Skip to content

Commit faca890

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-rbac2
2 parents 6638d74 + 070d012 commit faca890

File tree

80 files changed

+565
-472
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+565
-472
lines changed

.openpublishing.redirection.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23253,6 +23253,51 @@
2325323253
"redirect_url": "/azure/active-directory/develop/index-spa",
2325423254
"redirect_document_id": false
2325523255
},
23256+
{
23257+
"source_path_from_root": "/articles/active-directory/develop/api-find-an-api-how-to.md",
23258+
"redirect_url": "/azure/active-directory/develop/quickstart-configure-app-expose-web-apis",
23259+
"redirect_document_id": false
23260+
},
23261+
{
23262+
"source_path_from_root": "/articles/active-directory/develop/consent-framework-links.md",
23263+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23264+
"redirect_document_id": false
23265+
},
23266+
{
23267+
"source_path_from_root": "/articles/active-directory/develop/authentication-protocols.md",
23268+
"redirect_url": "/azure/active-directory/develop/v2-oauth2-auth-code-flow",
23269+
"redirect_document_id": false
23270+
},
23271+
{
23272+
"source_path_from_root": "/articles/active-directory/develop/delegated-and-app-perms.md",
23273+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23274+
"redirect_document_id": false
23275+
},
23276+
{
23277+
"source_path_from_root": "/articles/active-directory/develop/perms-for-given-api.md",
23278+
"redirect_url": "/azure/active-directory/develop/scopes-oidc",
23279+
"redirect_document_id": false
23280+
},
23281+
{
23282+
"source_path_from_root": "/articles/active-directory/develop/setup-multi-tenant-app.md",
23283+
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
23284+
"redirect_document_id": false
23285+
},
23286+
{
23287+
"source_path_from_root": "/articles/active-directory/develop/registration-config-specific-application-property-how-to.md",
23288+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23289+
"redirect_document_id": false
23290+
},
23291+
{
23292+
"source_path_from_root": "/articles/active-directory/develop/registration-config-how-to.md",
23293+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23294+
"redirect_document_id": false
23295+
},
23296+
{
23297+
"source_path_from_root": "/articles/active-directory/develop/registration-config-sso-how-to.md",
23298+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23299+
"redirect_document_id": false
23300+
},
2325623301
{
2325723302
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2325823303
"redirect_url": "/azure/orbital/overview",

articles/active-directory/develop/api-find-an-api-how-to.md

Lines changed: 0 additions & 31 deletions
This file was deleted.

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,30 @@
11
---
2-
title: Microsoft identity platform authentication flows & app scenarios
2+
title: Microsoft identity platform app types and authentication flows
33
description: Learn about application scenarios for the Microsoft identity platform, including authenticating identities, acquiring tokens, and calling protected APIs.
44
services: active-directory
55
author: cilwerner
66
manager: CelesteDG
77

8-
ms.assetid:
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual
1211
ms.workload: identity
13-
ms.date: 05/05/2022
12+
ms.date: 08/11/2023
1413
ms.author: cwerner
1514
ms.reviewer: jmprieur
1615
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, has-adal-ref
17-
#Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
16+
# Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
1817
---
1918

20-
# Authentication flows and application scenarios
19+
# Microsoft identity platform app types and authentication flows
2120

2221
The Microsoft identity platform supports authentication for different kinds of modern application architectures. All of the architectures are based on the industry-standard protocols [OAuth 2.0 and OpenID Connect](./v2-protocols.md). By using the [authentication libraries for the Microsoft identity platform](reference-v2-libraries.md), applications authenticate identities and acquire tokens to access protected APIs.
2322

2423
This article describes authentication flows and the application scenarios that they're used in.
2524

2625
## Application categories
2726

28-
Tokens can be acquired from several types of applications, including:
27+
[Security tokens](./security-tokens.md) can be acquired from several types of applications, including:
2928

3029
- Web apps
3130
- Mobile apps
@@ -40,7 +39,7 @@ The following sections describe the categories of applications.
4039

4140
Authentication scenarios involve two activities:
4241

43-
- **Acquiring security tokens for a protected web API**: We recommend that you use the [Microsoft Authentication Library (MSAL)](reference-v2-libraries.md), developed and supported by Microsoft.
42+
- **Acquiring security tokens for a protected web API**: We recommend that you use the [Microsoft Authentication Library (MSAL)](msal-overview.md), developed and supported by Microsoft.
4443
- **Protecting a web API or a web app**: One challenge of protecting these resources is validating the security token. On some platforms, Microsoft offers [middleware libraries](reference-v2-libraries.md).
4544

4645
### With users or without users
@@ -75,7 +74,7 @@ The available authentication flows differ depending on the sign-in audience. Som
7574

7675
For more information, see [Supported account types](v2-supported-account-types.md#account-type-support-in-authentication-flows).
7776

78-
## Application scenarios
77+
## Application types
7978

8079
The Microsoft identity platform supports authentication for these app architectures:
8180

@@ -127,7 +126,7 @@ For a desktop app to call a web API that signs in users, use the interactive tok
127126

128127
There's another possibility for Windows-hosted applications on computers joined either to a Windows domain or by Azure Active Directory (Azure AD). These applications can silently acquire a token by using [integrated Windows authentication](https://aka.ms/msal-net-iwa).
129128

