Skip to content

Commit b55fa63

Browse files
authored
Merge pull request #91694 from rwike77/v1authbasics
V1 auth basics
2 parents 8c23765 + 3920d27 commit b55fa63

25 files changed

+5460
-26
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -553,7 +553,7 @@
553553
- name: Authentication
554554
items:
555555
- name: Authentication basics
556-
href: authentication-scenarios.md
556+
href: v1-authentication-scenarios.md
557557
- name: OAuth 2.0 and OpenID Connect protocols
558558
items:
559559
- name: OpenID Connect

articles/active-directory/develop/active-directory-authentication-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,5 +81,5 @@ In this scenario, a developer has a web application running on a server that nee
8181
## See Also
8282

8383
- [The Azure Active Directory developer's guide](v1-overview.md)
84-
- [Authentication scenarios for Azure Active directory](authentication-scenarios.md)
84+
- [Authentication scenarios for Azure Active directory](v1-authentication-scenarios.md)
8585
- [Azure Active Directory code samples](sample-v1-code.md)

articles/active-directory/develop/active-directory-devhowto-adal-error-handling.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Fundamentally, there are two cases of AcquireTokenSilent errors:
5151
| Case | Description |
5252
|------|-------------|
5353
| **Case 1**: Error is resolvable with an interactive sign-in | For errors caused by a lack of valid tokens, an interactive request is necessary. Specifically, cache lookup and an invalid/expired refresh token require an AcquireToken call to resolve.<br><br>In these cases, the end user needs to be prompted to sign in. The application can choose to do an interactive request immediately, after end-user interaction (such as hitting a sign-in button), or later. The choice depends on the desired behavior of the application.<br><br>See the code in the following section for this specific case and the errors that diagnose it.|
54-
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how to do it is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
54+
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
5555

5656
### .NET
5757

@@ -196,7 +196,7 @@ Error handling in native applications can be defined by two cases:
196196
197197
| | |
198198
|------|-------------|
199-
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker application", etc). |
199+
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry (for example, "Try to Sign in again" or "Download Azure AD broker application"). |
200200
| **Case 2**:<br>Retryable Error | 1. Perform a single retry as the end user may have entered a state that results in a success.<br><br>2. If retry fails, present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker app", etc.). |
201201
202202
> [!IMPORTANT]
@@ -208,9 +208,9 @@ Error handling in native applications can be defined by two cases:
208208
The following guidance provides examples for error handling in conjunction with all non-silent AcquireToken(…) ADAL methods, *except*:
209209
210210
- AcquireTokenAsync(…, IClientAssertionCertification, …)
211-
- AcquireTokenAsync(…,ClientCredential, …)
212-
- AcquireTokenAsync(…,ClientAssertion, …)
213-
- AcquireTokenAsync(…,UserAssertion,…)
211+
- AcquireTokenAsync(…, ClientCredential, …)
212+
- AcquireTokenAsync(…, ClientAssertion, …)
213+
- AcquireTokenAsync(…, UserAssertion,…)
214214
215215
Your code would be implemented as follows:
216216
@@ -478,8 +478,8 @@ We've built a [complete sample](https://github.com/Azure-Samples/active-director
478478
479479
## Error and logging reference
480480
481-
### Logging Personal Identifiable Information (PII) & Organizational Identifiable Information (OII)
482-
By default, ADAL logging does not capture or log any PII or OII. The library allows app developers to turn this on through a setter in the Logger class. By turning on PII or OII, the app takes responsibility for safely handling highly-sensitive data and complying with any regulatory requirements.
481+
### Logging Personal Identifiable Information & Organizational Identifiable Information
482+
By default, ADAL logging does not capture or log any personal identifiable information or organizational identifiable information. The library allows app developers to turn this on through a setter in the Logger class. By logging personal identifiable information or organizational identifiable information, the app takes responsibility for safely handling highly sensitive data and complying with any regulatory requirements.
483483
484484
### .NET
485485
@@ -587,7 +587,7 @@ Use the comments section that follows, to provide feedback and help us refine an
587587
<!--Reference style links -->
588588
589589
[AAD-Auth-Libraries]: ./active-directory-authentication-libraries.md
590-
[AAD-Auth-Scenarios]:authentication-scenarios.md
590+
[AAD-Auth-Scenarios]:v1-authentication-scenarios.md
591591
[AAD-Dev-Guide]:azure-ad-developers-guide.md
592592
[AAD-Integrating-Apps]:quickstart-v1-integrate-apps-with-azure-ad.md
593593
[AZURE-portal]: https://portal.azure.com

articles/active-directory/develop/active-directory-graph-api-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For the purposes of this Quickstart guide, you can use the Fiddler Web Debugger
8383

8484
In the example below, you use Fiddler Web Debugger to create a new security group ‘MyTestGroup’ in your Azure AD directory.
8585

86-
**Obtain an access token**: To access Azure AD Graph, clients are required to successfully authenticate to Azure AD first. For more information, see [Authentication scenarios for Azure AD](authentication-scenarios.md).
86+
**Obtain an access token**: To access Azure AD Graph, clients are required to successfully authenticate to Azure AD first. For more information, see [Authentication scenarios for Azure AD](v1-authentication-scenarios.md).
8787

8888
**Compose and run a query**: Complete the following steps:
8989

articles/active-directory/develop/active-directory-how-to-integrate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ There are several ways for your application to integrate with Azure AD. Take adv
3333

