Skip to content

Commit a100744

Browse files
authored
Merge pull request #95580 from MicrosoftDocs/master
11/11 PM Publish
2 parents 826b6e8 + a01bc9c commit a100744

File tree

1,426 files changed

+894
-790
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,426 files changed

+894
-790
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/digital-twins/how-to-use-legacy-aad.md",
5+
"redirect_url": "/azure/digital-twins/quickstart-view-occupancy-dotnet#set-permissions-for-your-app",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/php-download-sdk.md",
510
"redirect_url": "https://github.com/Azure/azure-sdk-for-php",
@@ -41813,6 +41818,11 @@
4181341818
"redirect_url": "/azure/iot-central/preview/tutorial-define-edge-device-type/",
4181441819
"redirect_document_id": false
4181541820
},
41821+
{
41822+
"source_path": "articles/iot-central/core/tutorial-add-edge-as-leaf-device.md",
41823+
"redirect_url": "/azure/iot-central/preview/tutorial-add-edge-as-leaf-device/",
41824+
"redirect_document_id": false
41825+
},
4181641826
{
4181741827
"source_path": "articles/iot-central/core/tutorial-use-device-groups-pnp.md",
4181841828
"redirect_url": "/azure/iot-central/preview/tutorial-use-device-groups/",
@@ -43587,6 +43597,11 @@
4358743597
"source_path": "articles/active-directory/develop/app-registrations-training-guide.md",
4358843598
"redirect_url": "articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md",
4358943599
"redirect_document_id": false
43600+
},
43601+
{
43602+
"source_path": "articles/azure-monitor/app/powershell-script-create-resource.md",
43603+
"redirect_url": "/azure/azure-monitor/app/create-new-resource#creating-a-resource-automatically",
43604+
"redirect_document_id": false
4359043605
}
4359143606
]
4359243607
}

articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure portal app registrations training guide (legacy) - Azure
3-
description: An introduction to the new application registration experience in the Microsoft identity platform.
2+
title: Training guide for transitioning from App registrations (Legacy) to the new App registrations experience in the Azure portal
3+
description: An introduction to the new App registration experience in the Azure portal
44
services: active-directory
55
documentationcenter: ''
66
author: archieag
@@ -20,7 +20,7 @@ ms.custom: aaddev
2020
ms.collection: M365-identity-device-management
2121
---
2222

23-
# Training guide: App registrations in the Azure portal (legacy)
23+
# Transitioning from App registrations (Legacy) to the new App registrations experience in the Azure portal
2424

2525
You can find many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're familiar with the App registrations (legacy) experience in the Azure portal, use this training guide to get started using the new experience.
2626

@@ -128,4 +128,4 @@ The new experience adds UI controls for the following properties:
128128
The new experience has the following limitations:
129129

130130
- The format of client secrets (app passwords) is different than that of the legacy experience and may break CLI.
131-
- Changing the value for supported accounts is not supported in the UI. You need to use the app manifest unless you're switching between Azure AD single-tenant and multi-tenant.
131+
- Changing the value for supported accounts is not supported in the UI. You need to use the app manifest unless you're switching between Azure AD single-tenant and multi-tenant.

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ It's up to the app for which the token was generated, the web app that signed-in
7171

7272
Tokens are only valid for a limited amount of time. Usually the STS provides a pair of tokens: an access token to access the application or protected resource, and a refresh token used to refresh the access token when the access token is close to expiring.
7373

74-
Access tokens are passed to a Web API as the bearer token in the `Authenticate` header. An app can provide a refresh token to the STS, and if the user access to the app wasn't revoked, it will get back a new access token and a new refresh token. This is how the scenario of someone leaving the enterprise is handled. When the STS receives the refresh token, it won't issue another valid access token if the user is no longer authorized.
74+
Access tokens are passed to a Web API as the bearer token in the `Authorization` header. An app can provide a refresh token to the STS, and if the user access to the app wasn't revoked, it will get back a new access token and a new refresh token. This is how the scenario of someone leaving the enterprise is handled. When the STS receives the refresh token, it won't issue another valid access token if the user is no longer authorized.
7575