130-
Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that you use the [device code flow](https://aka.ms/msal-net-device-code-flow).
129+
Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that you use the [device code flow](v2-oauth2-device-code.md).
131130

132131
![Device code flow](media/scenarios/device-code-flow-app.svg)
133132

@@ -147,7 +146,7 @@ Similar to a desktop app, a mobile app calls the interactive token-acquisition m
147146

148147
MSAL iOS and MSAL Android use the system web browser by default. However, you can direct them to use the embedded web view instead. There are specificities that depend on the mobile platform: Universal Windows Platform (UWP), iOS, or Android.
149148

150-
Some scenarios, like those that involve Conditional Access related to a device ID or a device enrollment, require a broker to be installed on the device. Examples of brokers are Microsoft Company Portal on Android and Microsoft Authenticator on Android and iOS. MSAL can now interact with brokers. For more information about brokers, see [Leveraging brokers on Android and iOS](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/wiki/leveraging-brokers-on-Android-and-iOS).
149+
Some scenarios, like those that involve Conditional Access related to a device ID or a device enrollment, require a broker to be installed on the device. Examples of brokers are Microsoft Company Portal on Android and Microsoft Authenticator on Android and iOS. MSAL can now interact with brokers. For more information about brokers, see [Leveraging brokers on Android and iOS](msal-net-use-brokers-with-xamarin-apps.md).
151150

152151
For more information, see [Mobile app that calls web APIs](scenario-mobile-overview.md).
153152

articles/active-directory/develop/authentication-protocols.md

Lines changed: 0 additions & 36 deletions
This file was deleted.

articles/active-directory/develop/consent-framework-links.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

articles/active-directory/develop/delegated-and-app-perms.md

Lines changed: 0 additions & 28 deletions
This file was deleted.

articles/active-directory/develop/msal-client-application-configuration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/15/2022
12+
ms.date: 08/11/2023
1313
ms.author: cwerner
1414
ms.reviewer: saeeda
1515
ms.custom: aaddev, has-adal-ref
@@ -45,8 +45,8 @@ The authority you specify in your code needs to be consistent with the **Support
4545
The authority can be:
4646

4747
- An Azure AD cloud authority.
48-
- An Azure AD B2C authority. See [B2C specifics](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics).
49-
- An Active Directory Federation Services (AD FS) authority. See [AD FS support](https://aka.ms/msal-net-adfs-support).
48+
- An Azure AD B2C authority. See [B2C specifics](msal-net-b2c-considerations.md).
49+
- An Active Directory Federation Services (AD FS) authority. See [AD FS support](msal-net-adfs-support.md).
5050

5151
Azure AD cloud authorities have two parts:
5252

@@ -129,7 +129,7 @@ You can override the redirect URI by using the `RedirectUri` property (for examp
129129
- `RedirectUriOnAndroid` = "msauth-5a434691-ccb2-4fd1-b97b-b64bcfbc03fc://com.microsoft.identity.client.sample";
130130
- `RedirectUriOnIos` = $"msauth.{Bundle.ID}://auth";
131131

132-
For more iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/Leveraging-the-broker-on-iOS).
132+
For more iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](msal-net-use-brokers-with-xamarin-apps.md).
133133
For more Android details, see [Brokered auth in Android](msal-android-single-sign-on.md).
134134

135135
### Redirect URI for confidential client apps

articles/active-directory/develop/permissions-consent-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,10 @@ Depending on the permissions they require, some applications might require an ad
9393

9494
Preauthorization allows a resource application owner to grant permissions without requiring users to see a consent prompt for the same set of permissions that have been preauthorized. This way, an application that has been preauthorized won't ask users to consent to permissions. Resource owners can preauthorize client apps in the Azure portal or by using PowerShell and APIs, like Microsoft Graph.
9595

96-
## Next steps
96+
## See also
9797

9898
- [Delegated access scenario](delegated-access-primer.md)
9999
- [User and admin consent overview](../manage-apps/user-admin-consent-overview.md)
100100
- [OpenID connect scopes](scopes-oidc.md)
101+
-- [Making your application multi-tenant](./howto-convert-app-to-be-multi-tenant.md)
102+
- [AzureAD Microsoft Q&A](/answers/topics/azure-active-directory.html)

articles/active-directory/develop/perms-for-given-api.md

Lines changed: 0 additions & 29 deletions
This file was deleted.

articles/active-directory/develop/quickstart-configure-app-access-web-apis.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ By specifying a web API's scopes in your client app's registration, the client a
3131

3232
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3333

34+
Access to APIs require configuration of access scopes and roles. If you want to expose your resource application web APIs to client applications, configure access scopes and roles for the API. If you want a client application to access a web API, configure permissions to access the API in the app registration.
35+
3436
In the first scenario, you grant a client app access to your own web API, both of which you should have registered as part of the prerequisites. If you don't yet have both a client app and a web API registered, complete the steps in the two [Prerequisites](#prerequisites) articles.
3537

3638
This diagram shows how the two app registrations relate to one another. In this section, you add permissions to the client app's registration.

0 commit comments

Comments
 (0)