Skip to content

Commit d5af91c

Browse files
committed
fixing issues found when reviewing rendered articles
1 parent 905bbee commit d5af91c

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@
139139
href: scenario-protected-web-api-app-registration.md
140140
- name: Code configuration
141141
href: scenario-protected-web-api-app-configuration.md
142-
name: Verification of scopes or app roles
142+
- name: Verification of scopes or app roles
143143
href: scenario-protected-web-api-verification-scope-app-roles.md
144144
- name: Move to production
145145
href: scenario-protected-web-api-production.md

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,4 +156,4 @@ The validators are all associated with properties of the `TokenValidationParamet
156156
## Next steps
157157

158158
> [!div class="nextstepaction"]
159-
> [Move to production](scenario-protected-web-api-verification-scope-app-roles.md)
159+
> [Verify scopes and app roles in your code](scenario-protected-web-api-verification-scope-app-roles.md)

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ The scopes are also displayed on the consent screen that's presented to end user
8484

8585
In this paragraph, you'll learn how to register your protected Web API so that it can be called securely by daemon applications:
8686

87-
- you'll need to expose application permissions
87+
- you' statuill need to expose application permissions
8888
- tenant admins may require AAD to acquire tokens for your Web App only for registered applications;
8989

9090
#### How to expose application permissions (app roles)
@@ -116,16 +116,16 @@ The content of `appRoles` should be the following (the `id` can be any unique GU
116116

117117
The Web API tests for the app role (that's the developer way of doing it). But you can even ask Azure Active Directory to issue a token for your Web API only to applications that were approved by the tenant admin. To add this additional security:
118118

119-
1. On the app **Overview** page for your app registration, select the hyperlink with the name of your application in **Managed application in local directory**. The title for this field can be truncated. You could, for instance, read: `Managed application in ...`)
119+
1. On the app **Overview** page for your app registration, select the hyperlink with the name of your application in **Managed application in local directory**. The title for this field can be truncated. You could, for instance, read: `Managed application in ...`
120120

121-
> !INFO
121+
> [!NOTE]
122122
>
123123
> When you select this link you will navigate to the **Enterprise Application Overview** page associated with the service principal for your application in the tenant where you created it. You can navigate back to the app registration page by using the back button of your browser.
124124
125125
1. Select the **Properties** page in the **Manage** section of the Enterprise application pages
126126
1. If you want AAD to enforce access to your Web API from only certain clients, set **User assignment required?** to **Yes**.
127127

128-
> ! IMPORTANT
128+
> [!IMPORTANT]
129129
>
130130
> By setting **User assignment required?** to **Yes**, AAD will check the app role assignments of the clients when they request an access token for the Web API. If the client was not be assigned to any AppRoles, AAD would just return `invalid_client: AADSTS501051: Application xxxx is not assigned to a role for the xxxx`
131131
>

0 commit comments

Comments
 (0)