You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,6 @@ For B2C tenants, there are two primary modes of communicating with the Graph API
26
26
27
27
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
28
28
29
-
>[!IMPORTANT]
30
-
> You **must** use the [Azure AD Graph API](../active-directory/develop/active-directory-graph-api-quickstart.md) to manage users in an Azure AD B2C directory. The Azure AD Graph API is different from the Microsoft Graph API. Learn more in this MSDN blog post: [Microsoft Graph or Azure AD Graph](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
31
-
32
29
## Prerequisites
33
30
34
31
Before you can create applications or users, you need an Azure AD B2C tenant. If you don't already have one, [Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/manage-user-access.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -172,3 +172,4 @@ The following is an example of a Version based terms of use consent in a claim:
172
172
## Next steps
173
173
174
174
- To learn how to delete and export user data, see [Manage user data](manage-user-data.md).
175
+
- For an example custom policy that implements a terms of use prompt, see [A B2C IEF Custom Policy - Sign Up and Sign In with 'Terms of Use' prompt](https://github.com/azure-ad-b2c/samples/tree/master/policies/sign-in-sign-up-versioned-tou).
title: Azure Active Directory authentication protocols | Microsoft Docs
3
-
description: An overview of the authentication protocols supported by Azure Active Directory (AD)
2
+
title: Microsoft identity platform authentication protocols | Microsoft Docs
3
+
description: An overview of the authentication protocols supported by Microsoft identity platform
4
4
author: rwike77
5
5
services: active-directory
6
6
manager: CelesteDG
@@ -10,29 +10,28 @@ ms.service: active-directory
10
10
ms.subservice: develop
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
-
ms.date: 04/27/2017
13
+
ms.date: 12/18/2019
14
14
ms.author: ryanwi
15
15
ms.custom: aaddev
16
16
ms.reviewer: hirsin
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Azure Active Directory authentication protocols
20
+
# Microsoft identity platform authentication protocols
21
21
22
-
Azure Active Directory (Azure AD) supports several of the most widely used authentication and authorization protocols. The topics in this section describe the supported protocols and their implementation in Azure AD. The topics included a review of supported claim types, an introduction to the use of federation metadata, detailed OAuth 2.0. and SAML 2.0 protocol reference documentation, and a troubleshooting section.
22
+
Microsoft identity platform supports several of the most widely used authentication and authorization protocols. The topics in this section describe the supported protocols and their implementation in Microsoft identity platform. The topics included a review of supported claim types, an introduction to the use of federation metadata, detailed OAuth 2.0. and SAML 2.0 protocol reference documentation, and a troubleshooting section.
23
23
24
24
## Authentication protocols articles and reference
25
25
26
-
*[Important Information About Signing Key Rollover in Azure AD](active-directory-signing-key-rollover.md) – Learn about Azure AD’s signing key rollover cadence, changes you can make to update the key automatically, and discussion for how to update the most common application scenarios.
27
-
*[Supported Token and Claim Types](v1-id-and-access-tokens.md) - Learn about the claims in the tokens that Azure AD issues.
28
-
*[Federation Metadata](azure-ad-federation-metadata.md) - Learn how to find and interpret the metadata documents that Azure AD generates.
29
-
*[OAuth 2.0 in Azure AD](v1-protocols-oauth-code.md) - Learn about the implementation of OAuth 2.0 in Azure AD.
30
-
*[OpenID Connect 1.0](v1-protocols-openid-connect-code.md) - Learn how to use OAuth 2.0, an authorization protocol, for authentication.
31
-
*[Service to Service Calls with Client Credentials](v1-oauth2-client-creds-grant-flow.md) - Learn how to use OAuth 2.0 client credentials grant flow for service to service calls.
32
-
*[Service to Service Calls with On-Behalf-Of Flow](v1-oauth2-on-behalf-of-flow.md) - Learn how to use OAuth 2.0 On-Behalf-Of flow for service to service calls.
33
-
*[SAML Protocol Reference](active-directory-saml-protocol-reference.md) - Learn about the Single Sign-On and Single Sign-out SAML profiles of Azure AD.
