You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-app.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Take note of the **Object ID** value, which you'll need in the next step.
49
49
50
50
## Grant access to Microsoft Graph
51
51
52
-
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Azure portal. The following script will add the requested Microsoft Graph API permissions to the managed identity service principal object.
52
+
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Microsoft Entra admin center. The following script will add the requested Microsoft Graph API permissions to the managed identity service principal object.
53
53
54
54
# [PowerShell](#tab/azure-powershell)
55
55
@@ -110,9 +110,9 @@ az rest --method post --uri $uri --body $body --headers "Content-Type=applicatio
110
110
111
111
---
112
112
113
-
After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
113
+
After executing the script, you can verify in the [Microsoft Entra admin center](https://entra.microsoft.com) that the requested API permissions are assigned to the managed identity.
114
114
115
-
Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In**Managed Identities**, select the service principal for the managed identity.
115
+
Go to **Applications**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. **Add a filter** for "Application type == Managed Identities" and select the service principal for the managed identity.
116
116
117
117
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal that appears in **Managed Identities** should *not* have a **Homepage URL** listed and the **Object ID** should match the object ID value of the managed identity in the [previous step](#enable-managed-identity-on-app).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-user.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: app-service
9
9
ms.topic: tutorial
10
10
ms.workload: identity
11
-
ms.date: 06/28/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: ryanwi
13
13
ms.reviewer: stsoneff
14
14
ms.devlang: csharp, javascript
@@ -42,7 +42,7 @@ In this tutorial, you learn how to:
42
42
43
43
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
44
44
45
-
In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
45
+
In the [Microsoft Entra admin center](https://entra.microsoft.com) menu, select **Applications**.
46
46
47
47
Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
48
48
@@ -208,7 +208,7 @@ public class Startup
208
208
209
209
### appsettings.json
210
210
211
-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
211
+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
212
212
213
213
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
214
214
@@ -217,9 +217,9 @@ public class Startup
217
217
"AzureAd": {
218
218
"Instance": "https://login.microsoftonline.com/",
219
219
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
220
-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221
-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222
-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
220
+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221
+
"ClientId": "[Enter the Client Id (Application ID obtained from the Microsoft Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222
+
"ClientSecret": "[Copy the client secret added to the app from the Microsoft Entra admin center]",
223
223
"ClientCertificates": [
224
224
],
225
225
// the following is required to handle Continuous Access Evaluation challenges
Copy file name to clipboardExpand all lines: articles/active-directory/develop/troubleshoot-publisher-verification.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Below are some common issues that may occur during the process.
43
43
-**I am getting an error saying that my Partner One ID is invalid or that I do not have access to it.**
44
44
Follow the [remediation guidance](#mpnaccountnotfoundornoaccess).
45
45
46
-
-**When I sign in to the Azure portal, I do not see any apps registered. Why?**
46
+
-**When I sign in to the Microsoft Entra admin center, I do not see any apps registered. Why?**
47
47
Your app registrations may have been created using a different user account in this tenant, a personal/consumer account, or in a different tenant. Ensure you're signed in with the correct account in the tenant where your app registrations were created.
48
48
49
49
-**I'm getting an error related to multi-factor authentication. What should I do?**
|`tenant`| Required | The directory tenant that you want to request permission from. Can be provided in GUID or friendly name format OR generically referenced with `organizations` as seen in the example. Do not use 'common', as personal accounts cannot provide admin consent except in the context of a tenant. To ensure best compatibility with personal accounts that manage tenants, use the tenant ID when possible. |
43
-
|`client_id`| Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
43
+
|`client_id`| Required | The **Application (client) ID** that the [Microsoft Entra admin center – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
44
44
|`redirect_uri`| Required |The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the app registration portal. |
45
45
|`state`| Recommended | A value included in the request that will also be returned in the token response. It can be a string of any content you want. Use the state to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
46
46
|`scope`| Required | Defines the set of permissions being requested by the application. This can be either static (using `/.default`) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). |
0 commit comments