Skip to content

Commit c8997d0

Browse files
2 parents 468adc1 + fe0f9c0 commit c8997d0

File tree

154 files changed

+2344
-1199
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

154 files changed

+2344
-1199
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41733,6 +41733,11 @@
4173341733
"redirect_url": "/azure-stack/operator",
4173441734
"redirect_document_id": false
4173541735
},
41736+
{
41737+
"source_path": "articles/synapse-analytics/index.yml",
41738+
"redirect_url": "/azure/sql-data-warehouse/",
41739+
"redirect_document_id": false
41740+
},
4173641741
{
4173741742
"source_path": "articles/azure-stack/user/index.yml",
4173841743
"redirect_url": "/azure-stack/user",
@@ -44017,6 +44022,11 @@
4401744022
"source_path": "articles/security/blueprints/ukofficial-paaswa-overview.md",
4401844023
"redirect_url": "/previous-versions/azure/security/blueprints/ukofficial-paaswa-overview",
4401944024
"redirect_document_id": false
44025+
},
44026+
{
44027+
"source_path": "articles/active-directory/develop/app-registrations-training-guide.md",
44028+
"redirect_url": "articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md",
44029+
"redirect_document_id": false
4402044030
}
4402144031
]
4402244032
}

articles/active-directory/develop/TOC.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -241,6 +241,8 @@
241241
href: migrate-android-adal-msal.md
242242
- name: Migrate to MSAL.iOS and MacOS
243243
href: migrate-objc-adal-msal.md
244+
- name: Migrate to MSAL Java
245+
href: migrate-adal-msal-java.md
244246
- name: Migrate Xamarin apps using brokers from ADAL.NET to MSAL.NET
245247
href: msal-net-migration-ios-broker.md
246248
- name: Supported authentication flows
@@ -390,6 +392,10 @@
390392
href: active-directory-configurable-token-lifetimes.md
391393
- name: Application configuration
392394
items:
395+
- name: Azure portal app registrations training guide (legacy)
396+
href: app-registrations-training-guide-for-app-registrations-legacy-users.md
397+
- name: Application Registration Portal app registration guide
398+
href: app-registration-portal-training-guide.md
393399
- name: Convert a single-tenant app to a multi-tenant app
394400
href: howto-convert-app-to-be-multi-tenant.md
395401
- name: Create service principal
@@ -446,6 +452,12 @@
446452
href: request-custom-claims.md
447453
- name: Redirect URI configuration
448454
href: redirect-uris-ios.md
455+
- name: MSAL Java
456+
items:
457+
- name: Token cache serialization
458+
href: msal-java-token-cache-serialization.md
459+
- name: Add and remove accounts from the token cache
460+
href: msal-java-get-remove-accounts-token-cache.md
449461
- name: Work with Visual Studio
450462
items:
451463
- name: Use the Active Directory connected service
@@ -594,8 +606,6 @@
594606
href: reference-saml-tokens.md
595607
- name: Application configuration
596608
items:
597-
- name: App registrations training guide
598-
href: app-registrations-training-guide.md
599609
- name: Applications and service principals
600610
href: app-objects-and-service-principals.md
601611
- name: How and why apps are added to Azure AD
Lines changed: 205 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,205 @@
1+
---
2+
title: Application Registration Portal app registrations training guide - Microsoft identity platform | Azure
3+
description: App registrations in the Azure portal for users familiar with Application registration portal
4+
services: active-directory
5+
documentationcenter: ''
6+
author: archieag
7+
manager: CelesteDG
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.workload: identity
13+
ms.tgt_pltfrm: na
14+
ms.devlang: na
15+
ms.topic: conceptual
16+
ms.date: 11/8/2019
17+
ms.author: aragra
18+
ms.reviewer: lenalepa, alamaral
19+
ms.custom: aaddev
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Training guide: Using App registrations in the Azure portal instead of Application Registration Portal
24+
25+
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
26+
27+
## What's not changing?
28+
29+
- Your applications and related configurations can be found as-is in the new experience. You do not need to register the applications again and users of your applications will not need to sign-in again.
30+
31+
> [!NOTE]
32+
> You must sign-in with the account you used to register applications to find them in the Azure portal. We recommend you
33+
check the signed in user in the Azure portal matches the user that
34+
was signed into the Application registration portal by comparing the
35+
email address from your profile.
36+
>
37+
> In some cases, especially when you sign in using personal Microsoft
38+
accounts(e.g. Outlook, Live, Xbox, etc.) with an Azure AD email address, we found out that when you
39+
go to the Azure portal from the old experience, it signs you into a
40+
different account with the same email in your Azure AD tenant. If
41+
you still believe your applications are missing, sign out and sign
