Skip to content

Commit ce15015

Browse files
committed
Update exposed-apis-create-app-webapp.md
1 parent 225b485 commit ce15015

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/api/exposed-apis-create-app-webapp.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 03/19/2024
9+
ms.date: 06/28/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -191,19 +191,19 @@ See [Get token using Python](run-advanced-query-sample-python.md#get-token).
191191
> [!NOTE]
192192
> The following procedure assumes that Curl for Windows is already installed on your computer.
193193

194-
1. Open a command prompt, and set CLIENT_ID to your Azure application ID.
194+
1. Open a command prompt, and set `CLIENT_ID` to your Azure application ID.
195195

196-
1. Set CLIENT_SECRET to your Azure application secret.
196+
1. Set `CLIENT_SECRET` to your Azure application secret.
197197

198-
1. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your app to access Defender for Endpoint.
198+
1. Set `TENANT_ID` to the Azure tenant ID of the customer that wants to use your app to access Defender for Endpoint.
199199

200200
1. Run the following command:
201201

202202
```console
203203
curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://securitycenter.onmicrosoft.com/windowsatpservice/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
204204
```
205205

206-
You will get an answer in the following form:
206+
You get an answer that resembles the following code snippet:
207207

208208
```console
209209
{"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
@@ -215,7 +215,7 @@ Ensure that you got the correct token:
215215

216216
1. Copy and paste the token you got in the previous step into [JWT](https://jwt.ms) in order to decode it.
217217
218-
1. Validate that you get a 'roles' claim with the desired permissions.
218+
1. Validate that you get a roles claim with the desired permissions.
219219

220220
In the following image, you can see a decoded token acquired from an app with permissions to all of Microsoft Defender for Endpoint's roles:
221221

@@ -225,7 +225,7 @@ Ensure that you got the correct token:
225225

226226
1. Choose the API you want to use. For more information, see [Supported Defender for Endpoint APIs](exposed-apis-list.md).
227227

228-
1. Set the authorization header in the http request you send to "Bearer {token}" (Bearer is the authorization scheme).
228+
1. Set the authorization header in the `http` request you send to `Bearer {token}` (Bearer is the authorization scheme).
229229

230230
1. The expiration time of the token is one hour. You can send more than one request with the same token.
231231

0 commit comments

Comments
 (0)