You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|</p>ASP.NET Core 2.2 |[ASP.NET Core WebApp signs-in users tutorial](https://aka.ms/aspnetcore-webapp-sign-in)| Same sample in the [ASP.NET Core Web App calls Microsoft Graph](https://aka.ms/aspnetcore-webapp-call-msgraph) phase |
59
59
| </p> ASP.NET | [ASP.NET Quickstart](https://github.com/AzureAdQuickstarts/AppModelv2-WebApp-OpenIDConnect-DotNet) </p> [dotnet-webapp-openidconnect-v2](https://github.com/azure-samples/active-directory-dotnet-webapp-openidconnect-v2) | [dotnet-admin-restricted-scopes-v2](https://github.com/azure-samples/active-directory-dotnet-admin-restricted-scopes-v2) </p> |[msgraph-training-aspnetmvcapp](https://github.com/microsoftgraph/msgraph-training-aspnetmvcapp)
60
-
|||[ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp): an MSAL4J web app calling Microsoft Graph |
60
+
|||[ms-identity-java-webapp](https://github.com/Azure-Samples/ms-identity-java-webapp)|
61
+
|||[ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp)|
61
62
|||[Node.js Quickstart](https://github.com/azureadquickstarts/appmodelv2-webapp-openidconnect-nodejs)|
62
63
|||[msgraph-training-rubyrailsapp](https://github.com/microsoftgraph/msgraph-training-rubyrailsapp)|
63
64
@@ -70,6 +71,8 @@ The following samples show public client applications (desktop or mobile applica
70
71
| Desktop (WPF) ||[interactive](msal-authentication-flows.md#interactive)|[dotnet-desktop-msgraph-v2](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2)|[dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi)|
71
72
| Desktop (Console) ||[Integrated Windows Authentication](msal-authentication-flows.md#integrated-windows-authentication)|[dotnet-iwa-v2](https://github.com/azure-samples/active-directory-dotnet-iwa-v2)||
72
73
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[dotnetcore-up-v2](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2)||
74
+
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[ms-identity-java-desktop](https://github.com/Azure-Samples/ms-identity-java-desktop/tree/master/Call-MsGraph-WithUsernamePassword)||
75
+
| Desktop (Console) ||[Username/Password](msal-authentication-flows.md#usernamepassword)|[ms-identity-python-desktop](https://github.com/Azure-Samples/ms-identity-python-desktop/tree/master/2-Call-MsGraph-WithUsernamePassword)||
73
76
| Mobile (Android, iOS, UWP) ||[interactive](msal-authentication-flows.md#interactive)|[xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2)||
74
77
| Mobile (iOS) ||[interactive](msal-authentication-flows.md#interactive)|[ios-swift-objc-native-v2](https://github.com/azure-samples/active-directory-ios-swift-native-v2) </p> [ios-native-nxoauth2-v2](https://github.com/azure-samples/active-directory-ios-native-nxoauth2-v2)||
| Console |</p> ASP.NET |[Client Credentials](msal-authentication-flows.md#client-credentials)|[dotnetcore-daemon-v2](https://github.com/azure-samples/active-directory-dotnetcore-daemon-v2)|
86
89
| Web app |</p> ASP.NET |[Client Credentials](msal-authentication-flows.md#client-credentials)|[dotnet-daemon-v2](https://github.com/azure-samples/active-directory-dotnet-daemon-v2)|
90
+
| Console ||[Client Credentials](msal-authentication-flows.md#client-credentials)|[ms-identity-java-daemon](https://github.com/Azure-Samples/ms-identity-java-daemon)|
91
+
| Console ||[Client Credentials](msal-authentication-flows.md#client-credentials)|[ms-identity-python-daemon](https://github.com/Azure-Samples/ms-identity-python-daemon)|
87
92
88
93
## Headless applications
89
94
@@ -92,6 +97,8 @@ The following sample shows a public client application running on a device witho
@@ -101,6 +108,7 @@ The following samples show how to protect a web API with the Microsoft identity
101
108
| -------- | ------------------- |
102
109
|</p>ASP.NET Core 2.2 | ASP.NET Core web API (service) of [dotnet-native-aspnetcore-v2](https://aka.ms/msidentity-aspnetcore-webapi-calls-msgraph)|
103
110
|</p>ASP.NET MVC | Web API (service) of [ms-identity-aspnet-webapi-onbehalfof](https://github.com/Azure-Samples/ms-identity-aspnet-webapi-onbehalfof)|
111
+
|| Web API (service) of [ms-identity-java-webapi](https://github.com/Azure-Samples/ms-identity-java-webapi)|
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-web-app-sign-user-app-registration.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,29 +65,29 @@ You can use these links to bootstrap the creation of your web application:
65
65
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app. For example, enter **MailApp-openidconnect-v2**.
66
66
1. In the **Redirect URI (optional)** section, select **Web** in the combo box and enter the following redirect URI: **https://localhost:44326/**.
67
67
1. Select **Register** to create the application.
68
-
1. Select the **Authentication** menu.
68
+
1. Select the **Authentication** menu.
69
69
1. In the **Advanced settings** | **Implicit grant** section, select **ID tokens**. This sample requires the [implicit grant flow](v2-oauth2-implicit-grant-flow.md) to be enabled to sign in the user.
70
70
1. Select **Save**.
71
71
72
72
# [Java](#tab/java)
73
73
74
-
1. When the **Register an application page** appears, enter a display name for the application. For example, enter **java-webapp**.
74
+
1. When the **Register an application page** appears, enter a display name for the application. For example, enter **java-webapp**.
75
75
1. Select **Accounts in any organizational directory
76
76
and personal Microsoft Accounts (e.g. Skype, Xbox, Outlook.com)**,
77
77
and then select **Web app / API** for **Application Type**.
78
78
1. Select **Register** to register the application.
79
-
1. On the left menu, select **Authentication**. Under **Redirect URIs**, select **Web**.
79
+
1. On the left menu, select **Authentication**. Under **Redirect URIs**, select **Web**.
80
80
81
81
1. Enter two redirect URIs: one for the sign-in page, and one for the graph page. For both, use the same host and port number, followed by **/msal4jsample/secure/aad** for the sign-in page and **msal4jsample/graph/me** for the user information page.
1. In the **Advanced settings** section, set **Logout URL** to **http://localhost:8080/msal4jsample/sign_out**. Then, select **Save**.
88
+
Then, select **Save**.
89
89
90
-
1. Select **Certificates & secrets** from the menu.
90
+
1. Select **Certificates & secrets** from the menu.
91
91
1. In the **Client secrets** section, select **New client secret**, and then:
92
92
93
93
1. Enter a key description.
@@ -103,7 +103,6 @@ and personal Microsoft Accounts (e.g. Skype, Xbox, Outlook.com)**,
103
103
1. In the **Redirect URI (optional)** section, select **Web** in the combo box and enter the following redirect URI: **http://localhost:5000/getAToken**.
104
104
1. Select **Register** to create the application.
105
105
1. On the app's **Overview** page, find the **Application (client) ID** value and record it for later. You'll need it to configure the Visual Studio configuration file for this project.
106
-
1. Select the **Authentication** section. In **Advanced settings**, set **Logout URL** to **http://localhost:5000/logout**. Then, select **Save**.
107
106
1. On the left menu, select **Certificates & secrets**.
108
107
1. In the **Client Secrets** section, select **New client secret**, and then:
0 commit comments