Skip to content

Commit e16ee8b

Browse files
committed
modifications from review.
1 parent 0774ecd commit e16ee8b

File tree

2 files changed

+34
-28
lines changed

2 files changed

+34
-28
lines changed

articles/active-directory/develop/quickstart-register-app.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,3 @@
1-
---
2-
title: "Quickstart: Register an app in the Microsoft identity platform"
3-
description: In this quickstart, you learn how to register an application with the Microsoft identity platform.
4-
services: active-directory
5-
author: cilwerner
6-
manager: CelesteDG
7-
ms.service: active-directory
8-
ms.subservice: develop
9-
ms.topic: quickstart
10-
ms.workload: identity
11-
ms.date: 10/31/2022
12-
ms.author: cwerner
13-
ms.custom: aaddev, identityplatformtop40, contperf-fy21q1, contperf-fy21q2, contperf-fy21q4, mode-other
14-
#Customer intent: As developer, I want to know how to register my application with the Microsoft identity platform so that the security token service can issue ID and/or access tokens to client applications that request them.
15-
---
161

172
[!INCLUDE [quickstart-register-app](../../../includes/active-directory-develop-quickstart-register-app.md)]
183

includes/active-directory-develop-quickstart-register-app.md

Lines changed: 34 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,41 @@
1+
---
2+
title: "Quickstart: Register an app in the Microsoft identity platform"
3+
description: In this quickstart, you learn how to register an application with the Microsoft identity platform.
4+
services: active-directory
5+
author: cilwerner
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.topic: quickstart
10+
ms.workload: identity
11+
ms.date: 10/31/2022
12+
ms.author: cwerner
13+
ms.custom: aaddev, identityplatformtop40, contperf-fy21q1, contperf-fy21q2, contperf-fy21q4, mode-other
14+
#Customer intent: As developer, I want to know how to register my application with the Microsoft identity platform so that the security token service can issue ID and/or access tokens to client applications that request them.
15+
16+
# This include file is currently referenced in the following documentation:
17+
18+
# https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
19+
# https://learn.microsoft.com/en-us/graph/auth-register-app-v2
20+
---
21+
122
# Quickstart: Register an application with the Microsoft identity platform
223

324
Get started with the Microsoft identity platform by registering an application in the Azure portal.
425

526
The Microsoft identity platform performs identity and access management (IAM) only for registered applications. Whether it's a client application like a web or mobile app, or it's a web API that backs a client app, registering it establishes a trust relationship between your application and the identity provider, the Microsoft identity platform.
627

728
> [!TIP]
8-
> To register an application for Azure AD B2C, follow the steps in [Tutorial: Register a web application in Azure AD B2C](../articles/active-directory-b2c/tutorial-register-applications.md).
29+
> To register an application for Azure AD B2C, follow the steps in [Tutorial: Register a web application in Azure AD B2C](../articles/active-directory-b2c/tutorial-register-applications).
930
1031
## Prerequisites
1132

1233
- An Azure account that has an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
1334
- The Azure account must have permission to manage applications in Azure Active Directory (Azure AD). Any of the following Azure AD roles include the required permissions:
14-
- [Application administrator](../articles/active-directory/roles/permissions-reference.md#application-administrator)
15-
- [Application developer](../articles/active-directory/roles/permissions-reference.md#application-developer)
35+
- [Application administrator](../articles/active-directory/roles/permissions-reference#application-administrator)
36+
- [Application developer](../articles/active-directory/roles/permissions-reference#application-developer)
1637
- [Cloud application administrator](../articles/active-directory/roles/permissions-reference.md#cloud-application-administrator)
17-
- Completion of the [Set up a tenant](..//articles/active-directory/develop/quickstart-create-new-tenant.md) quickstart.
38+
- Completion of the [Set up a tenant](../articles/active-directory/develop/quickstart-create-new-tenant) quickstart.
1839

1940
## Register an application
2041

@@ -84,19 +105,19 @@ To configure application settings based on the platform or device you're targeti
84105

85106
### Redirect URI restrictions
86107

87-
There are some restrictions on the format of the redirect URIs you add to an app registration. For details about these restrictions, see [Redirect URI (reply URL) restrictions and limitations](../articles/active-directory/develop/reply-url.md).
108+
There are some restrictions on the format of the redirect URIs you add to an app registration. For details about these restrictions, see [Redirect URI (reply URL) restrictions and limitations](../articles/active-directory/develop/reply-url).
88109

