You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/developer-glossary.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 10/28/2019
12
+
ms.date: 12/13/2019
13
13
ms.author: ryanwi
14
14
ms.custom: aaddev
15
15
ms.reviewer: jmprieur, saeeda, jesakowi, nacanuma
@@ -37,7 +37,7 @@ The unique identifier Azure AD issues to an application registration that identi
37
37
38
38
## application manifest
39
39
40
-
A feature provided by the [Azure portal][AZURE-portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][AAD-Graph-App-Entity] and [ServicePrincipal][AAD-Graph-Sp-Entity] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
40
+
A feature provided by the [Azure portal][AZURE-portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
41
41
42
42
## application object
43
43
@@ -133,7 +133,7 @@ A [client application](#client-application) gains access to a [resource server](
133
133
134
134
They also surface during the [consent](#consent) process, giving the administrator or resource owner the opportunity to grant/deny the client access to resources in their tenant.
135
135
136
-
Permission requests are configured on the **API permissions** page for an application in the [Azure portal][AZURE-portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Admin role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][AAD-Graph-App-Entity].
136
+
Permission requests are configured on the **API permissions** page for an application in the [Azure portal][AZURE-portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Admin role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
137
137
138
138
## resource owner
139
139
@@ -143,25 +143,25 @@ As defined by the [OAuth2 Authorization Framework][OAuth2-Role-Def], an entity c
143
143
144
144
As defined by the [OAuth2 Authorization Framework][OAuth2-Role-Def], a server that hosts protected resources, capable of accepting and responding to protected resource requests by [client applications](#client-application) that present an [access token](#access-token). Also known as a protected resource server, or resource application.
145
145
146
-
A resource server exposes APIs and enforces access to its protected resources through [scopes](#scopes) and [roles](#roles), using the OAuth 2.0 Authorization Framework. Examples include the Azure AD Graph API which provides access to Azure AD tenant data, and the Office 365 APIs that provide access to data such as mail and calendar. Both of these are also accessible via the [Microsoft Graph API][Microsoft-Graph].
146
+
A resource server exposes APIs and enforces access to its protected resources through [scopes](#scopes) and [roles](#roles), using the OAuth 2.0 Authorization Framework. Examples include the [Microsoft Graph API][Microsoft-Graph] which provides access to Azure AD tenant data, and the Office 365 APIs that provide access to data such as mail and calendar.
147
147
148
-
Just like a client application, resource application's identity configuration is established via [registration](#application-registration) in an Azure AD tenant, providing both the application and service principal object. Some Microsoft-provided APIs, such as the Azure AD Graph API, have pre-registered service principals made available in all tenants during provisioning.
148
+
Just like a client application, resource application's identity configuration is established via [registration](#application-registration) in an Azure AD tenant, providing both the application and service principal object. Some Microsoft-provided APIs, such as the Microsoft Graph API, have pre-registered service principals made available in all tenants during provisioning.
149
149
150
150
## roles
151
151
152
152
Like [scopes](#scopes), roles provide a way for a [resource server](#resource-server) to govern access to its protected resources. There are two types: a "user" role implements role-based access control for users/groups that require access to the resource, while an "application" role implements the same for [client applications](#client-application) that require access.
153
153
154
-
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][AAD-Graph-Sp-Entity]. The Azure portal is also used to assign users to "user" roles, and configure client [application permissions](#permissions) to access an "application" role.
154
+
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. The Azure portal is also used to assign users to "user" roles, and configure client [application permissions](#permissions) to access an "application" role.
155
155
156
-
For a detailed discussion of the application roles exposed by Azure AD's Graph API, see [Graph API Permission Scopes][AAD-Graph-Perm-Scopes]. For a step-by-step implementation example, see [Manage access using RBAC and the Azure portal][AAD-RBAC].
156
+
For a detailed discussion of the application roles exposed by the Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For a step-by-step implementation example, see [Manage access using RBAC and the Azure portal][AAD-RBAC].
157
157
158
158
## scopes
159
159
160
160
Like [roles](#roles), scopes provide a way for a [resource server](#resource-server) to govern access to its protected resources. Scopes are used to implement [scope-based][OAuth2-Access-Token-Scopes] access control, for a [client application](#client-application) that has been given delegated access to the resource by its owner.
161
161
162
-
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][AAD-Graph-Sp-Entity]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
162
+
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
163
163
164
-
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Azure AD's Graph API, see [Graph API Permission Scopes][AAD-Graph-Perm-Scopes]. For scopes exposed by Office 365 services, see [Office 365 API permissions reference][O365-Perm-Ref].
164
+
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For scopes exposed by Office 365 services, see [Office 365 API permissions reference][O365-Perm-Ref].
165
165
166
166
## security token
167
167
@@ -203,7 +203,7 @@ A type of [client application](#client-application) that downloads code from a w
203
203
204
204
## user principal
205
205
206
-
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Azure AD Graph [User entity][AAD-Graph-User-Entity] defines the schema for a user object, including user-related properties such as first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for Single Sign-On, recording [consent](#consent) delegation, making access control decisions, etc.