42+
in with the right account.
43+
44+
- Live SDK apps created using personal Microsoft accounts are not yet supported in the Azure portal and will continue to remain in the old experience in near future.
45+
46+
## Key changes
47+
48+
- In the old experience, apps were by default registered as converged
49+
apps supporting all organizational accounts (multitenant) as well as
50+
personal Microsoft accounts. This could not be modified through the
51+
old experience, making it difficult to create apps that supported
52+
only organizational accounts (either multitenant or single tenant).
53+
The new experience allows you to register apps supporting all those
54+
options. [Learn more about app
55+
types](active-directory-v2-registration-portal.md).
56+
57+
- In the new experience, if your personal Microsoft account is also in
58+
an Azure AD tenant, you will see three tabs--all applications in
59+
the tenant, owned applications in the tenant as well as applications
60+
from your personal account. So, if you believe that apps registered
61+
with your personal Microsoft account are missing, check the
62+
**Applications from your personal account** tab.
63+
64+
- In the new experience, you can easily switch between tenants by
65+
navigating to your profile and choosing switch directory.
66+
67+
## List of applications
68+
69+
- The new app list shows applications that were registered through the
70+
legacy app registrations experience in the Azure portal (apps that
71+
sign in Azure AD accounts only) as well as apps registered though the
72+
[Application registration portal](https://apps.dev.microsoft.com/)
73+
(apps that sign in both Azure AD and personal Microsoft accounts).
74+
75+
- The new app list has two additional columns: **Created on** column and
76+
**Certificates & secrets** column that shows the status (current,
77+
expiring soon, or expired) of credentials that have been registered
78+
on the app.
79+
80+
## New app registration
81+
82+
In the old experience, to register a converged app you were only
83+
required to provide a Name. The apps that were created were registered
84+
as converged apps supporting all organizational directory (multitenant)
85+
as well as personal Microsoft accounts. This could not be modified through the old experience, making it difficult to create apps that supported only organizational accounts (either multitenant or single tenant). [Learn more about supported account types](v2-supported-account-types.md)
86+
87+
In the new experience, you must provide a Name for the app and choose
88+
the Supported account types. You can optionally provide a redirect URI.
89+
If you provide a redirect URI, you'll need to specify if it's
90+
web/public (native/mobile and desktop). For more info on how to register
91+
an app using the new app registrations experience, see [this
92+
quickstart](quickstart-register-app.md).
93+
94+
## App management page
95+
96+
The old experience had a single app management page for converged apps
97+
with the following sections: Properties, Application secrets, Platforms,
98+
Owners, Microsoft Graph Permissions, Profile, and Advanced Options.
99+
100+
The new experience in the Azure portal represents these features into
101+
separate pages. Here's where you can find the equivalent functionality:
102+
103+
- Properties - Name and Application ID is on the Overview page.
104+
105+
- Application Secrets is on the Certificates & secrets page
106+
107+
- Platforms configuration is on the Authentication page
108+
109+
- Microsoft Graph permissions is on the API permissions page along
110+
with other permissions
111+
112+
- Profile is on Branding page
113+
114+
- Advanced option - Live SDK support is on the Authentication page.
115+
116+
## Application Secrets/Certificates & secrets
117+
118+
In the new experience, **Application secrets** have been renamed to
119+
**Certificates & secrets**. In addition, **Public keys** are referred to as
120+
**Certificates** and **Passwords** are referred to as **Client secrets**. We
121+
chose to not bring this functionality along in the new experience for
122+
security reasons, hence, you can no longer generate a new key pair.
123+
124+
## Platforms/Authentication - Reply URLs/Redirect URIs
125+
In the old experience, an app had Platforms section for Web, native, and
126+
Web API to configure Redirect URLs, Logout URL and Implicit flow.
127+
128+
In the new experience, Reply URLs can be found on an app\'s
129+
Authentication section. In addition, they are referred to as redirect
130+
URIs and the format for redirect URIs has changed. They are required to
131+
be associated with an app type (web or public client - mobile and
132+
desktop). [Learn more](quickstart-configure-app-access-web-apis.md#add-redirect-uris-to-your-application)
133+
134+
Web APIs are configured in Expose an API page.
135+
136+
> [!NOTE]
137+
> Try out the new Authentication settings experience where you can
