **View all applications**.
0 commit comments