Skip to content

Commit f822685

Browse files
committed
Addressing PR feedback
1 parent 3230157 commit f822685

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,10 @@ ms.collection: M365-identity-device-management
2323

2424
# Quickstart: Acquire a token and call Microsoft Graph API from a Python console app using app's identity
2525

26-
In this quickstart, you'll learn how to write a Python application that can get an access token using the app's own identity, and then call the Microsoft Graph API to display a [list of users](https://docs.microsoft.com/graph/api/user-list) in the directory. This scenario is useful for situations where headless, unattended job or a windows service needs to run with an application identity, instead of a user's identity.
26+
In this quickstart, write a Python application that gets an accessing token using the app's identity, and then calls the Microsoft Graph API to display a [list of users](https://docs.microsoft.com/graph/api/user-list) in the directory. This scenario is useful for situations where headless, unattended job or a windows service needs to run with an application identity, instead of a user's identity.
2727

28-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-netcore-daemon/netcore-daemon-intro.svg)
28+
> [!div renderon="docs"]
29+
> ![Shows how the sample app generated by this quickstart works](media/quickstart-v2-netcore-daemon/netcore-daemon-intro.svg)
2930
3031
## Prerequisites
3132

@@ -83,7 +84,7 @@ To run this sample, you will need:
8384
#### Step 3: Configure your Python project
8485

8586
1. Extract the zip file to a local folder close to the root of the disk, for example, **C:\Azure-Samples**.
86-
1. navigate to the sub folder **1-Call-MsGraph-WithSecret"**.
87+
1. Navigate to the sub folder **1-Call-MsGraph-WithSecret"**.
8788
1. Edit **parameters.json** and replace the values of the fields `authority`, `client_id`, and `secret` with the following snippet:
8889

8990
```json
@@ -137,7 +138,7 @@ https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_i
137138
138139
#### Step 5: Run the application
139140

140-
You'll need to install MSAL.Pytho once
141+
You'll need to install MSAL Python once
141142

142143
```console
143144
pip install msal
@@ -149,21 +150,21 @@ Then, run the application via command prompt or console:
149150
python confidential_client_secret_sample.py parameters.json
150151
```
151152

152-
You should see some json containing a list of users in your Azure AD directory as result.
153+
You should see on the console output some Json fragment representing a list of users in your Azure AD directory.
153154

154155
> [!IMPORTANT]
155156
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons, it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [these instructions](https://github.com/Azure-Samples/ms-identity-python-daemon/blob/master/2-Call-MsGraph-WithCertificate/README.md) in the same GitHub repository for this sample, but in the second folder **2-Call-MsGraph-WithCertificate**
156157
157158
## More information
158159

159-
### MSAL.Python
160+
### MSAL Python
160161

161-
[MSAL.Python](https://github.com/AzureAD/microsoft-authentication-library-for-python) is the library used to sign in users and request tokens used to access an API protected by Microsoft identity platform. As described, this quickstart requests tokens by using the application own identity instead of delegated permissions. The authentication flow used in this case is known as *[client credentials oauth flow](v2-oauth2-client-creds-grant-flow.md)*. For more information on how to use MSAL.Python with daemon apps, see [this article](scenario-daemon-overview.md).
162+
[MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python) is the library used to sign in users and request tokens used to access an API protected by Microsoft identity platform. As described, this quickstart requests tokens by using the application own identity instead of delegated permissions. The authentication flow used in this case is known as *[client credentials oauth flow](v2-oauth2-client-creds-grant-flow.md)*. For more information on how to use MSAL Python with daemon apps, see [this article](scenario-daemon-overview.md).
162163

163-
You can install MSAL.Python by running the following pip command.
164+
You can install MSAL Python by running the following pip command.
164165

165166
```powershell
166-
pip install msal
167+
pip install -r requirements.txt
167168
```
168169

169170
### MSAL initialization

0 commit comments

Comments
 (0)