138+
configure settings for your application based on the platform or device
139+
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
140+
141+
## Microsoft Graph Permissions/API permissions
142+
143+
- When selecting an API in the old experience, you could choose from
144+
Microsoft Graph APIs only. In the new experience, you can choose
145+
from many Microsoft APIs including Microsoft Graph, APIs from your
146+
organization and your APIs, this is presented in three tabs:
147+
Microsoft APIs, APIs my organization uses, or My APIs. The search
148+
bar on APIs my organization uses tab searches through service
149+
principals in the tenant.
150+
151+
> [!NOTE]
152+
> You won't see this tab if your application isn't
153+
associated with a tenant. For more info on how to request
154+
permissions using the new experience, see [this
155+
quickstart](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/develop/quickstart-configure-app-access-web-apis.md).
156+
157+
- The old experience did not have a **Grant permissions** button. In the
158+
new experience, there's a Grant consent section with a **Grant admin consent** button on an app's API permissions section. Only an admin can grant consent and this button is enabled for admins only. When an admin selects the **Grant admin consent** button, admin consent is granted to all the requested permissions.
159+
160+
## Profile
161+
In the old experience, Profile had Logo, Home page URL, Terms of Service
162+
URL and Privacy Statement URL configuration. In the new experience,
163+
these can be found in Branding page.
164+
165+
## Application manifest
166+
In the new experience, Manifest page allows you to edit and update app's
167+
attributes. For more info, see [Application manifest](reference-app-manifest.md).
168+
169+
## New UI
170+
There's new UI for properties that could previously only be set using
171+
the manifest editor or the API, or didn't exist.
172+
173+
- Implicit grant flow (oauth2AllowImplicitFlow) can be found on the
174+
Authentication page. Unlike the old experience, you can enable
175+
access tokens or id tokens, or both.
176+
177+
- Scopes defined by this API (oauth2Permissions) and Authorized client
178+
applications (preAuthorizedApplications) can be configured through
179+
the Expose an API page. For more info on how to configure an app to
180+
be a web API and expose permissions/scopes, see [this
181+
quickstart](quickstart-configure-app-expose-web-apis.md).
182+
183+
- Publisher domain (which is displayed to users on the [application\'s
184+
consent
185+
prompt](application-consent-experience.md))
186+
can be found on the Branding blade page. For more info on how to
187+
configure a publisher domain, see [this
188+
how-to](howto-configure-publisher-domain.md).
189+
190+
## Limitations
191+
192+
The new experience has the following limitations:
193+
194+
- The new experience does not yet support App registrations for Azure AD
195+
B2C tenants.
196+
197+
- The new experience does not yet support Live SDK apps created with
198+
personal Microsoft accounts.
199+
200+
- Changing the value for supported accounts is not supported in the
201+
UI. You need to use the app manifest unless you\'re switching
202+
between Azure AD single-tenant and multi-tenant.
203+
204+
> [!NOTE]
205+
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.

articles/active-directory/develop/app-registrations-training-guide.md renamed to articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: App registrations in the Azure portal training guide - Azure
2+
title: Azure portal app registrations training guide (legacy) - Azure
33
description: An introduction to the new application registration experience in the Microsoft identity platform.
44
services: active-directory
55
documentationcenter: ''
@@ -20,7 +20,7 @@ ms.custom: aaddev
2020
ms.collection: M365-identity-device-management
2121
---
2222

23-
# Training guide: App registrations in the Azure portal
23+
# Training guide: App registrations in the Azure portal (legacy)
2424

2525
You can find numerous improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the legacy experience, use this training guide to get you started using the new experience.
2626

@@ -100,4 +100,4 @@ There's new UI for properties that could previously only be set using the manife
100100
The new experience has the following limitations:
101101

102102
- The format of client secrets (app passwords) is different than that of the legacy experience and may break CLI.
103-
- Changing the value for supported accounts is not supported in the UI. You need to use the app manifest unless you're switching between Azure AD single-tenant and multi-tenant.
103+
- Changing the value for supported accounts is not supported in the UI. You need to use the app manifest unless you're switching between Azure AD single-tenant and multi-tenant.

0 commit comments

Comments
 (0)