Skip to content

Commit e50d236

Browse files
authored
Merge pull request #249912 from davidmu1/updatesteps25
updated sign-in steps for admin center
2 parents e5a40bc + edae97f commit e50d236

12 files changed

+31
-44
lines changed

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following table lists the base URLs for the Azure AD endpoints used to regis
4646
You can find the authentication endpoints for your application.
4747

4848
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49-
1. Browse to **Identity** > **Applications** > **Application registrations**.
49+
1. Browse to **Identity** > **Applications** > **App registrations**.
5050
1. Select **Endpoints** in the top menu.
5151

5252
The **Endpoints** page is displayed showing the authentication endpoints for the application.

articles/active-directory/develop/howto-call-a-web-api-with-curl.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Follow these steps to create the web API registration:
7272

7373
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7474
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
75-
1. Browse to **Identity** > **Applications** > **Application registrations**.
75+
1. Browse to **Identity** > **Applications** > **App registrations**.
7676
1. Select **New registration**.
7777
1. Enter a **Name** for the application, such as *NewWebAPI1*.
7878
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
@@ -118,7 +118,7 @@ Follow these steps to create the web app registration:
118118

119119
::: zone pivot="no-api"
120120

121-
1. Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
121+
1. Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **App registrations**.
122122
1. Select **New registration**.
123123
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
124124
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -131,7 +131,7 @@ Follow these steps to create the web app registration:
131131

132132
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
133133
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
134-
1. Browse to **Identity** > **Applications** > **Application registrations**.
134+
1. Browse to **Identity** > **Applications** > **App registrations**.
135135
1. Select **New registration**.
136136
1. Enter a Name for the application, such as `web-app-calls-web-api`.
137137
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -258,7 +258,7 @@ The authorization code flow begins with the client directing the user to the `/a
258258
```
259259

260260
1. Copy the URL, replace the following parameters and paste it into your browser:
261-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
261+
- `{tenant_id}` is the web app **Directory (tenant) ID**.
262262
- `{web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web app's (*web-app-calls-web-api*) **Overview** pane.
263263
- `{web_API_application_client_id}` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
264264
1. Sign in as a user in the Azure AD tenant in which the apps are registered. Consent to any requests for access, if necessary.
@@ -283,7 +283,7 @@ cURL can now be used to request an access token from the Microsoft identity plat
283283
-d 'grant_type=authorization_code' \
284284
-d 'client_secret={client_secret}'
285285
```
286-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
286+
- `{tenant_id}` is the web app **Directory (tenant) ID**.
287287
- `client_id={web-app-calls-web-api_application_client_id}`, and `session_state={web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web application's (*web-app-calls-web-api*) **Overview** pane.
288288
- `api://{web_API_application_client_id}/Forecast.Read` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
289289
- `code={authorization_code}` is the authorization code that was received in [Request an authorization code](#request-an-authorization-code). This enables the cURL tool to request an access token.

articles/active-directory/develop/howto-call-a-web-api-with-postman.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Follow these steps to create the web API registration:
7171

7272
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7373
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
74-
1. Browse to **Identity** > **Applications** > **Application registrations**.
74+
1. Browse to **Identity** > **Applications** > **App registrations**.
7575
1. Select **New registration**.
7676
1. Enter a **Name** for the application, such as _NewWebAPI1_.
7777
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
@@ -116,7 +116,7 @@ Follow these steps to create the web app registration:
116116

117117
::: zone pivot="no-api"
118118

119-
Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
119+
Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **App registrations**.
120120
1. Select **New registration**.
121121
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
122122
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -129,7 +129,7 @@ Select **Home** to return to the home page. Browse to **Identity** > **Applicati
129129

130130
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
131131
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
132-
1. Browse to **Identity** > **Applications** > **Application registrations**.
132+
1. Browse to **Identity** > **Applications** > **App registrations**.
133133
1. Select **New registration**.
134134
1. Enter a Name for the application, such as `web-app-calls-web-api`.
135135
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -183,8 +183,8 @@ You may also notice the **User.Read** permission for the Microsoft Graph API. Th
183183

184184
1. Navigate to `ms-identity-docs-code-dotnet/web-api` folder and open `appsettings.json`, replace the `{APPLICATION_CLIENT_ID}` and `{DIRECTORY_TENANT_ID}` with:
185185

186-
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations**.
187-
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations**.
186+
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane.
187+
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane.
188188

189189
1. Execute the following command to start the app:
190190

articles/active-directory/develop/howto-configure-app-instance-property-locks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To configure an app instance lock:
3838

3939
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4040
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
41-
1. Browse to **Identity** > **Applications** > **Application registrations**.
41+
1. Browse to **Identity** > **Applications** > **App registrations**.
4242
1. Select the application you want to configure.
4343
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
4444

articles/active-directory/develop/msal-android-single-sign-on.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Once you've generated a signature hash with _keytool_, use the Azure portal to g
116116

117117
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
118118
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
119-
1. Browse to **Identity** > **Applications** > **Application registrations**.
119+
1. Browse to **Identity** > **Applications** > **App registrations**.
120120
1. Select your application, and then select **Authentication** > **Add a platform** > **Android**.
121121
1. In the **Configure your Android app** pane that opens, enter the **Signature hash** that you generated earlier and a **Package name**.
122122
1. Select the **Configure** button.

articles/active-directory/develop/msal-net-use-brokers-with-xamarin-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Add the redirect URI to the app's registration. To generate a properly formatted
182182
**To generate the redirect URI:**
183183

184184
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
185-
1. Browse to **Identity** > **Applications** > **Application registrations**.
185+
1. Browse to **Identity** > **Applications** > **App registrations**.
186186
1. Search for and select the application.
187187
1. Select **Authentication** > **Add a platform** > **iOS / macOS**
188188
1. Enter your bundle ID, and then select **Configure**.

