You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-configure-app-access-web-apis.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: quickstart
11
11
ms.workload: identity
12
-
ms.date: 09/03/2020
12
+
ms.date: 05/05/2022
13
13
ms.author: marsma
14
14
ms.custom: aaddev, contperf-fy21q1, mode-api
15
15
ms.reviewer: lenalepa, aragra, sureshja
@@ -39,7 +39,7 @@ This diagram shows how the two app registrations relate to one another. In this
39
39
Once you've registered both your client app and web API and you've exposed the API by creating scopes, you can configure the client's permissions to the API by following these steps:
40
40
41
41
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
42
-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
42
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
43
43
1. Select **Azure Active Directory** > **App registrations**, and then select your client application (*not* your web API).
1. Select the web API you registered as part of the prerequisites.
@@ -68,7 +68,7 @@ In addition to accessing your own web API on behalf of the signed-in user, your
68
68
Configure delegated permission to Microsoft Graph to enable your client application to perform operations on behalf of the logged-in user, for example reading their email or modifying their profile. By default, users of your client app are asked when they sign in to consent to the delegated permissions you've configured for it.
69
69
70
70
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
71
-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
71
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
72
72
1. Select **Azure Active Directory** > **App registrations**, and then select your client application.
1. Select **Delegated permissions**. Microsoft Graph exposes many permissions, with the most commonly used shown at the top of the list.
@@ -93,7 +93,7 @@ Configure application permissions for an application that needs to authenticate
93
93
In the following steps, you grant permission to Microsoft Graph's *Files.Read.All* permission as an example.
94
94
95
95
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
96
-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
96
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
97
97
1. Select **Azure Active Directory** > **App registrations**, and then select your client application.
1. All permissions exposed by Microsoft Graph are shown under **Select permissions**.
@@ -142,7 +142,7 @@ The **Grant admin consent** button is *disabled* if you aren't an admin or if no
142
142
143
143
## Next steps
144
144
145
-
Advance to the next quickstart in the series to learn how to configure which account types can access your application. For example, you might want to limit access only to those users in your organization (single-tenant) or allow users in other Azure AD tenants (multi-tenant) and those with personal Microsoft accounts (MSA).
145
+
Advance to the next quickstart in the series to learn how to configure which account types can access your application. For example, you might want to limit access only to those users in your organization (single-tenant) or allow users in other Azure Active Directory (Azure AD) tenants (multi-tenant) and those with personal Microsoft accounts (MSA).
146
146
147
147
> [!div class="nextstepaction"]
148
148
> [Modify the accounts supported by an application](./howto-modify-supported-accounts.md)
0 commit comments