Skip to content

Commit f29ca05

Browse files
incorporate PR review feedback
1 parent 2eff1e8 commit f29ca05

File tree

8 files changed

+34
-44
lines changed

8 files changed

+34
-44
lines changed

articles/active-directory/develop/includes/console-app/quickstart-java.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: mmacy
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
10-
ms.topic: quickstart
10+
ms.topic: include
1111
ms.workload: identity
1212
ms.date: 01/10/2022
1313
ms.author: marsma
@@ -34,7 +34,7 @@ You have two options to start your quickstart application: Express (Option 1 bel
3434

3535
### Option 1: Register and auto configure your app and then download your code sample
3636

37-
1. Go to the <a href="https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/JavaDaemonQuickstartPage/sourceType/docs" target="_blank">Azure portal - App registrations</a> quickstart experience.
37+
1. Go to the [Azure portal - App registrations](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/JavaDaemonQuickstartPage/sourceType/docs) quickstart experience.
3838
1. Enter a name for your application and select **Register**.
3939
1. Follow the instructions to download and automatically configure your new application with just one click.
4040

@@ -43,7 +43,7 @@ You have two options to start your quickstart application: Express (Option 1 bel
4343
#### Step 1: Register your application
4444
To register your application and add the app's registration information to your solution manually, follow these steps:
4545

46-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
46+
1. Sign in to the [Azure portal](https://portal.azure.com/).
4747
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
4848
1. Search for and select **Azure Active Directory**.
4949
1. Under **Manage**, select **App registrations** > **New registration**.
@@ -166,7 +166,7 @@ ConfidentialClientApplication cca =
166166

167167
> | Where: |Description |
168168
> |---------|---------|
169-
> | `CLIENT_SECRET` | Is the client secret created for the application in Azure Portal. |
169+
> | `CLIENT_SECRET` | Is the client secret created for the application in Azure portal. |
170170
> | `CLIENT_ID` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
171171
> | `AUTHORITY` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
172172
@@ -206,7 +206,7 @@ IAuthenticationResult result;
206206

207207
> |Where:| Description |
208208
> |---------|---------|
209-
> | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure Portal.|
209+
> | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
210210
211211
[!INCLUDE [Help and support](../../../../../includes/active-directory-develop-help-support-include.md)]
212212

articles/active-directory/develop/includes/console-app/quickstart-netcore.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jmprieur
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
10-
ms.topic: quickstart
10+
ms.topic: include
1111
ms.workload: identity
1212
ms.date: 01/10/2022
1313
ms.author: jmprieur
@@ -36,7 +36,7 @@ You have two options to start building your application: automatic or manual con
3636

3737
If you want to register and automatically configure your app and then download the code sample, follow these steps:
3838

39-
1. Go to the <a href="https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs" target="_blank">Azure portal page for app registration</a>.
39+
1. Go to the [Azure portal page for app registration](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/DotNetCoreDaemonQuickstartPage/sourceType/docs).
4040
1. Enter a name for your application and select **Register**.
4141
1. Follow the instructions to download and automatically configure your new application in one click.
4242

@@ -47,7 +47,7 @@ If you want to manually configure your application and code sample, use the foll
4747
#### Step 1: Register your application
4848
To register your application and add the app's registration information to your solution manually, follow these steps:
4949

50-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</span></a>.
50+
1. Sign in to the [Azure portal](https://portal.azure.com/).
5151
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
5252
1. Search for and select **Azure Active Directory**.
5353
1. Under **Manage**, select **App registrations** > **New registration**.

articles/active-directory/develop/includes/console-app/quickstart-nodejs.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: mmacy
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
10-
ms.topic: quickstart
10+
ms.topic: include
1111
ms.date: 01/10/2022
1212
ms.author: marsma
1313
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by a Microsoft identity platform endpoint using client credentials flow.
@@ -31,7 +31,7 @@ Follow the steps below to get started.
3131
#### Step 1: Register the application
3232
To register your application and add the app's registration information to your solution manually, follow these steps:
3333