89110
## Add credentials
90111

91-
Credentials are used by [confidential client applications](../articles/active-directory/develop/msal-client-applications.md) that access a web API. Examples of confidential clients are web apps, other web APIs, or service-type and daemon-type applications. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime.
112+
Credentials are used by [confidential client applications](../articles/active-directory/develop/msal-client-applications) that access a web API. Examples of confidential clients are web apps, other web APIs, or service-type and daemon-type applications. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime.
92113

93114
You can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
94115

95116
:::image type="content" source="../articles/active-directory/develop/media/quickstart-register-app/portal-05-app-reg-04-credentials.png" alt-text="Screenshot of the Azure portal, showing the Certificates and secrets pane in an app registration.":::
96117

97118
### Add a certificate
98119

99-
Sometimes called a _public key_, a certificate is the recommended credential type because they're considered more secure than client secrets. For more information about using a certificate as an authentication method in your application, see [Microsoft identity platform application authentication certificate credentials](../articles/active-directory/develop/active-directory-certificate-credentials.md).
120+
Sometimes called a _public key_, a certificate is the recommended credential type because they're considered more secure than client secrets. For more information about using a certificate as an authentication method in your application, see [Microsoft identity platform application authentication certificate credentials](../articles/active-directory/develop/active-directory-certificate-credentials).
100121

101122
1. In the Azure portal, in **App registrations**, select your application.
102123
1. Select **Certificates & secrets** > **Certificates** > **Upload certificate**.
@@ -118,12 +139,12 @@ Client secrets are considered less secure than certificate credentials. Applicat
118139
1. Select **Add**.
119140
1. _Record the secret's value_ for use in your client application code. This secret value is _never displayed again_ after you leave this page.
120141

121-
For application security recommendations, see [Microsoft identity platform best practices and recommendations](../articles/active-directory/develop/identity-platform-integration-checklist.md#security).
142+
For application security recommendations, see [Microsoft identity platform best practices and recommendations](../articles/active-directory/develop/identity-platform-integration-checklist#security).
122143

123144

124145
### Add a federated credential
125146

126-
Federated identity credentials are a type of credential that allows workloads, such as GitHub Actions, workloads running on Kubernetes, or workloads running in compute platforms outside of Azure access Azure AD protected resources without needing to manage secrets using [workload identity federation](../articles/active-directory/develop/workload-identity-federation.md).
147+
Federated identity credentials are a type of credential that allows workloads, such as GitHub Actions, workloads running on Kubernetes, or workloads running in compute platforms outside of Azure access Azure AD protected resources without needing to manage secrets using [workload identity federation](../articles/active-directory/develop/workload-identity-federation).
127148

128149
To add a federated credential, follow these steps:
129150

@@ -132,9 +153,9 @@ To add a federated credential, follow these steps:
132153
1. In the **Federated credential scenario** drop-down box, select one of the supported scenarios, and follow the corresponding guidance to complete the configuration.
133154

134155
- **Customer managed keys** for encrypt data in your tenant using Azure Key Vault in another tenant.
135-
- **GitHub actions deploying Azure resources** to [configure a GitHub workflow](../articles/active-directory/develop/workload-identity-federation-create-trust.md#github-actions) to get tokens for your application and deploy assets to Azure.
136-
- **Kubernetes accessing Azure resources** to configure a [Kubernetes service account](../articles/active-directory/develop/workload-identity-federation-create-trust.md#kubernetes) to get tokens for your application and access Azure resources.
137-
- **Other issuer** to configure an identity managed by an external [OpenID Connect provider](../articles/active-directory/develop/workload-identity-federation-create-trust.md#other-identity-providers) to get tokens for your application and access Azure resources.
156+
- **GitHub actions deploying Azure resources** to [configure a GitHub workflow](../articles/active-directory/develop/workload-identity-federation-create-trust#github-actions) to get tokens for your application and deploy assets to Azure.
157+
- **Kubernetes accessing Azure resources** to configure a [Kubernetes service account](../articles/active-directory/develop/workload-identity-federation-create-trust#kubernetes) to get tokens for your application and access Azure resources.
158+
- **Other issuer** to configure an identity managed by an external [OpenID Connect provider](../articles/active-directory/develop/workload-identity-federation-create-trust#other-identity-providers) to get tokens for your application and access Azure resources.
138159

139160

140-
For more information, how to get an access token with a federated credential, check out the [Microsoft identity platform and the OAuth 2.0 client credentials flow](../articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md#third-case-access-token-request-with-a-federated-credential) article.
161+
For more information, how to get an access token with a federated credential, check out the [Microsoft identity platform and the OAuth 2.0 client credentials flow](../articles/active-directory/develop/v2-oauth2-client-creds-grant-flow#third-case-access-token-request-with-a-federated-credential) article.

0 commit comments

Comments
 (0)