Skip to content

Commit 90d8047

Browse files
Merge pull request #250030 from davidmu1/updatesteps31
Updatesteps31
2 parents 2e8bc0a + bbc38c0 commit 90d8047

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In this tutorial:
2424
> [!div class="checklist"]
2525
>
2626
> - Create an iOS or macOS app project in _Xcode_
27-
> - Register the app in the Azure portal
27+
> - Register the app in the Microsoft Entra admin center
2828
> - Add code to support user sign-in and sign-out
2929
> - Add code to call the Microsoft Graph API
3030
> - Test the app
@@ -63,14 +63,14 @@ If you'd like to download a completed version of the app you build in this tutor
6363
5. Set the **Language** to **Swift** and select **Next**.
6464
6. Select a folder to create your app and select **Create**.
6565

66-
## Register your application
66+
## Register the application
6767

6868
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6969

70-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
71-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
72-
1. Search for and select **Azure Active Directory**.
73-
1. Under **Manage**, select **App registrations** > **New registration**.
70+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
71+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
72+
1. Browse to **Identity** > **Applications** > **App registrations**.
73+
1. Select **New registration**.
7474
1. Enter a **Name** for your application. Users of your app might see this name, and you can change it later.
7575
1. Select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)** under **Supported account types**.
7676
1. Select **Register**.
@@ -125,7 +125,7 @@ carthage update --platform macOS
125125

126126
You can also use Git Submodule, or check out the latest release to use as a framework in your application.
127127

128-
## Add your app registration
128+
## Add the app registration
129129

130130
Next, we add your app registration to your code.
131131

@@ -138,7 +138,7 @@ import MSAL
138138
Next, add the following code to _ViewController.swift_ before to `viewDidLoad()`:
139139

140140
```swift
141-
// Update the below to your client ID you received in the portal. The below is for running the demo only
141+
// Update the below to your client ID. The below is for running the demo only
142142
let kClientID = "Your_Application_Id_Here"
143143
let kGraphEndpoint = "https://graph.microsoft.com/" // the Microsoft Graph endpoint
144144
let kAuthority = "https://login.microsoftonline.com/common" // this authority allows a personal Microsoft account and a work or school account in any organization's Azure AD tenant to sign in
@@ -151,7 +151,7 @@ var webViewParameters : MSALWebviewParameters?
151151
var currentAccount: MSALAccount?
152152
```
153153

154-
The only value you modify is the value assigned to `kClientID` to be your [Application ID](./developer-glossary.md#application-client-id). This value is part of the MSAL Configuration data that you saved during the step at the beginning of this tutorial to register the application in the Azure portal.
154+
The only value you modify is the value assigned to `kClientID` to be your [Application ID](./developer-glossary.md#application-client-id). This value is part of the MSAL Configuration data that you saved during the step at the beginning of this tutorial to register the application.
155155

156156
## Configure Xcode project settings
157157

@@ -163,7 +163,7 @@ Add a new keychain group to your project **Signing & Capabilities**. The keychai
163163

164164
In this step, you'll register `CFBundleURLSchemes` so that the user can be redirected back to the app after sign in. By the way, `LSApplicationQueriesSchemes` also allows your app to make use of Microsoft Authenticator.
165165

166-
In Xcode, open _Info.plist_ as a source code file, and add the following inside of the `<dict>` section. Replace `[BUNDLE_ID]` with the value you used in the Azure portal. If you downloaded the code, the bundle identifier is `com.microsoft.identitysample.MSALiOS`. If you're creating your own project, select your project in Xcode and open the **General** tab. The bundle identifier appears in the **Identity** section.
166+
In Xcode, open _Info.plist_ as a source code file, and add the following inside of the `<dict>` section. Replace `[BUNDLE_ID]` with the value you previously used. If you downloaded the code, the bundle identifier is `com.microsoft.identitysample.MSALiOS`. If you're creating your own project, select your project in Xcode and open the **General** tab. The bundle identifier appears in the **Identity** section.
167167

168168
```xml
169169
<key>CFBundleURLTypes</key>
@@ -846,7 +846,7 @@ This app is built for a single account scenario. MSAL also supports multi-accoun
846846

847847
Build and deploy the app to a test device or simulator. You should be able to sign in and get tokens for Azure AD or personal Microsoft accounts.
848848

849-
The first time a user signs into your app, they'll be prompted by Microsoft identity to consent to the permissions requested. While most users are capable of consenting, some Azure AD tenants have disabled user consent, which requires admins to consent on behalf of all users. To support this scenario, register your app's scopes in the Azure portal.
849+
The first time a user signs into your app, they'll be prompted by Microsoft identity to consent to the permissions requested. While most users are capable of consenting, some Azure AD tenants have disabled user consent, which requires admins to consent on behalf of all users. To support this scenario, register your app's scopes.
850850

851851
After you sign in, the app will display the data returned from the Microsoft Graph `/me` endpoint.
852852

0 commit comments

Comments
 (0)