34-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
34+
1. Sign in to the [Azure portal](https://portal.azure.com/).
3535
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
3636
1. Search for and select **Azure Active Directory**.
3737
1. Under **Manage**, select **App registrations** > **New registration**.
@@ -139,8 +139,8 @@ const cca = new msal.ConfidentialClientApplication(msalConfig);
139139
| Where: |Description |
140140
|---------|---------|
141141
| `clientId` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
142-
| `authority` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
143-
| `clientSecret` | Is the client secret created for the application in Azure Portal. |
142+
| `authority` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant ID.|
143+
| `clientSecret` | Is the client secret created for the application in Azure portal. |
144144

145145
For more information, please see the [reference documentation for `ConfidentialClientApplication`](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-node/docs/initialize-confidential-client-application.md)
146146

@@ -158,7 +158,7 @@ const tokenResponse = await cca.acquireTokenByClientCredential(tokenRequest);
158158

159159
|Where:| Description |
160160
|---------|---------|
161-
| `tokenRequest` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure Portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under **Expose an API** section in Azure Portal's Application Registration. |
161+
| `tokenRequest` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under **Expose an API** section in Azure portal's Application Registration. |
162162
| `tokenResponse` | The response contains an access token for the scopes requested. |
163163

164164
[!INCLUDE [Help and support](../../../../../includes/active-directory-develop-help-support-include.md)]

articles/active-directory/develop/includes/console-app/quickstart-python.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jmprieur
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
10-
ms.topic: quickstart
10+
ms.topic: include
1111
ms.workload: identity
1212
ms.date: 01/10/2022
1313
ms.author: jmprieur
@@ -32,7 +32,7 @@ To run this sample, you need:
3232
#### Step 1: Register your application
3333
To register your application and add the app's registration information to your solution manually, follow these steps:
3434

35-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
35+
1. Sign in to the [Azure portal](https://portal.azure.com/).
3636
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
3737
1. Search for and select **Azure Active Directory**.
3838
1. Under **Manage**, select **App registrations** > **New registration**.
@@ -140,7 +140,7 @@ app = msal.ConfidentialClientApplication(
140140

141141
> | Where: |Description |
142142
> |---------|---------|
143-
> | `config["secret"]` | Is the client secret created for the application in Azure Portal. |
143+
> | `config["secret"]` | Is the client secret created for the application in Azure portal. |
144144
> | `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
145145
> | `config["authority"]` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
146146
@@ -161,7 +161,7 @@ if not result:
161161

162162
> |Where:| Description |
163163
> |---------|---------|
164-
> | `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure Portal.|
164+
> | `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
165165
166166
For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
167167

articles/active-directory/develop/quickstart-v2-java-daemon.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,9 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
5252

5353
##### Global tenant administrator
5454

55-
> [!div class="sxs-lookup"]
56-
> If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**.
57-
> > [!div id="apipermissionspage"]
58-
> > [Go to the API Permissions page]()
55+
If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**.
56+
> [!div id="apipermissionspage"]
57+
> [Go to the API Permissions page]()
5958
6059
##### Standard user
6160

@@ -64,10 +63,7 @@ If you're a standard user of your tenant, then you need to ask a global administ
6463
```url
6564
https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_id=Enter_the_Application_Id_Here
6665
```
67-
68-
> [!div class="sxs-lookup"]
69-
> #### Step 4: Run the application
70-
66+
#### Step 4: Run the application
7167

7268
You can test the sample directly by running the main method of ClientCredentialGrant.java from your IDE.
7369

@@ -134,7 +130,7 @@ ConfidentialClientApplication cca =
134130

135131
> | Where: |Description |
136132
> |---------|---------|
137-
> | `CLIENT_SECRET` | Is the client secret created for the application in Azure Portal. |
133+
> | `CLIENT_SECRET` | Is the client secret created for the application in Azure portal. |
138134
> | `CLIENT_ID` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
139135
> | `AUTHORITY` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
140136
@@ -174,7 +170,7 @@ IAuthenticationResult result;
174170

