Skip to content

Commit f4f9cc6

Browse files
authored
Merge pull request #94872 from mmacy/b2c-appreg-cap-fix
[b2c] app reg capitalization fix to match UI
2 parents e9defd0 + 18a5037 commit f4f9cc6

22 files changed

+31
-31
lines changed

articles/active-directory-b2c/active-directory-b2c-custom-setup-msa-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
4040
1. Select **Certificates & secrets**
4141
1. Click **New client secret**
4242
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
43-
1. Record the application password shown in the **VALUE** column. You use this value in the next section.
43+
1. Record the application password shown in the **Value** column. You use this value in the next section.
4444

4545
## Create a policy key
4646

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Not currently. This feature is on our roadmap. Verifying your domain in the **Do
128128

129129
Follow these steps to delete your Azure AD B2C tenant.
130130

131-
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
131+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
132132

133133
#### [Applications](#tab/applications/)
134134

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ You need to register these two applications in your Azure AD B2C tenant only onc
6969

7070
### Register the IdentityExperienceFramework application
7171

72-
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
72+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
7373

7474
#### [Applications](#tab/applications/)
7575

@@ -147,7 +147,7 @@ Now, grant permissions to the API scope you exposed earlier in the *IdentityExpe
147147
1. Select **Grant admin consent for (your tenant name)**.
148148
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
149149
1. Select **Accept**.
150-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
150+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for both scopes. It might take a few minutes for the permissions to propagate.
151151

152152
* * *
153153

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Follow these steps register an application, grant it the required Microsoft Grap
119119
1. Select **Grant admin consent for (your tenant name)**.
120120
1. Select your currently signed-in account if it's been assigned the *Global Administrator* role, or sign in with an account in your Azure AD B2C tenant that's been assigned the *Global Administrator* role.
121121
1. Select **Accept**.
122-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
122+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
123123

124124
* * *
125125

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4343
4444
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4545
1. Select **Certificates & secrets**, and then select **New client secret**.
46-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **VALUE** of the secret for use in a later step.
46+
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4747
4848
## Create a policy key
4949

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4343
4444
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4545
1. Select **Certificates & secrets**, and then select **New client secret**.
46-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **VALUE** of the secret for use in a later step.
46+
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4747
4848
## Create a policy key
4949

articles/active-directory-b2c/active-directory-b2c-setup-msa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use a Microsoft account as an [identity provider](active-directory-b2c-refere
3333
1. Select **Certificates & secrets**
3434
1. Click **New client secret**
3535
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
36-
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
36+
1. Record the application password shown in the **Value** column. You need this when you configure the identity provider in the next section.
3737

3838
## Configure a Microsoft account as an identity provider
3939

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app-webapi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ In the prerequisite tutorial, you registered a native client application named *
6262
1. Under **Configured permissions**, select **Add a permission**.
6363
1. Select the **My APIs** tab.
6464
1. Select the API to which the native client application should be granted access. For example, *webapi1*.
65-
1. Under **PERMISSION**, expand **demo**, and then select the scopes that you defined earlier. For example, *demo.read* and *demo.write*.
65+
1. Under **Permission**, expand **demo**, and then select the scopes that you defined earlier. For example, *demo.read* and *demo.write*.
6666
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
6767
1. Select **Grant admin consent for (your tenant name)**.
6868
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
6969
1. Select **Accept**.
70-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
70+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for both scopes. It might take a few minutes for the permissions to propagate.
7171

7272
* * *
7373

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Additionally, you need the following in your local development environment:
4444

4545
In the second tutorial that you completed as part of the prerequisites, you registered a web application in Azure AD B2C. To enable communication with the sample in the tutorial, you need to add a redirect URI to the application in Azure AD B2C.
4646

47-
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience to update the application. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
47+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience to update the application. [Learn more about the new experience](https://aka.ms/b2cappregintro).
4848

4949
#### [Applications](#tab/applications/)
5050

articles/active-directory-b2c/active-directory-b2c-tutorials-web-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Complete the steps and prerequisites in [Tutorial: Enable authenticate in a web
3535

3636
Web API resources need to be registered in your tenant before they can accept and respond to protected resource requests by client applications that present an access token.
3737

38-
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
38+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
3939

4040
#### [Applications](#tab/applications/)
4141

0 commit comments

Comments
 (0)