206
+
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Microsoft Graph [User resource type][Graph-User-Resource] defines the schema for a user object, including user-related properties such as first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for Single Sign-On, recording [consent](#consent) delegation, making access control decisions, etc.
207
207
208
208
## web client
209
209
@@ -222,10 +222,10 @@ Use the following comments section to provide feedback and help to refine and sh
#Customer intent: As an application developer, I want to know how to set up OpenId Connect authentication in a web application built using Node.js with Express.
@@ -73,7 +73,7 @@ If you want to register your apps manually, as a first step you'll need to:
73
73
- Keep **State** as **Enabled**
74
74
- Select **Add scope**
75
75
76
-
### Configure the service and client projects to match the registered Web API
76
+
### Configure the service project to match the registered Web API
77
77
78
78
1. Open the solution in Visual Studio and then open the **Web.config** file under the root of **TodoListService** project.
79
79
1. Replace the value of `ida:ClientId` parameter with the **Client ID (Application ID)** from the application you just registered in the Application Registration Portal.
@@ -101,7 +101,7 @@ In this step, you configure your *TodoListClient* project by registering a new a
101
101
- Change **Supported account types** to **Accounts in any organizational directory**.
102
102
- Select **Register** to create the application.
103
103
1. From the app's Overview page, select the **Authentication** section.
104
-
- In the **Redirect URLs** | **Suggested Redirect URLs for public clients (mobile, desktop)** section, check **urn:ietf:wg:oauth:2.0:oob**
104
+
- In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -48,13 +48,12 @@ This quickstart contains a code sample that demonstrates how a Universal Windows
48
48
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
49
49
> - Select **Register** to create the application.
50
50
> 1. In the list of pages for the app, select **Authentication**.
51
-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
52
-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
51
+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
53
52
> 1. Select **Save**.
54
53
55
54
> [!div renderon="portal" class="sxs-lookup"]
56
55
> #### Step 1: Configure your application
57
-
> For the code sample for this quickstart to work, you need to add a redirect URI as **urn:ietf:wg:oauth:2.0:oob**.
56
+
> For the code sample for this quickstart to work, you need to add a redirect URI as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-windows-desktop.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: quickstart
11
11
ms.workload: identity
12
-
ms.date: 07/16/2019
12
+
ms.date: 12/12/2019
13
13
ms.author: jmprieur
14
14
ms.custom: aaddev, identityplatformtop40
15
15
#Customer intent: As an application developer, I want to learn how my Windows desktop .NET application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -47,13 +47,12 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
47
47
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
48
48
> - Select **Register** to create the application.
49
49
> 1. In the list of pages for the app, select **Authentication**.
50
-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
51
-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
50
+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
52
51
> 1. Select **Save**.
53
52
54
53
> [!div class="sxs-lookup" renderon="portal"]
55
54
> #### Step 1: Configure your application in Azure portal
56
-
> For the code sample for this quickstart to work, you need to add a reply URL as **urn:ietf:wg:oauth:2.0:oob**.
55
+
> For the code sample for this quickstart to work, you need to add a reply URL as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-windows-desktop.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: na
13
13
ms.topic: tutorial
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 04/10/2019
16
+
ms.date: 12/12/2019
17
17
ms.author: jmprieur
18
18
ms.custom: aaddev, identityplatformtop40
19
19
ms.collection: M365-identity-device-management
@@ -102,9 +102,9 @@ To register your application and add your application registration information t
102
102
- Select **Register** to create the application.
103
103
1. In the list of pages for the app, select **Authentication**.
104
104
1. In the **Redirect URIs** section, in the Redirect URIs list:
105
-
1. In the **TYPE** column select **Public client (mobile & desktop)**.
106
-
1. In the **REDIRECT URI** column, enter `urn:ietf:wg:oauth:2.0:oob`
107
-
1. Select **Save**.
105
+
1. In the **TYPE** column select **Public client/native (mobile & desktop)**.
106
+
1. In the **REDIRECT URI** column, enter `https://login.microsoftonline.com/common/oauth2/nativeclient`
107
+
1. Select **Register**.
108
108
1. Go to Visual Studio, open the *App.xaml.cs* file, and then replace `Enter_the_Application_Id_here` in the code snippet below with the application ID that you just registered and copied.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-windows-uwp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: na
13
13
ms.topic: tutorial
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 09/24/2019
16
+
ms.date: 12/13/2019
17
17
ms.author: jmprieur
18
18
ms.custom: aaddev, identityplatformtop40
19
19
ms.collection: M365-identity-device-management
@@ -349,7 +349,7 @@ Now you need to register your application:
349
349
Configure authentication for your application:
350
350
351
351
1. Back in the [Azure portal](https://portal.azure.com), under **Manage**, select **Authentication**.
352
-
1. In the **Redirect URIs**list, for **TYPE**, select **Public client (mobile & desktop)**and enter `urn:ietf:wg:oauth:2.0:oob` for **REDIRECT URI**.
352
+
1. In the **Redirect URIs**| **Suggested Redirect URIs for public clients (mobile, desktop)**section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
0 commit comments