You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-java-webapp.md
+61-9Lines changed: 61 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,27 +32,27 @@ To run this sample you will need:
32
32
>
33
33
> ### Option 1: Register and auto configure your app and then download your code sample
34
34
>
35
-
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps).
35
+
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/JavaQuickstartPage/sourceType/docs) quickstart experience.
36
36
> 1. Enter a name for your application and select **Register**.
37
-
> 1. Follow the instructions to download and automatically configure your new application.
37
+
> 1. Follow the instructions in the portal's quickstart experience to download the automatically configured application code.
38
38
>
39
39
> ### Option 2: Register and manually configure your application and code sample
40
40
>
41
41
> #### Step 1: Register your application
42
42
>
43
-
> To register your application and manually add the app's registration information to your solution, follow these steps:
43
+
> To register your application and manually add the app's registration information to your application, follow these steps:
44
44
>
45
45
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
46
46
> 1. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the desired Azure AD tenant.
47
47
>
48
-
> 1. Navigate to the Microsoft identity platform for developers [App registrations](/azure/active-directory/develop/) page.
48
+
> 1. Navigate to the Microsoft identity platform for developers [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) page.
49
49
> 1. Select **New registration**.
50
50
> 1. When the **Register an application** page appears, enter your application's registration information:
51
51
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `java-webapp`.
52
-
> -Leave **Redirect URI** blank for now, and select**Register**.
52
+
> -Select**Register**.
53
53
> 1. On the **Overview** page, find the **Application (client) ID** and the **Directory (tenant) ID** values of the application. Copy these values for later.
54
54
> 1. Select the **Authentication** from the menu, and then add the following information:
55
-
> -In **Redirect URIs**, add `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
55
+
> -Add the **Web** platform configuration. Add these `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me` as **Redirect URIs**..
56
56
> - Select **Save**.
57
57
> 1. Select the **Certificates & secrets** from the menu and in the **Client secrets** section, click on **New client secret**:
58
58
>
@@ -80,7 +80,7 @@ To run this sample you will need:
80
80
81
81
> [!div class="sxs-lookup" renderon="portal"]
82
82
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
83
-
>
83
+
>
84
84
> To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
85
85
>
86
86
> ```
@@ -93,7 +93,7 @@ To run this sample you will need:
93
93
> server.ssl.key-alias=testCert
94
94
> ```
95
95
> Put the generated keystore file in the "resources" folder.
> [Download the code sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
99
99
@@ -153,8 +153,56 @@ If you are running the web application from an IDE, click on run, then navigate
153
153
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
154
154
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
155
155
156
+
##### Running from Tomcat
157
+
158
+
If you would like to deploy the web sample to Tomcat, you will need to make a couple of changes to the source code.
159
+
160
+
1. Open ms-identity-java-webapp/pom.xml
161
+
- Under `<name>msal-web-sample</name>` add `<packaging>war</packaging>`
3. Open a command prompt, go to the root folder of the project, and run `mvn package`
199
+
- This will generate a `msal-web-sample-0.1.0.war` file in your /targets directory.
200
+
- Rename this file to `ROOT.war`
201
+
- Deploy this war file using Tomcat or any other J2EE container solution.
202
+
- To deploy on Tomcat container, copy the .war file to the webapps folder under your Tomcat installation and then start the Tomcat server.
203
+
204
+
This WAR will automatically be hosted at https://localhost:8080/.
156
205
157
-
158
206
> [!IMPORTANT]
159
207
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [Certificate credentials for application authentication](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials).
160
208
@@ -169,6 +217,8 @@ MSAL for Java (MSAL4J) is the Java library used to sign in users and request tok
169
217
170
218
Add MSAL4J to your application by using Maven or Gradle to manage your dependencies by making the following changes to the application's pom.xml (Maven) or build.gradle (Gradle) file.