175171
> |Where:| Description |
176172
> |---------|---------|
177-
> | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure Portal.|
173+
> | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
178174
179175
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
180176

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -48,18 +48,15 @@ For the code sample in this quickstart to work, create a client secret and add t
4848
> > [!NOTE]
4949
> > `Enter_the_Supported_Account_Info_Here`
5050
51-
> [!div class="sxs-lookup"]
52-
5351
#### Step 3: Admin consent
5452

5553
If you try to run the application at this point, you'll receive an *HTTP 403 - Forbidden* error: "Insufficient privileges to complete the operation." This error happens because any app-only permission requires a global administrator of your directory to give consent to your application. Select one of the following options, depending on your role.
5654

5755
##### Global tenant administrator
5856

59-
> [!div class="sxs-lookup"]
60-
> If you're a global administrator, go to the **API Permissions** page and select **Grant admin consent for Enter_the_Tenant_Name_Here**.
61-
> > [!div id="apipermissionspage"]
62-
> > [Go to the API Permissions page]()
57+
If you're a global administrator, go to the **API Permissions** page and select **Grant admin consent for Enter_the_Tenant_Name_Here**.
58+
> [!div id="apipermissionspage"]
59+
> [Go to the API Permissions page]()
6360
6461
##### Standard user
6562

articles/active-directory/develop/quickstart-v2-nodejs-console.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,7 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
5151

5252
##### Global tenant administrator
5353

54-
> [!div class="sxs-lookup"]
55-
> If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**
54+
If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**
5655
> > [!div id="apipermissionspage"]
5756
> > [Go to the API Permissions page]()
5857
@@ -64,7 +63,6 @@ If you're a standard user of your tenant, then you need to ask a global administ
6463
https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_id=Enter_the_Application_Id_Here
6564
```
6665

67-
> [!div class="sxs-lookup"]
6866
#### Step 4: Run the application
6967

7068
Locate the sample's root folder (where `package.json` resides) in a command prompt or console. You'll need to install the dependencies of this sample once:

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,9 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
5252

5353
##### Global tenant administrator
5454

55-
> [!div class="sxs-lookup"]
56-
> If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**.
57-
> > [!div id="apipermissionspage"]
58-
> > [Go to the API Permissions page]()
55+
If you are a global administrator, go to **API Permissions** page select **Grant admin consent for Enter_the_Tenant_Name_Here**.
56+
> [!div id="apipermissionspage"]
57+
> [Go to the API Permissions page]()
5958
6059
##### Standard user
6160

@@ -65,8 +64,8 @@ If you're a standard user of your tenant, ask a global administrator to grant ad
6564
https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_id=Enter_the_Application_Id_Here
6665
```
6766

68-
> [!div class="sxs-lookup"]
69-
> #### Step 4: Run the application
67+
68+
#### Step 4: Run the application
7069

7170
You'll need to install the dependencies of this sample once.
7271

@@ -115,7 +114,7 @@ app = msal.ConfidentialClientApplication(
115114

116115
> | Where: |Description |
117116
> |---------|---------|
118-
> | `config["secret"]` | Is the client secret created for the application in Azure Portal. |
117+
> | `config["secret"]` | Is the client secret created for the application in Azure portal. |
119118
> | `config["client_id"]` | Is the **Application (client) ID** for the application registered in the Azure portal. You can find this value in the app's **Overview** page in the Azure portal. |
120119
> | `config["authority"]` | The STS endpoint for user to authenticate. Usually `https://login.microsoftonline.com/{tenant}` for public cloud, where {tenant} is the name of your tenant or your tenant Id.|
121120
@@ -136,7 +135,7 @@ if not result:
136135

137136
> |Where:| Description |
138137
> |---------|---------|
139-
> | `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure Portal.|
138+
> | `config["scope"]` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
140139
141140
For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
142141

0 commit comments

Comments
 (0)