Skip to content

Commit 06e72d8

Browse files
authored
status (#33879)
1 parent ef8ca57 commit 06e72d8

8 files changed

+52
-52
lines changed

aspnetcore/blazor/security/blazor-web-app-with-entra.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,11 +99,11 @@ Example:
9999
```json
100100
"AzureAd": {
101101
"CallbackPath": "/signin-oidc",
102-
"ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd",
102+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
103103
"Domain": "contoso.onmicrosoft.com",
104104
"Instance": "https://login.microsoftonline.com/",
105105
"ResponseType": "code",
106-
"TenantId": "e86c78e2-8bb4-4c41-aefd-918e0565a45e"
106+
"TenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee"
107107
},
108108
```
109109

aspnetcore/blazor/security/blazor-web-app-with-oidc.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -112,12 +112,12 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
112112

113113
Example:
114114

115-
* Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/` (uses Tenant ID `a3942615-d115-4eb7-bc84-9974abcf5064`)
116-
* Client Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
115+
* Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/` (uses Tenant ID `aaaabbbb-0000-cccc-1111-dddd2222eeee`)
116+
* Client Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
117117

118118
```csharp
119119
oidcOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";
120-
oidcOptions.ClientId = "4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f";
120+
oidcOptions.ClientId = "00001111-aaaa-2222-bbbb-3333cccc4444";
121121
```
122122

123123
Example for Microsoft Azure "common" authority:
@@ -359,7 +359,7 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
359359

360360
* App ID URI (`{APP ID URI}`): `https://{DIRECTORY NAME}.onmicrosoft.com/{CLIENT ID}`
361361
* Directory Name (`{DIRECTORY NAME}`): `contoso`
362-
* Application (Client) Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
362+
* Application (Client) Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
363363
* Scope configured for weather data from `MinimalApiJwt` (`{API NAME}`): `Weather.Get`
364364

365365
```csharp
@@ -370,11 +370,11 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
370370

371371
Example:
372372

373-
* App ID URI (`{APP ID URI}`): `api://{CLIENT ID}` with Application (Client) Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
373+
* App ID URI (`{APP ID URI}`): `api://{CLIENT ID}` with Application (Client) Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
374374
* Scope configured for weather data from `MinimalApiJwt` (`{API NAME}`): `Weather.Get`
375375

376376
```csharp
377-
oidcOptions.Scope.Add("api://4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f/Weather.Get");
377+
oidcOptions.Scope.Add("api://00001111-aaaa-2222-bbbb-3333cccc4444/Weather.Get");
378378
```
379379

380380
* <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConnectOptions.Authority%2A> and <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConnectOptions.ClientId%2A>: Sets the Authority and Client ID for OIDC calls.
@@ -386,12 +386,12 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
386386

387387
Example:
388388

389-
* Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/` (uses Tenant ID `a3942615-d115-4eb7-bc84-9974abcf5064`)
390-
* Client Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
389+
* Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/` (uses Tenant ID `aaaabbbb-0000-cccc-1111-dddd2222eeee`)
390+
* Client Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
391391

392392
```csharp
393393
oidcOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";
394-
oidcOptions.ClientId = "4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f";
394+
oidcOptions.ClientId = "00001111-aaaa-2222-bbbb-3333cccc4444";
395395
```
396396

397397
Example for Microsoft Azure "common" authority:
@@ -533,20 +533,20 @@ Configure the project in the <xref:Microsoft.AspNetCore.Authentication.JwtBearer
533533
App ID URI (`{APP ID URI}`): `https://{DIRECTORY NAME}.onmicrosoft.com/{CLIENT ID}`:
534534

535535
* Directory Name (`{DIRECTORY NAME}`): `contoso`
536-
* Application (Client) Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
536+
* Application (Client) Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
537537

538538
```csharp
539-
jwtOptions.Audience = "https://contoso.onmicrosoft.com/4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f";
539+
jwtOptions.Audience = "https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444";
540540
```
541541

542542
The preceding example pertains to an app registered in a tenant with an AAD B2C tenant type. If the app is registered in an ME-ID tenant, the App ID URI is different, thus the audience is different.
543543

544544
Example:
545545

546-
App ID URI (`{APP ID URI}`): `api://{CLIENT ID}` with Application (Client) Id (`{CLIENT ID}`): `4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f`
546+
App ID URI (`{APP ID URI}`): `api://{CLIENT ID}` with Application (Client) Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
547547

548548
```csharp
549-
jwtOptions.Audience = "api://4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f";
549+
jwtOptions.Audience = "api://00001111-aaaa-2222-bbbb-3333cccc4444";
550550
```
551551

552552
* <xref:Microsoft.AspNetCore.Authentication.JwtBearer.JwtBearerOptions.Authority%2A>: Sets the Authority for making OpenID Connect calls. Match the value to the Authority configured for the OIDC handler in `BlazorWebAppOidc/Program.cs`:
@@ -557,7 +557,7 @@ Configure the project in the <xref:Microsoft.AspNetCore.Authentication.JwtBearer
557557

558558
Example:
559559

560-
Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/` (uses Tenant ID `a3942615-d115-4eb7-bc84-9974abcf5064`)
560+
Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/` (uses Tenant ID `aaaabbbb-0000-cccc-1111-dddd2222eeee`)
561561

562562
```csharp
563563
jwtOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";

