@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice : develop
11
11
ms.topic : how-to
12
12
ms.workload : identity
13
- ms.date : 05/23 /2023
13
+ ms.date : 08/16 /2023
14
14
ms.author : davidmu
15
15
ms.custom : aaddev
16
16
ms.reviewer : JasSuri
@@ -235,14 +235,14 @@ Create a service principal in the tenant for the authenticationeventsAPI app reg
235
235
236
236
Still in Graph Explorer , run the following request . Replace `{authenticationeventsAPI_AppId }` with the value of ** appId ** that you recorded from the previous step .
237
237
238
- ```http
239
- POST https :// graph.microsoft.com/v1.0/servicePrincipals
240
- Content - type : application / json
238
+ ```http
239
+ POST https :// graph.microsoft.com/v1.0/servicePrincipals
240
+ Content - type : application / json
241
241
242
- {
243
- " appId" : " {authenticationeventsAPI_AppId}"
244
- }
245
- ```
242
+ {
243
+ " appId" : " {authenticationeventsAPI_AppId}"
244
+ }
245
+ ```
246
246
247
247
### Set the App ID URI, access token version, and required resource access
248
248
@@ -253,34 +253,34 @@ In Graph Explorer, run the following request.
253
253
- Set the `{authenticationeventsAPI_AppId }` value with the ** appId ** that you recorded earlier .
254
254
- An example value is `api : // authenticationeventsAPI.azurewebsites.net/f4a70782-3191-45b4-b7e5-dd415885dd80`. Take note of this value as you'll use it later in this article in place of `{functionApp_IdentifierUri}`.
255
255
256
- ```http
257
- POST https :// graph.microsoft.com/v1.0/applications/{authenticationeventsAPI_ObjectId}
258
- Content - type : application / json
259
-
256
+ ```http
257
+ POST https :// graph.microsoft.com/v1.0/applications/{authenticationeventsAPI_ObjectId}
258
+ Content - type : application / json
259
+
260
+ {
261
+ " identifierUris" : [
262
+ " api://{Function_Url_Hostname}/{authenticationeventsAPI_AppId}"
263
+ ],
264
+ " api" : {
265
+ " requestedAccessTokenVersion" : 2 ,
266
+ " acceptMappedClaims" : null ,
267
+ " knownClientApplications" : [],
268
+ " oauth2PermissionScopes" : [],
269
+ " preAuthorizedApplications" : []
270
+ },
271
+ " requiredResourceAccess" : [
260
272
{
261
- " identifierUris" : [
262
- " api://{Function_Url_Hostname}/{authenticationeventsAPI_AppId}"
263
- ],
264
- " api" : {
265
- " requestedAccessTokenVersion" : 2 ,
266
- " acceptMappedClaims" : null ,
267
- " knownClientApplications" : [],
268
- " oauth2PermissionScopes" : [],
269
- " preAuthorizedApplications" : []
270
- },
271
- " requiredResourceAccess" : [
273
+ " resourceAppId" : " 00000003-0000-0000-c000-000000000000" ,
274
+ " resourceAccess" : [
272
275
{
273
- " resourceAppId" : " 00000003-0000-0000-c000-000000000000" ,
274
- " resourceAccess" : [
275
- {
276
- " id" : " 214e810f-fda8-4fd7-a475-29461495eb00" ,
277
- " type" : " Role"
278
- }
279
- ]
276
+ " id" : " 214e810f-fda8-4fd7-a475-29461495eb00" ,
277
+ " type" : " Role"
280
278
}
281
279
]
282
280
}
283
- ```
281
+ ]
282
+ }
283
+ ```
284
284
285
285
### Register a custom authentication extension
286
286
0 commit comments