7676
## Application model
7777

articles/active-directory/develop/sample-v2-code.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,18 @@ The following samples show how to protect a web API with the Microsoft identity
102102
| ![This image shows the ASP.NET Core logo](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.2 | ASP.NET Core web API (service) of [dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi-calls-msgraph) |
103103
| ![This image shows the ASP.NET logo](media/sample-v2-code/logo_NET.png)</p>ASP.NET MVC | Web API (service) of [ms-identity-aspnet-webapi-onbehalfof](https://github.com/Azure-Samples/ms-identity-aspnet-webapi-onbehalfof) |
104104

105+
## Azure Functions as web APIs
106+
107+
The following samples show how to protect an Azure Function using HttpTrigger and exposing a web API with the Microsoft identity platform endpoint, and how to call a downstream API from the web API.
108+
109+
| Platform | Sample |
110+
| -------- | ------------------- |
111+
| ![This image shows the ASP.NET Core logo](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.2 | ASP.NET Core web API (service) Azure Function of [dotnet-native-aspnetcore-v2](https://github.com/Azure-Samples/ms-identity-dotnet-webapi-azurefunctions) |
112+
| ![This image shows the Node.js logo](media/sample-v2-code/logo_nodejs.png)</p>NodeJS | Web API (service) of [NodeJS and passport-azure-ad](https://github.com/Azure-Samples/ms-identity-nodejs-webapi-azurefunctions) |
113+
| ![This image shows the Python logo](media/sample-v2-code/logo_python.png)</p>Python | Web API (service) of [Python](https://github.com/Azure-Samples/ms-identity-python-webapi-azurefunctions) |
114+
| ![This image shows the Node.js logo](media/sample-v2-code/logo_nodejs.png)</p>NodeJS | Web API (service) of [NodeJS and passport-azure-ad using on behalf of](https://github.com/Azure-Samples/ms-identity-nodejs-webapi-onbehalfof-azurefunctions) |
115+
116+
105117
## Other Microsoft Graph samples
106118

107119
To learn about [samples](https://github.com/microsoftgraph/msgraph-community-samples/tree/master/samples#aspnet) and tutorials that demonstrate different usage patterns for the Microsoft Graph API, including authentication with Azure AD, see [Microsoft Graph Community samples & tutorials](https://github.com/microsoftgraph/msgraph-community-samples).

articles/active-directory/develop/v2-app-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ In addition to simple sign-in, a web server app might need to access another web
8686

8787
## Web APIs
8888

89-
You can use the Microsoft identity platform endpoint to secure web services, such as your app's RESTful Web API. Instead of ID tokens and session cookies, a Web API uses an OAuth 2.0 access token to secure its data and to authenticate incoming requests. The caller of a Web API appends an access token in the authorization header of an HTTP request, like this:
89+
You can use the Microsoft identity platform endpoint to secure web services, such as your app's RESTful Web API. Web APIs can be implemented in numerous platforms and languages. They can also be implemented using HTTP Triggers in Azure Functions. Instead of ID tokens and session cookies, a Web API uses an OAuth 2.0 access token to secure its data and to authenticate incoming requests. The caller of a Web API appends an access token in the authorization header of an HTTP request, like this:
9090

9191
```
9292
GET /api/items HTTP/1.1

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -183,18 +183,18 @@ When you're ready to request permissions from your organization's admin, you can
183183

184184
```
185185
// Line breaks are for legibility only.
186-
GET https://login.microsoftonline.com/{tenant}/v2.0/adminconsent?
186+
GET https://login.microsoftonline.com/{tenant}/v2.0/adminconsent?
187187
client_id=6731de76-14a6-49ae-97bc-6eba6914391e
188188
&state=12345
189189
&redirect_uri=http://localhost/myapp/permissions
190-
&scope=
191-
https://graph.microsoft.com/calendars.read
192-
https://graph.microsoft.com/mail.send
190+
&scope=
191+
https://graph.microsoft.com/calendars.read
192+
https://graph.microsoft.com/mail.send
193193
```
194194

195195

196196
| Parameter | Condition | Description |
197-
|--------------:|--------------:|:-----------------------------------------------------------------------------------------:|
197+
|:--------------|:--------------|:-----------------------------------------------------------------------------------------|
198198
| `tenant` | Required | The directory tenant that you want to request permission from. Can be provided in GUID or friendly name format OR generically referenced with `common` as seen in the example. |
199199
| `client_id` | Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
200200
| `redirect_uri` | Required |The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the app registration portal. |

0 commit comments

Comments
 (0)