You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 11/21/2019
9
+
ms.date: 12/02/2019
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -53,7 +53,7 @@ Azure AD joined devices that you will be piloting with must be running Windows 1
53
53
Organizations may choose to use one or more of the following methods to enable the use of security keys for Windows sign-in based on their organization's requirements.
|</p>ASP.NET Core 2.2 |[ASP.NET Core WebApp signs-in users tutorial](https://aka.ms/aspnetcore-webapp-sign-in)| Same sample in the [ASP.NET Core Web App calls Microsoft Graph](https://aka.ms/aspnetcore-webapp-call-msgraph) phase |
59
59
| </p> ASP.NET | [ASP.NET Quickstart](https://github.com/AzureAdQuickstarts/AppModelv2-WebApp-OpenIDConnect-DotNet) </p> [dotnet-webapp-openidconnect-v2](https://github.com/azure-samples/active-directory-dotnet-webapp-openidconnect-v2) | [dotnet-admin-restricted-scopes-v2](https://github.com/azure-samples/active-directory-dotnet-admin-restricted-scopes-v2) </p> |[msgraph-training-aspnetmvcapp](https://github.com/microsoftgraph/msgraph-training-aspnetmvcapp)
60
-
|||[ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp): an MSAL4J web app calling Microsoft Graph |
60
+
|||[ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp)|
61
+
|||[ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp)|
61
62
|||[Node.js Quickstart](https://github.com/azureadquickstarts/appmodelv2-webapp-openidconnect-nodejs)|
62
63
|||[msgraph-training-rubyrailsapp](https://github.com/microsoftgraph/msgraph-training-rubyrailsapp)|
63
64
@@ -70,6 +71,8 @@ The following samples show public client applications (desktop or mobile applica
70
71
| Desktop (WPF) ||[interactive](msal-authentication-flows.md#interactive)|[dotnet-desktop-msgraph-v2](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2)|[dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi)|
71
72
| Desktop (Console) ||[Integrated Windows Authentication](msal-authentication-flows.md#integrated-windows-authentication)|[dotnet-iwa-v2](https://github.com/azure-samples/active-directory-dotnet-iwa-v2)||
72
73
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[dotnetcore-up-v2](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2)||
74
+
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[ms-identity-java-desktop](https://github.com/Azure-Samples/ms-identity-java-desktop/tree/master/Call-MsGraph-WithUsernamePassword)||
75
+
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[ms-identity-python-desktop](https://github.com/Azure-Samples/ms-identity-python-desktop/tree/master/2-Call-MsGraph-WithUsernamePassword)||
73
76
| Mobile (Android, iOS, UWP) ||[interactive](msal-authentication-flows.md#interactive)|[xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2)||
74
77
| Mobile (iOS) ||[interactive](msal-authentication-flows.md#interactive)|[ios-swift-objc-native-v2](https://github.com/azure-samples/active-directory-ios-swift-native-v2) </p> [ios-native-nxoauth2-v2](https://github.com/azure-samples/active-directory-ios-native-nxoauth2-v2)||
| Console |</p> ASP.NET |[Client Credentials](msal-authentication-flows.md#client-credentials)|[dotnetcore-daemon-v2](https://github.com/azure-samples/active-directory-dotnetcore-daemon-v2)|
86
89
| Web app |</p> ASP.NET |[Client Credentials](msal-authentication-flows.md#client-credentials)|[dotnet-daemon-v2](https://github.com/azure-samples/active-directory-dotnet-daemon-v2)|
90
+
| Console ||[Client Credentials](msal-authentication-flows.md#client-credentials)|[ms-identity-java-daemon](https://github.com/Azure-Samples/ms-identity-java-daemon)|
91
+
| Console ||[Client Credentials](msal-authentication-flows.md#client-credentials)|[ms-identity-python-daemon](https://github.com/Azure-Samples/ms-identity-python-daemon)|
87
92
88
93
## Headless applications
89
94
@@ -92,6 +97,8 @@ The following sample shows a public client application running on a device witho
@@ -101,6 +108,7 @@ The following samples show how to protect a web API with the Microsoft identity
101
108
| -------- | ------------------- |
102
109
|</p>ASP.NET Core 2.2 | ASP.NET Core web API (service) of [dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi-calls-msgraph)|
103
110
|</p>ASP.NET MVC | Web API (service) of [ms-identity-aspnet-webapi-onbehalfof](https://github.com/Azure-Samples/ms-identity-aspnet-webapi-onbehalfof)|
111
+
|| Web API (service) of [ms-identity-java-webapi](https://github.com/Azure-Samples/ms-identity-java-webapi)|
0 commit comments