3434
### Support Azure AD as a way to sign in to your application
3535

36-
**Reduce sign in friction and reduce support costs.** By using Azure AD to sign in to your application, your users won't have one more name and password to remember. As a developer, you'll have one less password to store and protect. Not having to handle forgotten password resets may be a significant savings alone. Azure AD powers sign in for some of the world's most popular cloud applications, including Office 365 and Microsoft Azure. With hundreds of millions users from millions of organizations, chances are your user is already signed in to Azure AD. Learn more about [adding support for Azure AD sign in](authentication-scenarios.md).
36+
**Reduce sign in friction and reduce support costs.** By using Azure AD to sign in to your application, your users won't have one more name and password to remember. As a developer, you'll have one less password to store and protect. Not having to handle forgotten password resets may be a significant savings alone. Azure AD powers sign in for some of the world's most popular cloud applications, including Office 365 and Microsoft Azure. With hundreds of millions users from millions of organizations, chances are your user is already signed in to Azure AD. Learn more about [adding support for Azure AD sign in](v1-authentication-scenarios.md).
3737

3838
**Simplify sign up for your application.** During sign up for your application, Azure AD can send essential information about a user so that you can pre-fill your sign up form or eliminate it completely. Users can sign up for your application using their Azure AD account via a familiar consent experience similar to those found in social media and mobile applications. Any user can sign up and sign in to an application that is integrated with Azure AD without requiring IT involvement. Learn more about [signing-up your application for Azure AD Account login](../../app-service/configure-authentication-provider-aad.md).
3939

@@ -93,5 +93,5 @@ Integration with Azure AD comes with benefits that do not require you to write a
9393

9494
[Get started writing code](v2-overview.md#getting-started).
9595

96-
[Sign users in using Microsoft identity platform](authentication-scenarios.md)
96+
[Sign users in using Microsoft identity platform](v1-authentication-scenarios.md)
9797

articles/active-directory/develop/app-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,4 +78,4 @@ Each scenario listed in this document includes a subsection that describes its p
7878

7979
## Next steps
8080

81-
- Learn more about other Azure AD [authentication basics](authentication-scenarios.md)
81+
- Learn more about other Azure AD [authentication basics](v1-authentication-scenarios.md)

articles/active-directory/develop/conditional-access-dev-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ For more information on the full capabilities of Conditional Access, see [Condit
3131

3232
For developers building apps for Azure AD, this article shows how you can use Conditional Access and you'll also learn about the impact of accessing resources that you don't have control over that may have Conditional Access policies applied. The article also explores the implications of Conditional Access in the on-behalf-of flow, web apps, accessing Microsoft Graph, and calling APIs.
3333

34-
Knowledge of [single](quickstart-v1-integrate-apps-with-azure-ad.md) and [multi-tenant](howto-convert-app-to-be-multi-tenant.md) apps and [common authentication patterns](authentication-scenarios.md) is assumed.
34+
Knowledge of [single](quickstart-v1-integrate-apps-with-azure-ad.md) and [multi-tenant](howto-convert-app-to-be-multi-tenant.md) apps and [common authentication patterns](v1-authentication-scenarios.md) is assumed.
3535

3636
## How does Conditional Access impact an app?
3737

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Our team reviews the details and gives you access accordingly. After your reques
6868

6969
To list an application in the Azure AD app gallery, you first need to implement one of the following federation protocols supported by Azure AD. You also need to agree to the Azure AD application gallery terms and conditions. Read the terms and conditions of the Azure AD application gallery on [this website](https://azure.microsoft.com/support/legal/active-directory-app-gallery-terms/).
7070

71-
- **OpenID Connect**: To integrate your application with Azure AD by using the Open ID Connect protocol, follow the [developers' instructions](authentication-scenarios.md).
71+
- **OpenID Connect**: To integrate your application with Azure AD by using the Open ID Connect protocol, follow the [developers' instructions](v1-authentication-scenarios.md).
7272

7373
![Listing an OpenID Connect application in the gallery](./media/howto-app-gallery-listing/openid.png)
7474

articles/active-directory/develop/howto-get-appsource-certified.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ For more information about the AppSource trial experience, see [this video](http
109109

110110
## Next Steps
111111

112-
- For more information on building applications that support Azure AD sign-ins, see [Authentication scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/authentication-scenarios).
112+
- For more information on building applications that support Azure AD sign-ins, see [Authentication scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/v1-authentication-scenarios).
113113
- For information on how to list your SaaS application in AppSource, go see [AppSource Partner Information](https://appsource.microsoft.com/partners)
114114

115115
## Get support
@@ -121,8 +121,8 @@ We highly recommend you ask your questions on Stack Overflow first and browse ex
121121
Use the following comments section to provide feedback and help us refine and shape our content.
122122

123123
<!--Reference style links -->
124-
[AAD-Auth-Scenarios]:authentication-scenarios.md
125-
[AAD-Auth-Scenarios-Browser-To-WebApp]:authentication-scenarios.md#web-browser-to-web-application
124+
[AAD-Auth-Scenarios]:v1-authentication-scenarios.md
125+
[AAD-Auth-Scenarios-Browser-To-WebApp]:v1-authentication-scenarios.md#web-browser-to-web-application
126126
[AAD-Dev-Guide]: v1-overview.md
127127
[AAD-Howto-Multitenant-Overview]: howto-convert-app-to-be-multi-tenant.md
128128
[AAD-QuickStart-Web-Apps]: v1-overview.md#get-started
29.8 KB
Loading

0 commit comments

Comments
 (0)