aspnetcore/blazor/security/includes/troubleshoot-wasm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ Example JWT decoded by the tool for an app that authenticates against Azure AAD
211211
"nbf": 1610055829,
212212
"ver": "1.0",
213213
"iss": "https://mysiteb2c.b2clogin.com/5cc15ea8-a296-4aa3-97e4-226dcc9ad298/v2.0/",
214-
"sub": "5ee963fb-24d6-4d72-a1b6-889c6e2c7438",
215-
"aud": "70bde375-fce3-4b82-984a-b247d823a03f",
214+
"sub": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
215+
"aud": "00001111-aaaa-2222-bbbb-3333cccc4444",
216216
"nonce": "b2641f54-8dc4-42ca-97ea-7f12ff4af871",
217217
"iat": 1610055829,
218218
"auth_time": 1610055822,

aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Register an AAD B2C app for the *Server API app*:
4444

4545
Record the following information:
4646

47-
* *Server API app* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`)
47+
* *Server API app* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`)
4848
* AAD B2C instance (for example, `https://contoso.b2clogin.com/`, which includes the trailing slash). The instance is the scheme and host of an Azure B2C app registration, which can be found by opening the **Endpoints** window from the **App registrations** page in the Azure portal.
4949
* Primary/Publisher/Tenant domain (for example, `contoso.onmicrosoft.com`): The domain is available as the **Publisher domain** in the **Branding** blade of the Azure portal for the registered app.
5050

@@ -60,7 +60,7 @@ Select **Expose an API** from the sidebar and follow these steps:
6060

6161
Record the following information:
6262

63-
* App ID URI GUID (for example, record `41451fa7-82d9-4673-8fa5-69eff5a761fd` from `https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd`)
63+
* App ID URI GUID (for example, record `00001111-aaaa-2222-bbbb-3333cccc4444` from `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444`)
6464
* Scope name (for example, `API.Access`)
6565

6666
### Register a client app in Azure
@@ -77,7 +77,7 @@ Register an AAD B2C app for the *Client app*:
7777
> [!NOTE]
7878
> Supplying the port number for a `localhost` AAD B2C redirect URI isn't required. For more information, see [Redirect URI (reply URL) restrictions and limitations: Localhost exceptions (Entra documentation)](/entra/identity-platform/reply-url#localhost-exceptions).
7979
80-
Record the *Client app* Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`).
80+
Record the *Client app* Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`).
8181

8282
In **Authentication** > **Platform configurations** > **Single-page application**:
8383

@@ -116,10 +116,10 @@ dotnet new blazorwasm -au IndividualB2C --aad-b2c-instance "{AAD B2C INSTANCE}"
116116
| --- | --- | --- |
117117
| `{AAD B2C INSTANCE}` | Instance | `https://contoso.b2clogin.com/` (includes the trailing slash) |
118118
| `{PROJECT NAME}` | &mdash; | `BlazorSample` |
119-
| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `4369008b-21fa-427c-abaa-9b53bf58e538` |
119+
| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `11112222-bbbb-3333-cccc-4444dddd5555` |
120120
| `{DEFAULT SCOPE}` | Scope name | `API.Access` |
121-
| `{SERVER API APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Server":::** app | `41451fa7-82d9-4673-8fa5-69eff5a761fd` |
122-
| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) |
121+
| `{SERVER API APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Server":::** app | `00001111-aaaa-2222-bbbb-3333cccc4444` |
122+
| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `00001111-aaaa-2222-bbbb-3333cccc4444` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) |
123123
| `{SIGN UP OR SIGN IN POLICY}` | Sign-up/sign-in user flow | `B2C_1_signupsignin1` |
124124
| `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` |
125125

