Skip to content

Commit d2c0943

Browse files
Merge pull request #251676 from rwike77/entraadmin
Microsoft Entra admin center updates
2 parents 8938749 + e5411db commit d2c0943

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Take note of the **Object ID** value, which you'll need in the next step.
4949

5050
## Grant access to Microsoft Graph
5151

52-
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Azure portal. The following script will add the requested Microsoft Graph API permissions to the managed identity service principal object.
52+
When accessing the Microsoft Graph, the managed identity needs to have proper permissions for the operation it wants to perform. Currently, there's no option to assign such permissions through the Microsoft Entra admin center. The following script will add the requested Microsoft Graph API permissions to the managed identity service principal object.
5353

5454
# [PowerShell](#tab/azure-powershell)
5555

@@ -110,9 +110,9 @@ az rest --method post --uri $uri --body $body --headers "Content-Type=applicatio
110110

111111
---
112112

113-
After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
113+
After executing the script, you can verify in the [Microsoft Entra admin center](https://entra.microsoft.com) that the requested API permissions are assigned to the managed identity.
114114

115-
Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In **Managed Identities**, select the service principal for the managed identity.
115+
Go to **Applications**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. **Add a filter** for "Application type == Managed Identities" and select the service principal for the managed identity.
116116

117117
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal that appears in **Managed Identities** should *not* have a **Homepage URL** listed and the **Object ID** should match the object ID value of the managed identity in the [previous step](#enable-managed-identity-on-app).
118118

articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-user.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service
99
ms.topic: tutorial
1010
ms.workload: identity
11-
ms.date: 06/28/2023
11+
ms.date: 09/15/2023
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp, javascript
@@ -42,7 +42,7 @@ In this tutorial, you learn how to:
4242

4343
Now that you've enabled authentication and authorization on your web app, the web app is registered with the Microsoft identity platform and is backed by an Azure AD application. In this step, you give the web app permissions to access Microsoft Graph for the user. (Technically, you give the web app's Azure AD application the permissions to access the Microsoft Graph Azure AD application for the user.)
4444

45-
In the [Azure portal](https://portal.azure.com) menu, select **Azure Active Directory** or search for and select **Azure Active Directory** from any page.
45+
In the [Microsoft Entra admin center](https://entra.microsoft.com) menu, select **Applications**.
4646

4747
Select **App registrations** > **Owned applications** > **View all applications in this directory**. Select your web app name, and then select **API permissions**.
4848

@@ -208,7 +208,7 @@ public class Startup
208208

209209
### appsettings.json
210210

211-
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
211+
*AzureAd* specifies the configuration for the Microsoft.Identity.Web library. In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** from the portal menu and then select **App registrations**. Select the app registration created when you enabled the App Service authentication/authorization module. (The app registration should have the same name as your web app.) You can find the tenant ID and client ID in the app registration overview page. The domain name can be found in the Azure AD overview page for your tenant.
212212

213213
*Graph* specifies the Microsoft Graph endpoint and the initial scopes needed by the app.
214214

@@ -217,9 +217,9 @@ public class Startup
217217
"AzureAd": {
218218
"Instance": "https://login.microsoftonline.com/",
219219
"Domain": "[Enter the domain of your tenant, e.g. contoso.onmicrosoft.com]",
220-
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Azure portal. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221-
"ClientId": "[Enter the Client Id (Application ID obtained from the Azure portal), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
220+
"TenantId": "[Enter 'common', or 'organizations' or the Tenant Id (Obtained from the Entra admin center. Select 'Endpoints' from the 'App registrations' blade and use the GUID in any of the URLs), e.g. da41245a5-11b3-996c-00a8-4d99re19f292]",
221+
"ClientId": "[Enter the Client Id (Application ID obtained from the Microsoft Entra admin center), e.g. ba74781c2-53c2-442a-97c2-3d60re42f403]",
222+
"ClientSecret": "[Copy the client secret added to the app from the Microsoft Entra admin center]",
223223
"ClientCertificates": [
224224
],
225225
// the following is required to handle Continuous Access Evaluation challenges

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Below are some common issues that may occur during the process.
4343
- **I am getting an error saying that my Partner One ID is invalid or that I do not have access to it.**
4444
Follow the [remediation guidance](#mpnaccountnotfoundornoaccess).
4545

46-
- **When I sign in to the Azure portal, I do not see any apps registered. Why?**
46+
- **When I sign in to the Microsoft Entra admin center, I do not see any apps registered. Why?**
4747
Your app registrations may have been created using a different user account in this tenant, a personal/consumer account, or in a different tenant. Ensure you're signed in with the correct account in the tenant where your app registrations were created.
4848

4949
- **I'm getting an error related to multi-factor authentication. What should I do?**

articles/active-directory/develop/v2-admin-consent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2023
12+
ms.date: 09/15/2023
1313
ms.author: ryanwi
1414
ms.reviewer: ludwignick
1515
ms.custom: aaddev
@@ -40,7 +40,7 @@ https://login.microsoftonline.com/{tenant}/v2.0/adminconsent
4040
| Parameter | Condition | Description |
4141
| :--- | :--- | :--- |
4242
| `tenant` | Required | The directory tenant that you want to request permission from. Can be provided in GUID or friendly name format OR generically referenced with `organizations` as seen in the example. Do not use 'common', as personal accounts cannot provide admin consent except in the context of a tenant. To ensure best compatibility with personal accounts that manage tenants, use the tenant ID when possible. |
43-
| `client_id` | Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
43+
| `client_id` | Required | The **Application (client) ID** that the [Microsoft Entra admin center – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
4444
| `redirect_uri` | Required |The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the app registration portal. |
4545
| `state` | Recommended | A value included in the request that will also be returned in the token response. It can be a string of any content you want. Use the state to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
4646
|`scope` | Required | Defines the set of permissions being requested by the application. This can be either static (using `/.default`) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). |

0 commit comments

Comments
 (0)