Skip to content

Commit bf7614c

Browse files
authored
Merge pull request #102634 from FrankHu-MSFT/patch-97
(AzureCXP) fixing note wording
2 parents 2a0fbd4 + 09feb9d commit bf7614c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,6 @@ In the Azure app registration for the client application:
127127
## Code sample
128128

129129
> [!NOTE]
130-
> You must calculate the X5T header by using the certificate's hash and converting it to a base64 string. In C# it would look something similar to that of : `System.Convert.ToBase64String(cert.GetCertHash());`
130+
> You must calculate the X5T header by converting it to a base 64 string using the certificate's hash. The code to perform this in C# is : `System.Convert.ToBase64String(cert.GetCertHash());`
131131
132132
The code sample on [Authenticating to Microsoft identity platform in daemon apps with certificates](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential) shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential#create-a-self-signed-certificate) using the `New-SelfSignedCertificate` Powershell command. You can also take advantage and use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential/blob/master/AppCreationScripts/AppCreationScripts.md) to create the certificates, compute the thumbprint, and so on.

0 commit comments

Comments
 (0)