171
219
220
+
In pom.xml:
221
+
172
222
```XML
173
223
<dependency>
174
224
<groupId>com.microsoft.azure</groupId>
@@ -177,6 +227,8 @@ Add MSAL4J to your application by using Maven or Gradle to manage your dependenc
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-python-webapp.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.topic: quickstart
11
11
ms.workload: identity
12
12
ms.date: 09/25/2019
13
13
ms.author: abpati
14
-
ms.custom: aaddev
14
+
ms.custom: aaddev
15
15
---
16
16
17
17
# Quickstart: Add sign-in with Microsoft to a Python web app
@@ -38,8 +38,7 @@ To run this sample, you will need:
38
38
>
39
39
> ### Option 1: Register and auto configure your app and then download your code sample
40
40
>
41
-
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps).
42
-
> 1. Select **New registration**.
41
+
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/PythonQuickstartPage/sourceType/docs).
43
42
> 1. Enter a name for your application and select **Register**.
44
43
> 1. Follow the instructions to download and automatically configure your new application.
45
44
>
@@ -56,8 +55,11 @@ To run this sample, you will need:
56
55
> 1. When the **Register an application** page appears, enter your application's registration information:
57
56
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `python-webapp`.
58
57
> - Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
59
-
> - Under the **Redirect URI** section, in the drop-down list, select the **Web** platform, and then set the value to `http://localhost:5000/getAToken`.
60
-
> - Select **Register**. On the app **Overview** page, note the **Application (client) ID** value for later use.
58
+
> - Select **Register**.
59
+
> - On the app **Overview** page, note the **Application (client) ID** value for later use.
60
+
> 1. Select the **Authentication** from the menu, and then add the following information:
61
+
> - Add the **Web** platform configuration. Add `http://localhost:5000/getAToken` as **Redirect URIs**.
62
+
> - Select **Save**.
61
63
> 1. On the left hand menu, choose **Certificates & secrets** and click on **New client secret** in the **Client Secrets** section:
62
64
>
63
65
> - Type a key description (of instance app secret).
@@ -102,11 +104,11 @@ To run this sample, you will need:
102
104
103
105
> [!div renderon="docs"]
104
106
> #### Step 3: Configure the Application
105
-
>
107
+
>
106
108
> 1. Extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
107
109
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
108
110
> 1. Open the **app_config.py** file, which can be found in the root folder and replace with the following code snippet:
Using Azure Active Directory (Azure AD), you can designate limited administrators to manage identity tasks in less-privileged roles. Administrators can be assigned for such purposes as adding or changing users, assigning administrative roles, resetting user passwords, managing user licenses, and managing domain names. The default user permissions can be changed only in user settings in Azure AD.
22
22
23
-
## Limit the use of Global administrator
23
+
## Limit use of Global administrator
24
24
25
25
Users who are assigned to the Global administrator role can read and modify every administrative setting in your Azure AD organization. By default, the person who signs up for an Azure subscription is assigned the Global administrator role for the Azure AD organization. Only Global administrators and Privileged Role administrators can delegate administrator roles. To reduce the risk to your business, we recommend that you assign this role to the fewest possible people in your organization.
26
26
@@ -65,7 +65,8 @@ Users in this role can create application registrations when the "Users can regi
Users in this role can set or reset non-password credentials, update passwords, require to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device** (which prompts for MFA on the next sign-in) of users who are non-administrators or assigned the following roles only:
68
+
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials and can update passwords for all users. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
69
+
69
70
* Authentication Administrator
70
71
* Directory Readers
71
72
* Guest Inviter
@@ -134,7 +135,7 @@ Users in this role can enable, disable, and delete devices in Azure AD and read
Users with this role have permissions to manage compliance-related features in the Microsoft 365 compliance center, Microsoft 365 admin center, Azure, and Office 365 Security & Compliance Center. Assignees can also create support tickets for Azure and Microsoft 365. More information is available at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
138
+
Users with this role have permissions to manage compliance-related features in the Microsoft 365 compliance center, Microsoft 365 admin center, Azure, and Office 365 Security & Compliance Center. Assignees can also manage all features within the Exchange admin center and Teams & Skype for Business admin centers and create support tickets for Azure and Microsoft 365. More information is available at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
138
139
139
140
In | Can do
140
141
----- | ----------
@@ -759,7 +760,10 @@ Can read and manage compliance configuration and reports in Azure AD and Office
759
760
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
760
761
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
761
762
| microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
763
+
| microsoft.office365.exchange/allEntities/allTasks | Manage all aspects of Exchange Online. |
762
764
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
765
+
| microsoft.office365.sharepoint/allEntities/allTasks | Create and delete all resources, and read and update standard properties in microsoft.office365.sharepoint. |
766
+
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
763
767
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
764
768
765
769
### Compliance Data Administrator permissions
@@ -779,7 +783,10 @@ Creates and manages compliance content.
