Skip to content

Commit d07b3b5

Browse files
Merge pull request #249083 from tusharka1/docs-editor/secure-rest-api-1692769712
Removing Public Preview Note for Oauth Bearer Authentication as its GA
2 parents 5573a0b + d05f477 commit d07b3b5

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -230,8 +230,6 @@ The following XML snippet is an example of a RESTful technical profile configure
230230

231231
## OAuth2 bearer authentication
232232

233-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
234-
235233
Bearer token authentication is defined in [OAuth2.0 Authorization Framework: Bearer Token Usage (RFC 6750)](https://www.rfc-editor.org/rfc/rfc6750.txt). In bearer token authentication, Azure AD B2C sends an HTTP request with a token in the authorization header.
236234

237235
```http
@@ -243,7 +241,6 @@ A bearer token is an opaque string. It can be a JWT access token or any string t
243241
- **Bearer token**. To be able to send the bearer token in the Restful technical profile, your policy needs to first acquire the bearer token and then use it in the RESTful technical profile.
244242
- **Static bearer token**. Use this approach when your REST API issues a long-term access token. To use a static bearer token, create a policy key and make a reference from the RESTful technical profile to your policy key.
245243

246-
247244
## Using OAuth2 Bearer
248245

249246
The following steps demonstrate how to use client credentials to obtain a bearer token and pass it into the Authorization header of the REST API calls.
@@ -488,15 +485,18 @@ Add the validation technical profile reference to the sign up technical profile,
488485

489486

490487

488+
489+
491490
For example:
492-
```XML
493-
<ValidationTechnicalProfiles>
494-
....
495-
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496-
....
497-
</ValidationTechnicalProfiles>
498-
```
499-
491+
```ruby
492+
```XML
493+
<ValidationTechnicalProfiles>
494+
....
495+
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496+
....
497+
</ValidationTechnicalProfiles>
498+
```
499+
```
500500

501501
::: zone-end
502502

@@ -531,7 +531,6 @@ To configure a REST API technical profile with API key authentication, create th
531531
1. For **Key usage**, select **Encryption**.
532532
1. Select **Create**.
533533

534-
535534
### Configure your REST API technical profile to use API key authentication
536535

537536
After creating the necessary key, configure your REST API technical profile metadata to reference the credentials.
@@ -584,3 +583,4 @@ The following XML snippet is an example of a RESTful technical profile configure
584583
::: zone pivot="b2c-custom-policy"
585584
- Learn more about the [Restful technical profile](restful-technical-profile.md) element in the custom policy reference.
586585
::: zone-end
586+

0 commit comments

Comments
 (0)