26
+
*[Important Information About Signing Key Rollover in Microsoft identity platform](active-directory-signing-key-rollover.md) – Learn about Microsoft identity platform’s signing key rollover cadence, changes you can make to update the key automatically, and discussion for how to update the most common application scenarios.
27
+
*[Supported Token and Claim Types](id-tokens.md) - Learn about the claims in the tokens that Microsoft identity platform issues.
28
+
*[OAuth 2.0 in Microsoft identity platform](v2-oauth2-auth-code-flow.md) - Learn about the implementation of OAuth 2.0 in Microsoft identity platform.
29
+
*[OpenID Connect 1.0](v2-protocols-oidc.md) - Learn how to use OAuth 2.0, an authorization protocol, for authentication.
30
+
*[Service to Service Calls with Client Credentials](v2-oauth2-client-creds-grant-flow.md) - Learn how to use OAuth 2.0 client credentials grant flow for service to service calls.
31
+
*[Service to Service Calls with On-Behalf-Of Flow](v2-oauth2-on-behalf-of-flow.md) - Learn how to use OAuth 2.0 On-Behalf-Of flow for service to service calls.
32
+
*[SAML Protocol Reference](active-directory-saml-protocol-reference.md) - Learn about the Single Sign-On and Single Sign-out SAML profiles of Microsoft identity platform.
34
33
35
34
## See also
36
35
37
-
*[Azure Active Directory Developer's Guide](v1-overview.md)
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-certificate-credentials.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: Azure AD certificate credentials
2
+
title: Microsoft identity platform certificate credentials
3
3
titleSuffix: Microsoft identity platform
4
-
description: This article discusses the registration and use of certificate credentials for application authentication
4
+
description: This article discusses the registration and use of certificate credentials for application authentication.
5
5
services: active-directory
6
6
author: rwike77
7
7
manager: CelesteDG
@@ -11,21 +11,21 @@ ms.service: active-directory
11
11
ms.subservice: develop
12
12
ms.workload: identity
13
13
ms.topic: conceptual
14
-
ms.date: 05/21/2019
14
+
ms.date: 12/18/2019
15
15
ms.author: ryanwi
16
16
ms.reviewer: nacanuma, jmprieur
17
17
ms.custom: aaddev
18
18
ms.collection: M365-identity-device-management
19
19
---
20
20
21
-
# Azure AD application authentication certificate credentials
21
+
# Microsoft identity platform application authentication certificate credentials
22
22
23
-
Azure Active Directory (Azure AD) allows an application to use its own credentials for authentication, for example, in the OAuth 2.0 Client Credentials Grant flow ([v1.0](v1-oauth2-client-creds-grant-flow.md), [v2.0](v2-oauth2-client-creds-grant-flow.md)) and the On-Behalf-Of flow ([v1.0](v1-oauth2-on-behalf-of-flow.md), [v2.0](v2-oauth2-on-behalf-of-flow.md)).
23
+
Microsoft identity platform allows an application to use its own credentials for authentication, for example, in the [OAuth 2.0 Client Credentials Grant flowv2.0](v2-oauth2-client-creds-grant-flow.md) and the [On-Behalf-Of flow](v2-oauth2-on-behalf-of-flow.md)).
24
24
25
25
One form of credential that an application can use for authentication is a JSON Web Token(JWT) assertion signed with a certificate that the application owns.
26
26
27
27
## Assertion format
28
-
28
+
Microsoft identity platform
29
29
To compute the assertion, you can use one of the many [JSON Web Token](https://jwt.ms/) libraries in the language of your choice. The information carried by the token are as follows:
30
30
31
31
### Header
@@ -85,9 +85,9 @@ The following string is an example of encoded assertion. If you look carefully,
85
85
Gh95kHCOEGq5E_ArMBbDXhwKR577scxYaoJ1P{a lot of characters here}KKJDEg"
86
86
```
87
87
88
-
## Register your certificate with Azure AD
88
+
## Register your certificate with Microsoft identity platform
89
89
90
-
You can associate the certificate credential with the client application in Azure AD through the Azure portal using any of the following methods:
90
+
You can associate the certificate credential with the client application in Microsoft identity platform through the Azure portal using any of the following methods:
91
91
92
92
### Uploading the certificate file
93
93
@@ -121,7 +121,7 @@ In the Azure app registration for the client application:
121
121
}
122
122
]
123
123
```
124
-
3. Save the edits to the application manifest and then upload the manifest to Azure AD.
124
+
3. Save the edits to the application manifest and then upload the manifest to Microsoft identity platform.
125
125
126
126
The `keyCredentials` property is multi-valued, so you may upload multiple certificates for richer key management.
