Skip to content

Commit ca00852

Browse files
authored
Sensitive terms with GUIDs in Blazor node (#33885)
1 parent 092b283 commit ca00852

File tree

9 files changed

+20
-22
lines changed

9 files changed

+20
-22
lines changed

aspnetcore/blazor/fundamentals/routing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -372,7 +372,7 @@ Constraint | Example | Example Matches | Invariant<br>culture<br>matching
372372
`decimal` | `{price:decimal}` | `49.99`, `-1,000.01` | Yes
373373
`double` | `{weight:double}` | `1.234`, `-1,001.01e8` | Yes
374374
`float` | `{weight:float}` | `1.234`, `-1,001.01e8` | Yes
375-
`guid` | `{id:guid}` | `CD2C1638-1638-72D5-1638-DEADBEEF1638`, `{CD2C1638-1638-72D5-1638-DEADBEEF1638}` | No
375+
`guid` | `{id:guid}` | `00001111-aaaa-2222-bbbb-3333cccc4444`, `{00001111-aaaa-2222-bbbb-3333cccc4444}` | No
376376
`int` | `{id:int}` | `123456789`, `-123456789` | Yes
377377
`long` | `{ticks:long}` | `123456789`, `-123456789` | Yes
378378
`nonfile` | `{parameter:nonfile}` | Not `BlazorSample.styles.css`, not `favicon.ico` | Yes

aspnetcore/blazor/security/blazor-web-app-with-oidc.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
116116
* Client Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
117117

118118
```csharp
119-
oidcOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";
119+
oidcOptions.Authority = "https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/";
120120
oidcOptions.ClientId = "00001111-aaaa-2222-bbbb-3333cccc4444";
121121
```
122122

@@ -363,7 +363,7 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
363363
* Scope configured for weather data from `MinimalApiJwt` (`{API NAME}`): `Weather.Get`
364364

365365
```csharp
366-
oidcOptions.Scope.Add("https://contoso.onmicrosoft.com/4ba4de56-9cef-45d9-83fa-a4c18f9f5f0f/Weather.Get");
366+
oidcOptions.Scope.Add("https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/Weather.Get");
367367
```
368368

369369
The preceding example pertains to an app registered in a tenant with an AAD B2C tenant type. If the app is registered in an ME-ID tenant, the App ID URI is different, thus the scope is different.
@@ -390,7 +390,7 @@ The following <xref:Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConn
390390
* Client Id (`{CLIENT ID}`): `00001111-aaaa-2222-bbbb-3333cccc4444`
391391

392392
```csharp
393-
oidcOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";
393+
oidcOptions.Authority = "https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/";
394394
oidcOptions.ClientId = "00001111-aaaa-2222-bbbb-3333cccc4444";
395395
```
396396

@@ -560,13 +560,13 @@ Configure the project in the <xref:Microsoft.AspNetCore.Authentication.JwtBearer
560560
Authority (`{AUTHORITY}`): `https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/` (uses Tenant ID `aaaabbbb-0000-cccc-1111-dddd2222eeee`)
561561

562562
```csharp
563-
jwtOptions.Authority = "https://login.microsoftonline.com/a3942615-d115-4eb7-bc84-9974abcf5064/v2.0/";
563+
jwtOptions.Authority = "https://login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/";
564564
```
565565

566566
The preceding example pertains to an app registered in a tenant with an AAD B2C tenant type. If the app is registered in an ME-ID tenant, the authority should match the issurer (`iss`) of the JWT returned by the identity provider:
567567

568568
```csharp
569-
jwtOptions.Authority = "https://sts.windows.net/a3942615-d115-4eb7-bc84-9974abcf5064/";
569+
jwtOptions.Authority = "https://sts.windows.net/aaaabbbb-0000-cccc-1111-dddd2222eeee/";
570570
```
571571

572572
### Minimal API for weather data

aspnetcore/blazor/security/includes/authorize-client-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22
> If you don't have the authority to grant admin consent to the tenant in the last step of **API permissions** configuration because consent to use the app is delegated to users, then you must take the following additional steps:
33
>
44
> * The app must use a [trusted publisher domain](/entra/identity-platform/howto-configure-publisher-domain).
5-
> * In the **`Server`** app's configuration in the Azure portal, select **Expose an API**. Under **Authorized client applications**, select the button to **Add a client application**. Add the **`Client`** app's Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`).
5+
> * In the **`Server`** app's configuration in the Azure portal, select **Expose an API**. Under **Authorized client applications**, select the button to **Add a client application**. Add the **`Client`** app's Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`).

aspnetcore/blazor/security/includes/troubleshoot-wasm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -210,10 +210,10 @@ Example JWT decoded by the tool for an app that authenticates against Azure AAD
210210
"exp": 1610059429,
211211
"nbf": 1610055829,
212212
"ver": "1.0",
213-
"iss": "https://mysiteb2c.b2clogin.com/5cc15ea8-a296-4aa3-97e4-226dcc9ad298/v2.0/",
213+
"iss": "https://mysiteb2c.b2clogin.com/11112222-bbbb-3333-cccc-4444dddd5555/v2.0/",
214214
"sub": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
215215
"aud": "00001111-aaaa-2222-bbbb-3333cccc4444",
216-
"nonce": "b2641f54-8dc4-42ca-97ea-7f12ff4af871",
216+
"nonce": "bbbb0000-cccc-1111-dddd-2222eeee3333",
217217
"iat": 1610055829,
218218
"auth_time": 1610055822,
219219
"idp": "idp.com",

aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ The output location specified with the `-o|--output` option creates a project fo
137137