@@ -185,7 +185,7 @@ Example:
185185
{
186186
"AzureAdB2C": {
187187
"Instance": "https://contoso.b2clogin.com/",
188-
"ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd",
188+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
189189
"Domain": "contoso.onmicrosoft.com",
190190
"Scopes": "API.Access",
191191
"SignUpSignInPolicyId": "B2C_1_signupsignin1",
@@ -273,7 +273,7 @@ Example:
273273
{
274274
"AzureAdB2C": {
275275
"Authority": "https://contoso.b2clogin.com/contoso.onmicrosoft.com/B2C_1_signupsignin1",
276-
"ClientId": "4369008b-21fa-427c-abaa-9b53bf58e538",
276+
"ClientId": "11112222-bbbb-3333-cccc-4444dddd5555",
277277
"ValidateAuthority": false
278278
}
279279
}
@@ -322,7 +322,7 @@ builder.Services.AddMsalAuthentication(options =>
322322
});
323323
```
324324

325-
The `{SCOPE URI}` is the default access token scope (for example, `https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access` or the custom URI that you configured in the Azure portal).
325+
The `{SCOPE URI}` is the default access token scope (for example, `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/API.Access` or the custom URI that you configured in the Azure portal).
326326

327327
The <xref:Microsoft.Extensions.DependencyInjection.MsalWebAssemblyServiceCollectionExtensions.AddMsalAuthentication%2A> method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure Portal AAD configuration when you register the app.
328328

aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ Register an ME-ID app for the *Server API app*:
4747

4848
Record the following information:
4949

50-
* *Server API app* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`)
51-
* Directory (tenant) ID (for example, `e86c78e2-8bb4-4c41-aefd-918e0565a45e`)
50+
* *Server API app* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`)
51+
* Directory (tenant) ID (for example, `aaaabbbb-0000-cccc-1111-dddd2222eeee`)
5252
* ME-ID Primary/Publisher/Tenant domain (for example, `contoso.onmicrosoft.com`): The domain is available as the **Publisher domain** in the **Branding** blade of the Azure portal for the registered app.
5353

5454
In **API permissions**, remove the **Microsoft Graph** > **User.Read** permission, as the server API app doesn't require additional API access for merely signing in users and calling server API endpoints.
@@ -66,7 +66,7 @@ In **Expose an API**:
6666

6767
Record the following information:
6868

69-
* App ID URI GUID (for example, record `41451fa7-82d9-4673-8fa5-69eff5a761fd` from the App ID URI of `api://41451fa7-82d9-4673-8fa5-69eff5a761fd`)
69+
* App ID URI GUID (for example, record `00001111-aaaa-2222-bbbb-3333cccc4444` from the App ID URI of `api://00001111-aaaa-2222-bbbb-3333cccc4444`)
7070
* Scope name (for example, `API.Access`)
7171

7272
> [!IMPORTANT]
@@ -86,7 +86,7 @@ Register an ME-ID app for the *Client app*:
8686
> [!NOTE]
8787
> Supplying the port number for a `localhost` ME-ID redirect URI isn't required. For more information, see [Redirect URI (reply URL) restrictions and limitations: Localhost exceptions (Entra documentation)](/entra/identity-platform/reply-url#localhost-exceptions).
8888
89-
Record the **:::no-loc text="Client":::** app Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`).
89+
Record the **:::no-loc text="Client":::** app Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`).
9090

9191
In **Authentication** > **Platform configurations** > **Single-page application**:
9292

@@ -121,12 +121,12 @@ dotnet new blazorwasm -au SingleOrg --api-client-id "{SERVER API APP CLIENT ID}"
121121
| Placeholder | Azure portal name | Example |
122122
| --- | --- | --- |
123123
| `{PROJECT NAME}` | &mdash; | `BlazorSample` |
124-
| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `4369008b-21fa-427c-abaa-9b53bf58e538` |
124+
| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `11112222-bbbb-3333-cccc-4444dddd5555` |
125125
| `{DEFAULT SCOPE}` | Scope name | `API.Access` |
126-
| `{SERVER API APP CLIENT ID}` | Application (client) ID for the *Server API app* | `41451fa7-82d9-4673-8fa5-69eff5a761fd` |
127-
| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) |
126+
| `{SERVER API APP CLIENT ID}` | Application (client) ID for the *Server API app* | `00001111-aaaa-2222-bbbb-3333cccc4444` |
127+
| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `00001111-aaaa-2222-bbbb-3333cccc4444` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) |
128128
| `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` |
129-
| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-8bb4-4c41-aefd-918e0565a45e` |
129+
| `{TENANT ID}` | Directory (tenant) ID | `aaaabbbb-0000-cccc-1111-dddd2222eeee` |
130130

131131
The output location specified with the `-o|--output` option creates a project folder if it doesn't exist and becomes part of the project's name. **Avoid using dashes (`-`) in the app name that break the formation of the OIDC app identifier (see the earlier WARNING).**
132132

@@ -191,8 +191,8 @@ Example:
191191
"AzureAd": {
192192
"Instance": "https://login.microsoftonline.com/",
193193
"Domain": "contoso.onmicrosoft.com",
194-
"TenantId": "e86c78e2-8bb4-4c41-aefd-918e0565a45e",
195-
"ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd",
194+
"TenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
195+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
196196
"CallbackPath": "/signin-oidc",
197197
"Scopes": "API.Access"
198198
}
@@ -281,7 +281,7 @@ Example:
281281
{
282282
"AzureAd": {
283283
"Authority": "https://login.microsoftonline.com/e86c78e2-...-918e0565a45e",
284-
"ClientId": "4369008b-21fa-427c-abaa-9b53bf58e538",
284+
"ClientId": "11112222-bbbb-3333-cccc-4444dddd5555",
285285
"ValidateAuthority": true
286286
}
287287
}
@@ -364,7 +364,7 @@ Example default access token scope:
364364

365365
```csharp
366366
options.ProviderOptions.DefaultAccessTokenScopes.Add(
367-
"api://41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access");
367+
"api://00001111-aaaa-2222-bbbb-3333cccc4444/API.Access");
368368
```
369369

370370
For more information, see the following sections of the *Additional scenarios* article:
@@ -448,7 +448,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O
448448
Example:
449449

450450
```json
451-
"Audience": "https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd"
451+
"Audience": "https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444"
452452
```
453453

454454
* In the `Program` file of the **`Client`** app, set the audience of the scope (App ID URI) to match the server API app's audience:
@@ -467,7 +467,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O
467467
.Add("https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access");
468468
```
469469

