Skip to content

Commit d05e855

Browse files
authored
Merge pull request #252432 from cilwerner/patch-21
Fixing quickstart following merge conflict
2 parents 3028fbc + 5a24585 commit d05e855

File tree

1 file changed

+0
-51
lines changed

1 file changed

+0
-51
lines changed

articles/active-directory/develop/quickstart-web-app-aspnet-core-sign-in.md

Lines changed: 0 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -33,49 +33,6 @@ In this article you register a web application in the Microsoft Entra admin cent
3333

3434
## Register the application in the Microsoft Entra admin center
3535

36-
37-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
38-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
39-
1. Browse to **Identity** > **Applications** > **App registrations** and select **New registration**.
40-
1. For **Name**, enter a name for the application. For example, enter **AspNetCore-Quickstart**. Users of the app will see this name, and can be changed later.
41-
1. Set the **Redirect URI** type to **Web** and value to `https://localhost:44321/signin-oidc`.
42-
1. Select **Register**.
43-
1. Under **Manage**, select **Authentication**.
44-
1. For **Front-channel logout URL**, enter **https://localhost:44321/signout-oidc**.
45-
1. Under **Implicit grant and hybrid flows**, select **ID tokens**.
46-
1. Select **Save**.
47-
1. Under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
48-
1. Enter a **Description**, for example `clientsecret1`.
49-
1. Select **In 1 year** for the secret's expiration.
50-
1. Select **Add** and immediately record the secret's **Value** for use in a later step. The secret value is *never displayed again* and is irretrievable by any other means. Record it in a secure location as you would any password.
51-
52-
### Download the ASP.NET Core project
53-
54-
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1-callsgraph.zip)
55-
56-
### Configure your ASP.NET Core project
57-
58-
1. Extract the *.zip* file to a local folder that's close to the root of the disk to avoid errors caused by path length limitations on Windows. For example, extract to *C:\Azure-Samples*.
59-
1. Open the solution in the chosen code editor.
60-
1. In *appsettings.json*, replace the values of `ClientId`, and `TenantId`. The value for the application (client) ID and the directory (tenant) ID, can be found in the app's **Overview** page on the Microsoft Entra admin center.
61-
62-
```json
63-
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
64-
"ClientId": "Enter_the_Application_Id_here",
65-
"TenantId": "common",
66-
```
67-
68-
- `Enter_the_Application_Id_Here` is the application (client) ID for the registered application.
69-
- Replace `Enter_the_Tenant_Info_Here` with one of the following:
70-
- If the application supports **Accounts in this organizational directory only**, replace this value with the directory (tenant) ID (a GUID) or tenant name (for example, `contoso.onmicrosoft.com`). The directory (tenant) ID can be found on the app's **Overview** page.
71-
- If the application supports **Accounts in any organizational directory**, replace this value with `organizations`.
72-
- If the application supports **All Microsoft account users**, leave this value as `common`.
73-
- Replace `Enter_the_Client_Secret_Here` with the **Client secret** that was created and recorded in an earlier step.
74-
75-
For this quickstart, don't change any other values in the *appsettings.json* file.
76-
77-
### Build and run the application
78-
7936
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
8037
1. Browse to **Identity** > **Applications** > **App registrations**.
8138
1. On the page that appears, select **+ New registration**.
@@ -111,20 +68,12 @@ To obtain the sample application, you can either clone it from GitHub or downloa
11168
dotnet dev-certs https -ep ./certificate.crt --trust
11269
```
11370

114-
115-
| *appsettings.json* key | Description |
116-
|------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------|
117-
| `ClientId` | Application (client) ID of the application registered in the Microsoft Entra admin center. |
118-
| `Instance` | Security token service (STS) endpoint for the user to authenticate. This value is typically `https://login.microsoftonline.com/`, indicating the Azure public cloud. |
119-
| `TenantId` | Name of your tenant or the tenant ID (a GUID), or `common` to sign in users with work or school accounts or Microsoft personal accounts. |
120-
12171
1. Return to the Microsoft Entra admin center, and under **Manage**, select **Certificates & secrets** > **Upload certificate**.
12272
1. Select the **Certificates (0)** tab, then select **Upload certificate**.
12373
1. An **Upload certificate** pane appears. Use the icon to navigate to the certificate file you created in the previous step, and select **Open**.
12474
1. Enter a description for the certificate, for example *Certificate for aspnet-web-app*, and select **Add**.
12575
1. Record the **Thumbprint** value for use in the next step.
12676

127-
12877
## Configure the project
12978

13079
1. In your IDE, open the project folder, *ms-identity-docs-code-dotnet\web-app-aspnet*, containing the sample.

0 commit comments

Comments
 (0)