779
783
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
780
784
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
781
785
| microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
786
+
| microsoft.office365.exchange/allEntities/allTasks | Manage all aspects of Exchange Online. |
782
787
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
788
+
| microsoft.office365.sharepoint/allEntities/allTasks | Create and delete all resources, and read and update standard properties in microsoft.office365.sharepoint. |
789
+
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
783
790
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
784
791
785
792
### Conditional Access Administrator permissions
@@ -1750,8 +1757,31 @@ The following roles should not be used. They have been deprecated and will be re
1750
1757
* Mailbox Administrator
1751
1758
* Workplace Device Join
1752
1759
1760
+
## Roles not shown in the portal
1761
+
1762
+
Not every role returned by PowerShell or MS Graph API is visible in Azure portal. The following table organizes those differences.
1763
+
1764
+
API name | Azure portal name | Notes
1765
+
-------- | ------------------- | -------------
1766
+
Company Administrator | Global Administrator | [Name changed for better clarity](directory-assign-admin-roles.md#role-template-ids)
1767
+
CRM Service Administrator | Dynamics 365 administrator | [Reflects current product branding](directory-assign-admin-roles.md#role-template-ids)
Directory Synchronization Accounts | Not shown because it shouldn't be used | [Directory Synchronization Accounts documentation](directory-assign-admin-roles.md#directory-synchronization-accounts)
1772
+
Directory Writers | Not shown because it shouldn't be used | [Directory Writers documentation](directory-assign-admin-roles.md#directory-writers)
1773
+
Guest User | Not shown because it can't be used | NA
1774
+
Lync Service Administrator | Skype for Business administrator | [Reflects current product branding](directory-assign-admin-roles.md#role-template-ids)
1775
+
Partner Tier 1 Support | Not shown because it shouldn't be used | [Partner Tier1 Support documentation](directory-assign-admin-roles.md#partner-tier1-support)
1776
+
Partner Tier 2 Support | Not shown because it shouldn't be used | [Partner Tier2 Support documentation](directory-assign-admin-roles.md#partner-tier2-support)
1777
+
Printer Administrator | Work in progress | Work in progress
1778
+
Printer Technician | Work in progress | Work in progress
1779
+
Restricted Guest User | Not shown because it can't be used | NA
* To learn more about how to assign a user as an administrator of an Azure subscription, see [Manage access using RBAC and the Azure portal](../../role-based-access-control/role-assignments-portal.md)
1756
-
* To learn more about how resource access is controlled in Microsoft Azure, see [Understanding resource access in Azure](../../role-based-access-control/rbac-and-directory-admin-roles.md)
1785
+
* To learn more about how to assign a user as an administrator of an Azure subscription, see [Manage access using Azure roles (Azure RBAC)](../../role-based-access-control/role-assignments-portal.md)
1786
+
* To learn more about how resource access is controlled in Microsoft Azure, see [Understand the different roles](../../role-based-access-control/rbac-and-directory-admin-roles.md)
1757
1787
* For more information on how Azure Active Directory relates to your Azure subscription, see [How Azure subscriptions are associated with Azure Active Directory](../fundamentals/active-directory-how-subscriptions-associated-directory.md)
0 commit comments