470-
In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`).
470+
In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`).
471471

472472
## Use of a custom App ID URI
473473

aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Register an AAD B2C app:
4747
4848
Record the following information:
4949

50-
* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`).
50+
* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`).
5151
* AAD B2C instance (for example, `https://contoso.b2clogin.com/`, which includes the trailing slash): The instance is the scheme and host of an Azure B2C app registration, which can be found by opening the **Endpoints** window from the **App registrations** page in the Azure portal.
5252
* AAD B2C Primary/Publisher/Tenant domain (for example, `contoso.onmicrosoft.com`): The domain is available as the **Publisher domain** in the **Branding** blade of the Azure portal for the registered app.
5353

@@ -78,7 +78,7 @@ dotnet new blazorwasm -au IndividualB2C --aad-b2c-instance "{AAD B2C INSTANCE}"
7878
| ----------------------------- | ------------------------------- | ------------------------------------------------------------- |
7979
| `{AAD B2C INSTANCE}` | Instance | `https://contoso.b2clogin.com/` (includes the trailing slash) |
8080
| `{PROJECT NAME}` | &mdash; | `BlazorSample` |
81-
| `{CLIENT ID}` | Application (client) ID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` |
81+
| `{CLIENT ID}` | Application (client) ID | `00001111-aaaa-2222-bbbb-3333cccc4444` |
8282
| `{SIGN UP OR SIGN IN POLICY}` | Sign-up/sign-in user flow | `B2C_1_signupsignin1` |
8383
| `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` |
8484

@@ -152,7 +152,7 @@ Example:
152152
{
153153
"AzureAdB2C": {
154154
"Authority": "https://contoso.b2clogin.com/contoso.onmicrosoft.com/B2C_1_signupsignin1",
155-
"ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd",
155+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
156156
"ValidateAuthority": false
157157
}
158158
}

0 commit comments

Comments
 (0)