138138
*The guidance in this section covers optionally populating `User.Identity.Name` with the value from the `name` claim.*
139139

140-
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `2d64b3da-d9d5-42c6-9352-53d8df33d770@contoso.onmicrosoft.com`).
140+
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `aaaabbbb-0000-cccc-1111-dddd2222eeee@contoso.onmicrosoft.com`).
141141

142142
To configure the app to receive the value from the `name` claim type:
143143

@@ -358,7 +358,7 @@ Example default access token scope:
358358

359359
```csharp
360360
options.ProviderOptions.DefaultAccessTokenScopes.Add(
361-
"https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access");
361+
"https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/API.Access");
362362
```
363363

364364
For more information, see the following sections of the *Additional scenarios* article:

aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ The output location specified with the `-o|--output` option creates a project fo
141141

142142
*The guidance in this section covers optionally populating `User.Identity.Name` with the value from the `name` claim.*
143143

144-
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `2d64b3da-d9d5-42c6-9352-53d8df33d770@contoso.onmicrosoft.com`).
144+
The **:::no-loc text="Server":::** app API populates `User.Identity.Name` with the value from the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` claim type (for example, `bbbb0000-cccc-1111-dddd-2222eeee3333@contoso.onmicrosoft.com`).
145145

146146
To configure the app to receive the value from the `name` claim type:
147147

@@ -464,7 +464,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O
464464

465465
```csharp
466466
options.ProviderOptions.DefaultAccessTokenScopes
467-
.Add("https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access");
467+
.Add("https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/API.Access");
468468
```
469469

470470
In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`).

aspnetcore/blazor/security/webassembly/microsoft-entra-id-groups-and-roles-net-5-to-7.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -542,7 +542,7 @@ When working with the default directory, follow the guidance in [Add app roles t
542542
],
543543
"description": "Administrators manage developers.",
544544
"displayName": "Admin",
545-
"id": "584e483a-7101-404b-9bb1-83bf9463e335",
545+
"id": "{ADMIN GUID}",
546546
"isEnabled": true,
547547
"lang": null,
548548
"origin": "Application",
@@ -554,7 +554,7 @@ When working with the default directory, follow the guidance in [Add app roles t
554554
],
555555
"description": "Developers write code.",
556556
"displayName": "Developer",
557-
"id": "82770d35-2a93-4182-b3f5-3d7bfe9dfe46",
557+
"id": "{DEVELOPER GUID}",
558558
"isEnabled": true,
559559
"lang": null,
560560
"origin": "Application",
@@ -563,8 +563,7 @@ When working with the default directory, follow the guidance in [Add app roles t
563563
],
564564
```
565565

566-
> [!NOTE]
567-
> You can generate GUIDs with an [online GUID generator program (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
566+
For the `{ADMIN GUID}` and `{DEVELOPER GUID}` placeholders in the preceding example, you can generate GUIDs with an [online GUID generator (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
568567

569568
To assign a role to a user (or group if you have a Premium tier Azure account):
570569

aspnetcore/blazor/security/webassembly/microsoft-entra-id-groups-and-roles.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@ Take either of the following approaches add app roles in ME-ID:
282282
],
283283
"description": "Administrators manage developers.",
284284
"displayName": "Admin",
285-
"id": "584e483a-7101-404b-9bb1-83bf9463e335",
285+
"id": "{ADMIN GUID}",
286286
"isEnabled": true,
287287
"lang": null,
288288
"origin": "Application",
@@ -294,7 +294,7 @@ Take either of the following approaches add app roles in ME-ID:
294294
],
295295
"description": "Developers write code.",
296296
"displayName": "Developer",
297-
"id": "82770d35-2a93-4182-b3f5-3d7bfe9dfe46",
297+
"id": "{DEVELOPER GUID}",
298298
"isEnabled": true,
299299
"lang": null,
300300
"origin": "Application",
@@ -303,8 +303,7 @@ Take either of the following approaches add app roles in ME-ID:
303303
],
304304
```
305305

306-
> [!NOTE]
307-
> You can generate GUIDs with an [online GUID generator program (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
306+
For the `{ADMIN GUID}` and `{DEVELOPER GUID}` placeholders in the preceding example, you can generate GUIDs with an [online GUID generator (Google search result for "guid generator")](https://www.google.com/search?q=guid+generator).
308307

309308
To assign a role to a user (or group if you have a Premium tier Azure account):
310309

aspnetcore/blazor/tutorials/movie-database-app/part-4.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ For local development, configuration obtains the database connection string from
9595

9696
The following is an example connection string:
9797

98-
> :::no-loc text="Server=(localdb)\\mssqllocaldb;Database=BlazorWebAppMoviesContext-c347f669-bddf-56a3-a32e-7fe010306593;Trusted_Connection=True;MultipleActiveResultSets=true":::
98+
> :::no-loc text="Server=(localdb)\\mssqllocaldb;Database=BlazorWebAppMoviesContext-00001111-aaaa-2222-bbbb-3333cccc4444;Trusted_Connection=True;MultipleActiveResultSets=true":::
9999
100100
When the app is deployed to a test/staging or production server, securely store the connection string outside of the project's configuration files.
101101

0 commit comments

Comments
 (0)