Skip to content

Commit e9bc6d0

Browse files
authored
Merge pull request #97599 from navyasric/nc-msal-docs
Add Python and Java sample links
2 parents e3c9bec + 8ed3c16 commit e9bc6d0

File tree

2 files changed

+15
-8
lines changed

2 files changed

+15
-8
lines changed

articles/active-directory/develop/sample-v2-code.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,8 @@ The following samples illustrate web applications that sign in users. Some sampl
5757
| -------- | ------------------- | --------------------------------- |
5858
| ![This image shows the ASP.NET Core logo](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.2 | [ASP.NET Core WebApp signs-in users tutorial](https://aka.ms/aspnetcore-webapp-sign-in) | Same sample in the [ASP.NET Core Web App calls Microsoft Graph](https://aka.ms/aspnetcore-webapp-call-msgraph) phase |
5959
| ![This image shows the ASP.NET logo](media/sample-v2-code/logo_NETframework.png)</p> ASP.NET | [ASP.NET Quickstart](https://github.com/AzureAdQuickstarts/AppModelv2-WebApp-OpenIDConnect-DotNet) </p> [dotnet-webapp-openidconnect-v2](https://github.com/azure-samples/active-directory-dotnet-webapp-openidconnect-v2) | [dotnet-admin-restricted-scopes-v2](https://github.com/azure-samples/active-directory-dotnet-admin-restricted-scopes-v2) </p> |[msgraph-training-aspnetmvcapp](https://github.com/microsoftgraph/msgraph-training-aspnetmvcapp)
60-
| ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | | [ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp): an MSAL4J web app calling Microsoft Graph |
60+
| ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | | [ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp) |
61+
| ![This image shows the Python logo](media/sample-v2-code/logo_python.png) | | [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp) |
6162
| ![This image shows the Node.js logo](media/sample-v2-code/logo_nodejs.png) | | [Node.js Quickstart](https://github.com/azureadquickstarts/appmodelv2-webapp-openidconnect-nodejs) |
6263
| ![This image shows the Ruby logo](media/sample-v2-code/logo_ruby.png) | | [msgraph-training-rubyrailsapp](https://github.com/microsoftgraph/msgraph-training-rubyrailsapp) |
6364

@@ -70,6 +71,8 @@ The following samples show public client applications (desktop or mobile applica
7071
| Desktop (WPF) | ![This image shows the .NET/C# logo](media/sample-v2-code/logo_NET.png) | [interactive](msal-authentication-flows.md#interactive)| [dotnet-desktop-msgraph-v2](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2) | [dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi) |
7172
| Desktop (Console) | ![This image shows the .NET/C# (Desktop) logo](media/sample-v2-code/logo_NET.png) | [Integrated Windows Authentication](msal-authentication-flows.md#integrated-windows-authentication) | [dotnet-iwa-v2](https://github.com/azure-samples/active-directory-dotnet-iwa-v2) | |
7273
| Desktop (Console) | ![This image shows the .NET/C# (Desktop) logo](media/sample-v2-code/logo_NETcore.png) | [Username/Password](msal-authentication-flows.md#usernamepassword) |[dotnetcore-up-v2](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2) | |
74+
| Desktop (Console) | ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | [Username/Password](msal-authentication-flows.md#usernamepassword) |[ms-identity-java-desktop](https://github.com/Azure-Samples/ms-identity-java-desktop/tree/master/Call-MsGraph-WithUsernamePassword) | |
75+
| Desktop (Console) | ![This image shows the Python logo](media/sample-v2-code/logo_python.png) | [Username/Password](msal-authentication-flows.md#usernamepassword) |[ms-identity-python-desktop](https://github.com/Azure-Samples/ms-identity-python-desktop/tree/master/2-Call-MsGraph-WithUsernamePassword) | |
7376
| Mobile (Android, iOS, UWP) | ![This image shows the .NET/C# (Xamarin) logo](media/sample-v2-code/logo_xamarin.png) | [interactive](msal-authentication-flows.md#interactive) |[xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | |
7477
| Mobile (iOS) | ![This image shows iOS/Objective-C or Swift](media/sample-v2-code/logo_iOS.png) | [interactive](msal-authentication-flows.md#interactive) |[ios-swift-objc-native-v2](https://github.com/azure-samples/active-directory-ios-swift-native-v2) </p> [ios-native-nxoauth2-v2](https://github.com/azure-samples/active-directory-ios-native-nxoauth2-v2) | |
7578
| Desktop (macOS) | macOS | [interactive](msal-authentication-flows.md#interactive) |[macOS-swift-objc-native-v2](https://github.com/Azure-Samples/ms-identity-macOS-swift-objc) | |
@@ -84,6 +87,8 @@ The following samples show an application that accesses the Microsoft Graph API
8487
| ------------------ | -------- | ---------- | -------------------- |
8588
| Console | ![This image shows the .NET Core logo](media/sample-v2-code/logo_NETcore.png)</p> ASP.NET | [Client Credentials](msal-authentication-flows.md#client-credentials) | [dotnetcore-daemon-v2](https://github.com/azure-samples/active-directory-dotnetcore-daemon-v2) |
8689
| Web app | ![This image shows the ASP.NET logo](media/sample-v2-code/logo_NETframework.png)</p> ASP.NET | [Client Credentials](msal-authentication-flows.md#client-credentials) | [dotnet-daemon-v2](https://github.com/azure-samples/active-directory-dotnet-daemon-v2) |
90+
| Console | ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | [Client Credentials](msal-authentication-flows.md#client-credentials) | [ms-identity-java-daemon](https://github.com/Azure-Samples/ms-identity-java-daemon) |
91+
| Console | ![This image shows the Python logo](media/sample-v2-code/logo_python.png) | [Client Credentials](msal-authentication-flows.md#client-credentials) | [ms-identity-python-daemon](https://github.com/Azure-Samples/ms-identity-python-daemon) |
8792

