You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The preceding example pertains to an app registered in a tenant with an AAD B2C tenant type. If the app is registered in an ME-ID tenant, the App ID URI is different, thus the scope is different.
@@ -390,7 +390,7 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
390
390
* Client Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
The preceding example pertains to an app registered in a tenant with an AAD B2C tenant type. If the app is registered in an ME-ID tenant, the authority should match the issurer (`iss`) of the JWT returned by the identity provider:
Copy file name to clipboardExpand all lines: aspnetcore/blazor/security/includes/authorize-client-app.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,4 +2,4 @@
2
2
> If you don't have the authority to grant admin consent to the tenant in the last step of **API permissions** configuration because consent to use the app is delegated to users, then you must take the following additional steps:
3
3
>
4
4
> * The app must use a [trusted publisher domain](/entra/identity-platform/howto-configure-publisher-domain).
5
-
> * In the **`Server`** app's configuration in the Azure portal, select **Expose an API**. Under **Authorized client applications**, select the button to **Add a client application**. Add the **`Client`** app's Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`).
5
+
> * In the **`Server`** app's configuration in the Azure portal, select **Expose an API**. Under **Authorized client applications**, select the button to **Add a client application**. Add the **`Client`** app's Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`).
Copy file name to clipboardExpand all lines: aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,7 @@ The output location specified with the `-o|--output` option creates a project fo
137
137
138
138
*The guidance in this section covers optionally populating `User.Identity.Name` with the value from the `name` claim.*
139
139
140
-
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `2d64b3da-d9d5-42c6-9352-53d8df33d770@contoso.onmicrosoft.com`).
140
+
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `aaaabbbb-0000-cccc-1111-dddd2222eeee@contoso.onmicrosoft.com`).
141
141
142
142
To configure the app to receive the value from the `name` claim type:
143
143
@@ -358,7 +358,7 @@ Example default access token scope:
Copy file name to clipboardExpand all lines: aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ The output location specified with the `-o|--output` option creates a project fo
141
141
142
142
*The guidance in this section covers optionally populating `User.Identity.Name` with the value from the `name` claim.*
143
143
144
-
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `2d64b3da-d9d5-42c6-9352-53d8df33d770@contoso.onmicrosoft.com`).
144
+
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `bbbb0000-cccc-1111-dddd-2222eeee3333@contoso.onmicrosoft.com`).
145
145
146
146
To configure the app to receive the value from the `name` claim type:
147
147
@@ -464,7 +464,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O
In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`).
@@ -554,7 +554,7 @@ When working with the default directory, follow the guidance in [Add app roles t
554
554
],
555
555
"description": "Developers write code.",
556
556
"displayName": "Developer",
557
-
"id": "82770d35-2a93-4182-b3f5-3d7bfe9dfe46",
557
+
"id": "{DEVELOPER GUID}",
558
558
"isEnabled": true,
559
559
"lang": null,
560
560
"origin": "Application",
@@ -563,8 +563,7 @@ When working with the default directory, follow the guidance in [Add app roles t
563
563
],
564
564
```
565
565
566
-
> [!NOTE]
567
-
> You can generate GUIDs with an [online GUID generator program (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
566
+
For the `{ADMIN GUID}` and `{DEVELOPER GUID}` placeholders in the preceding example, you can generate GUIDs with an [online GUID generator (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
568
567
569
568
To assign a role to a user (or group if you have a Premium tier Azure account):
@@ -294,7 +294,7 @@ Take either of the following approaches add app roles in ME-ID:
294
294
],
295
295
"description": "Developers write code.",
296
296
"displayName": "Developer",
297
-
"id": "82770d35-2a93-4182-b3f5-3d7bfe9dfe46",
297
+
"id": "{DEVELOPER GUID}",
298
298
"isEnabled": true,
299
299
"lang": null,
300
300
"origin": "Application",
@@ -303,8 +303,7 @@ Take either of the following approaches add app roles in ME-ID:
303
303
],
304
304
```
305
305
306
-
> [!NOTE]
307
-
> You can generate GUIDs with an [online GUID generator program (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
306
+
For the `{ADMIN GUID}` and `{DEVELOPER GUID}` placeholders in the preceding example, you can generate GUIDs with an [online GUID generator (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
308
307
309
308
To assign a role to a user (or group if you have a Premium tier Azure account):
0 commit comments