articles/active-directory/develop/quickstart-daemon-app-java-acquire-token.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ To run this sample, you need:
2828
- [Java Development Kit (JDK)](https://openjdk.java.net/) 8 or greater
2929
- [Maven](https://maven.apache.org/)
3030

31+
## Register and download your quickstart app
32+
3133
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3234

3335
### Step 1: Register the application

articles/active-directory/develop/quickstart-mobile-app-ios-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To register your application and add the app's registration information to your
4040

4141
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
4242
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
43-
1. Browse to **Identity** > **Applications** > **Application registrations**.
43+
1. Browse to **Identity** > **Applications** > **App registrations**.
4444
1. Select **New registration**.
4545
1. Enter a **Name** for your application. Users of your app might see this name, and you can change it later.
4646
1. Select **Register**.

articles/active-directory/develop/quickstart-single-page-app-angular-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This quickstart uses MSAL Angular v2 with the authorization code flow.
3535

3636
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
3737
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
38-
1. Browse to **Identity** > **Applications** > **Application registrations**.
38+
1. Browse to **Identity** > **Applications** > **App registrations**.
3939
1. Select **New registration**.
4040
1. Enter a **Name** for your application. Users of your app might see this name, and you can change it later.
4141
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.

articles/active-directory/develop/quickstart-single-page-app-react-sign-in.md

Lines changed: 11 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -34,26 +34,12 @@ See [How the sample works](#how-the-sample-works) for an illustration.
3434

3535
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3636

37-
To start your quickstart application, use either of the following options.
37+
### Step 1: Register your application
3838

39-
### Option 1 (Express): Register and auto configure your app and then download your code sample
40-
41-
1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade/quickStartType/AngularSpaQuickstartPage/sourceType/docs) quickstart experience.
42-
1. Enter a name for your application.
43-
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
44-
1. Select **Register**.
45-
1. Go to the quickstart pane and follow the instructions to download and automatically configure your new application.
46-
47-
### Option 2 (Manual): Register and manually configure your application and code sample
48-
49-
#### Step 1: Register your application
50-
51-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
52-
53-
1. Sign in to the [Azure portal](https://portal.azure.com/).
54-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
55-
1. Search for and select **Azure Active Directory**.
56-
Under **Manage**, select **App registrations** > **New registration**.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
40+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
41+
1. Browse to **Identity** > **Applications** > **App registrations**.
42+
1. Select **New registration**.
5743
1. When the **Register an application** page appears, enter a name for your application.
5844
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
5945
1. Select **Register**. On the app **Overview** page, note the **Application (client) ID** value for later use.
@@ -64,12 +50,11 @@ Under **Manage**, select **App registrations** > **New registration**.
6450
1. Under **Platform Configurations** expand **Single-page application**.
6551
1. Confirm that under **Grant types** ![Already configured](media/quickstart-v2-javascript/green-check.png) Your Redirect URI is eligible for the Authorization Code Flow with PKCE.
6652

67-
#### Step 2: Download the project
68-
53+
### Step 2: Download the project
6954

7055
To run the project with a web server by using Node.js, [download the core project files](https://github.com/Azure-Samples/ms-identity-javascript-react-spa/archive/main.zip).
7156

72-
#### Step 3: Configure your JavaScript app
57+
### Step 3: Configure your JavaScript app
7358

7459
In the *src* folder, open the *authConfig.js* file and update the `clientID`, `authority`, and `redirectUri` values in the `msalConfig` object.
7560

@@ -95,17 +80,17 @@ Modify the values in the `msalConfig` section as described here:
9580
9681
- `Enter_the_Application_Id_Here` is the **Application (client) ID** for the application you registered.
9782
98-
To find the value of **Application (client) ID**, go to the app registration's **Overview** page in the Azure portal.
83+
To find the value of **Application (client) ID**, go to the app registration's **Overview** page.
9984
- `Enter_the_Cloud_Instance_Id_Here` is the instance of the Azure cloud. For the main or global Azure cloud, enter `https://login.microsoftonline.com`. For **national** clouds (for example, China), see [National clouds](authentication-national-cloud.md).
10085
- `Enter_the_Tenant_info_here` is set to one of the following:
10186
- If your application supports *accounts in this organizational directory*, replace this value with the **Tenant ID** or **Tenant name**. For example, `contoso.microsoft.com`.
10287

103-
To find the value of the **Directory (tenant) ID**, go to the app registration's **Overview** page in the Azure portal.
88+
To find the value of the **Directory (tenant) ID**, go to the app registration's **Overview** page.
10489
- If your application supports *accounts in any organizational directory*, replace this value with `organizations`.
10590
- If your application supports *accounts in any organizational directory and personal Microsoft accounts*, replace this value with `common`. **For this quickstart**, use `common`.
10691
- To restrict support to *personal Microsoft accounts only*, replace this value with `consumers`.
10792
108-
To find the value of **Supported account types**, go to the app registration's **Overview** page in the Azure portal.
93+
To find the value of **Supported account types**, go to the app registration's **Overview** page.
10994
- `Enter_the_Redirect_Uri_Here` is `http://localhost:3000/`.
11095

11196
The `authority` value in your *authConfig.js* should be similar to the following if you're using the main (global) Azure cloud:
@@ -125,7 +110,7 @@ Scroll down in the same file and update the `graphMeEndpoint`.
125110
};
126111
```
127112
128-
#### Step 4: Run the project
113+
### Step 4: Run the project
129114
130115
Run the project with a web server by using Node.js:
131116

0 commit comments

Comments
 (0)