127
127
@@ -130,4 +130,4 @@ In the Azure app registration for the client application:
130
130
> [!NOTE]
131
131
> You must calculate the X5T header by using the certificate's hash and converting it to a base64 string. In C# it would look something similar to that of : `System.Convert.ToBase64String(cert.GetCertHash());`
132
132
133
-
The code sample on [Authenticating to Azure AD in daemon apps with certificates](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential) shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential#create-a-self-signed-certificate) using the `New-SelfSignedCertificate` Powershell command. You can also take advantage and use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential/blob/master/AppCreationScripts/AppCreationScripts.md) to create the certificates, compute the thumbprint, and so on.
133
+
The code sample on [Authenticating to Microsoft identity platform in daemon apps with certificates](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential) shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential#create-a-self-signed-certificate) using the `New-SelfSignedCertificate` Powershell command. You can also take advantage and use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential/blob/master/AppCreationScripts/AppCreationScripts.md) to create the certificates, compute the thumbprint, and so on.
@@ -162,6 +162,7 @@ By default, MSAL uses the system browser except for .NET Framework desktop appli
162
162
163
163
## Next steps
164
164
165
-
See the [Microsoft identity platform developer glossary](developer-glossary.md) to get familiar with common terms.
166
-
See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn more about other scenarios for authenticating users supported by the Microsoft identity platform.
167
-
See [MSAL libraries](msal-overview.md) to learn about the Microsoft libraries that help you develop applications that work with Microsoft Accounts, Azure AD accounts, and Azure AD B2C users all in a single, streamlined programming model.
165
+
- See the [Microsoft identity platform developer glossary](developer-glossary.md) to get familiar with common terms.
166
+
- See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn more about other scenarios for authenticating users supported by the Microsoft identity platform.
167
+
- See [MSAL libraries](msal-overview.md) to learn about the Microsoft libraries that help you develop applications that work with Microsoft Accounts, Azure AD accounts, and Azure AD B2C users all in a single, streamlined programming model.
168
+
- See [Integrate App Service with Microsfot identity platform](/azure/app-service/configure-authentication-provider-aad) to learn how to configure authentication for your App Service app.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Call Azure AD protected ASP.NET Web API - Microsoft identity platform
3
-
description: In this quickstart, learn how to call an ASP.NET web API protected by Azure Active Directory from a Windows Desktop (WPF) application. The WPF client authenticates a user, requests an access token, and calls the web API.
2
+
title: Call a ASP.NET Web API protected by Microsoft identity platform
3
+
description: In this quickstart, learn how to call an ASP.NET web API protected by Microsoft identity platform from a Windows Desktop (WPF) application. The WPF client authenticates a user, requests an access token, and calls the web API.
# Quickstart: Call an ASP.NET Web API protected by Azure AD
19
+
# Quickstart: Call an ASP.NET Web API protected by Microsoft identity platform
20
20
21
-
In this quickstart, you expose a Web API and protect it so that only authenticated user can access it. This sample shows how to expose a ASP.NET Web API so it can accept tokens issued by personal accounts (including outlook.com, live.com, and others) as well as work and school accounts from any company or organization that has integrated with Azure Active Directory.
21
+
In this quickstart, you expose a Web API and protect it so that only authenticated user can access it. This sample shows how to expose a ASP.NET Web API so it can accept tokens issued by personal accounts (including outlook.com, live.com, and others) as well as work and school accounts from any company or organization that has integrated with Microsoft identity platform.
22
22
23
23
The sample also includes a Windows Desktop application (WPF) client that demonstrates how you can request an access token to access a Web API.
0 commit comments