Skip to content

Commit f1bc772

Browse files
committed
merging ignite changes
2 parents 6d451d3 + 5add61b commit f1bc772

File tree

2,814 files changed

+78224
-24129
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,814 files changed

+78224
-24129
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@
170170
{
171171
"path_to_root": "samples-cognitive-services-speech-sdk",
172172
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
173-
"branch": "docs-201807",
173+
"branch": "docs-201809",
174174
"branch_mapping": {}
175175
},
176176
{

.openpublishing.redirection.json

Lines changed: 568 additions & 75 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C tenants tend to be very large. This means
2323
For B2C tenants, there are two primary modes of communicating with the Graph API.
2424

2525
* For interactive, run-once tasks, you should act as an administrator account in the B2C tenant when you perform the tasks. This mode requires an administrator to sign in with credentials before that admin can perform any calls to the Graph API.
26-
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/authentication-scenarios.md#daemon-or-server-application-to-web-api). In this case, the application acts as itself, not as a user, to call the Graph API.
26+
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/service-to-service.md). In this case, the application acts as itself, not as a user, to call the Graph API.
2727

2828
In this article, you learn how to perform the automated-use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a noninteractive, automated fashion.
2929

0 commit comments

Comments
 (0)