8893
## Headless applications
8994

@@ -92,6 +97,8 @@ The following sample shows a public client application running on a device witho
9297
| Client application | Platform | Flow/Grant | Calls Microsoft Graph |
9398
| ------------------ | -------- | ----------| ---------- |
9499
| Desktop (Console) | ![This image shows the .NET/C# (Desktop) logo](media/sample-v2-code/logo_NETcore.png) | [Device code flow](msal-authentication-flows.md#device-code) |[dotnetcore-devicecodeflow-v2](https://github.com/azure-samples/active-directory-dotnetcore-devicecodeflow-v2) |
100+
| Desktop (Console) | ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | [Device code flow](msal-authentication-flows.md#device-code) |[ms-identity-java-devicecodeflow](https://github.com/Azure-Samples/ms-identity-java-devicecodeflow) |
101+
| Desktop (Console) | ![This image shows the Python logo](media/sample-v2-code/logo_python.png) | [Device code flow](msal-authentication-flows.md#device-code) |[ms-identity-python-devicecodeflow](https://github.com/Azure-Samples/ms-identity-python-devicecodeflow) |
95102

96103
## Web APIs
97104

@@ -101,6 +108,7 @@ The following samples show how to protect a web API with the Microsoft identity
101108
| -------- | ------------------- |
102109
| ![This image shows the ASP.NET Core logo](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.2 | ASP.NET Core web API (service) of [dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi-calls-msgraph) |
103110
| ![This image shows the ASP.NET logo](media/sample-v2-code/logo_NET.png)</p>ASP.NET MVC | Web API (service) of [ms-identity-aspnet-webapi-onbehalfof](https://github.com/Azure-Samples/ms-identity-aspnet-webapi-onbehalfof) |
111+
| ![This image shows the Java logo](media/sample-v2-code/logo_java.png) | Web API (service) of [ms-identity-java-webapi](https://github.com/Azure-Samples/ms-identity-java-webapi) |
104112

105113
## Azure Functions as web APIs
106114

articles/active-directory/develop/scenario-web-app-sign-user-app-registration.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -65,29 +65,29 @@ You can use these links to bootstrap the creation of your web application:
6565
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app. For example, enter **MailApp-openidconnect-v2**.
6666
1. In the **Redirect URI (optional)** section, select **Web** in the combo box and enter the following redirect URI: **https://localhost:44326/**.
6767
1. Select **Register** to create the application.
68-
1. Select the **Authentication** menu.
68+
1. Select the **Authentication** menu.
6969
1. In the **Advanced settings** | **Implicit grant** section, select **ID tokens**. This sample requires the [implicit grant flow](v2-oauth2-implicit-grant-flow.md) to be enabled to sign in the user.
7070
1. Select **Save**.
7171

7272
# [Java](#tab/java)
7373

74-
1. When the **Register an application page** appears, enter a display name for the application. For example, enter **java-webapp**.
74+
1. When the **Register an application page** appears, enter a display name for the application. For example, enter **java-webapp**.
7575
1. Select **Accounts in any organizational directory
7676
and personal Microsoft Accounts (e.g. Skype, Xbox, Outlook.com)**,
7777
and then select **Web app / API** for **Application Type**.
7878
1. Select **Register** to register the application.
79-
1. On the left menu, select **Authentication**. Under **Redirect URIs**, select **Web**.
79+
1. On the left menu, select **Authentication**. Under **Redirect URIs**, select **Web**.
8080

8181
1. Enter two redirect URIs: one for the sign-in page, and one for the graph page. For both, use the same host and port number, followed by **/msal4jsample/secure/aad** for the sign-in page and **msal4jsample/graph/me** for the user information page.
82-
82+
8383
By default, the sample uses:
8484

8585
- **http://localhost:8080/msal4jsample/secure/aad**
8686
- **http://localhost:8080/msal4jsample/graph/me**
8787

88-
1. In the **Advanced settings** section, set **Logout URL** to **http://localhost:8080/msal4jsample/sign_out**. Then, select **Save**.
88+
Then, select **Save**.
8989

90-
1. Select **Certificates & secrets** from the menu.
90+
1. Select **Certificates & secrets** from the menu.
9191
1. In the **Client secrets** section, select **New client secret**, and then:
9292

9393
1. Enter a key description.
@@ -103,7 +103,6 @@ and personal Microsoft Accounts (e.g. Skype, Xbox, Outlook.com)**,
103103
1. In the **Redirect URI (optional)** section, select **Web** in the combo box and enter the following redirect URI: **http://localhost:5000/getAToken**.
104104
1. Select **Register** to create the application.
105105
1. On the app's **Overview** page, find the **Application (client) ID** value and record it for later. You'll need it to configure the Visual Studio configuration file for this project.
106-
1. Select the **Authentication** section. In **Advanced settings**, set **Logout URL** to **http://localhost:5000/logout**. Then, select **Save**.
107106
1. On the left menu, select **Certificates & secrets**.
108107
1. In the **Client Secrets** section, select **New client secret**, and then:
109108

0 commit comments

Comments
 (0)