From f936bca9f1d2901dce63c2167bf3dc34c1202d91 Mon Sep 17 00:00:00 2001 From: Megan Bradley Date: Fri, 18 Oct 2024 16:32:07 -0600 Subject: [PATCH] status --- .../security/blazor-web-app-with-entra.md | 4 +-- .../security/blazor-web-app-with-oidc.md | 28 +++++++++---------- .../security/includes/troubleshoot-wasm.md | 4 +-- .../hosted-with-azure-active-directory-b2c.md | 18 ++++++------ .../hosted-with-microsoft-entra-id.md | 28 +++++++++---------- ...ndalone-with-azure-active-directory-b2c.md | 6 ++-- .../standalone-with-microsoft-accounts.md | 6 ++-- .../standalone-with-microsoft-entra-id.md | 10 +++---- 8 files changed, 52 insertions(+), 52 deletions(-) diff --git a/aspnetcore/blazor/security/blazor-web-app-with-entra.md b/aspnetcore/blazor/security/blazor-web-app-with-entra.md index cbf90468b679..0e7d9edd0b4a 100644 --- a/aspnetcore/blazor/security/blazor-web-app-with-entra.md +++ b/aspnetcore/blazor/security/blazor-web-app-with-entra.md @@ -99,11 +99,11 @@ Example: ```json "AzureAd": { "CallbackPath": "/signin-oidc", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "Domain": "contoso.onmicrosoft.com", "Instance": "https://login.microsoftonline.com/", "ResponseType": "code", - "TenantId": "e86c78e2-8bb4-4c41-aefd-918e0565a45e" + "TenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee" }, ``` diff --git a/aspnetcore/blazor/security/blazor-web-app-with-oidc.md b/aspnetcore/blazor/security/blazor-web-app-with-oidc.md index cc8607b339a1..cd2947c6e4d8 100644 --- a/aspnetcore/blazor/security/blazor-web-app-with-oidc.md +++ b/aspnetcore/blazor/security/blazor-web-app-with-oidc.md @@ -112,12 +112,12 @@ The following and : Sets the Authority and Client ID for OIDC calls. @@ -386,12 +386,12 @@ The following : Sets the Authority for making OpenID Connect calls. Match the value to the Authority configured for the OIDC handler in `BlazorWebAppOidc/Program.cs`: @@ -557,7 +557,7 @@ Configure the project in the [!NOTE] > Supplying the port number for a `localhost` AAD B2C redirect URI isn't required. For more information, see [Redirect URI (reply URL) restrictions and limitations: Localhost exceptions (Entra documentation)](/entra/identity-platform/reply-url#localhost-exceptions). -Record the *Client app* Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`). +Record the *Client app* Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`). In **Authentication** > **Platform configurations** > **Single-page application**: @@ -116,10 +116,10 @@ dotnet new blazorwasm -au IndividualB2C --aad-b2c-instance "{AAD B2C INSTANCE}" | --- | --- | --- | | `{AAD B2C INSTANCE}` | Instance | `https://contoso.b2clogin.com/` (includes the trailing slash) | | `{PROJECT NAME}` | — | `BlazorSample` | -| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `4369008b-21fa-427c-abaa-9b53bf58e538` | +| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `11112222-bbbb-3333-cccc-4444dddd5555` | | `{DEFAULT SCOPE}` | Scope name | `API.Access` | -| `{SERVER API APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Server":::** app | `41451fa7-82d9-4673-8fa5-69eff5a761fd` | -| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) | +| `{SERVER API APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Server":::** app | `00001111-aaaa-2222-bbbb-3333cccc4444` | +| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `00001111-aaaa-2222-bbbb-3333cccc4444` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) | | `{SIGN UP OR SIGN IN POLICY}` | Sign-up/sign-in user flow | `B2C_1_signupsignin1` | | `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` | @@ -185,7 +185,7 @@ Example: { "AzureAdB2C": { "Instance": "https://contoso.b2clogin.com/", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "Domain": "contoso.onmicrosoft.com", "Scopes": "API.Access", "SignUpSignInPolicyId": "B2C_1_signupsignin1", @@ -273,7 +273,7 @@ Example: { "AzureAdB2C": { "Authority": "https://contoso.b2clogin.com/contoso.onmicrosoft.com/B2C_1_signupsignin1", - "ClientId": "4369008b-21fa-427c-abaa-9b53bf58e538", + "ClientId": "11112222-bbbb-3333-cccc-4444dddd5555", "ValidateAuthority": false } } @@ -322,7 +322,7 @@ builder.Services.AddMsalAuthentication(options => }); ``` -The `{SCOPE URI}` is the default access token scope (for example, `https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access` or the custom URI that you configured in the Azure portal). +The `{SCOPE URI}` is the default access token scope (for example, `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/API.Access` or the custom URI that you configured in the Azure portal). The method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure Portal AAD configuration when you register the app. diff --git a/aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md b/aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md index 63c3723aae91..2f865310c285 100644 --- a/aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md +++ b/aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md @@ -47,8 +47,8 @@ Register an ME-ID app for the *Server API app*: Record the following information: -* *Server API app* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`) -* Directory (tenant) ID (for example, `e86c78e2-8bb4-4c41-aefd-918e0565a45e`) +* *Server API app* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`) +* Directory (tenant) ID (for example, `aaaabbbb-0000-cccc-1111-dddd2222eeee`) * ME-ID Primary/Publisher/Tenant domain (for example, `contoso.onmicrosoft.com`): The domain is available as the **Publisher domain** in the **Branding** blade of the Azure portal for the registered app. In **API permissions**, remove the **Microsoft Graph** > **User.Read** permission, as the server API app doesn't require additional API access for merely signing in users and calling server API endpoints. @@ -66,7 +66,7 @@ In **Expose an API**: Record the following information: -* App ID URI GUID (for example, record `41451fa7-82d9-4673-8fa5-69eff5a761fd` from the App ID URI of `api://41451fa7-82d9-4673-8fa5-69eff5a761fd`) +* App ID URI GUID (for example, record `00001111-aaaa-2222-bbbb-3333cccc4444` from the App ID URI of `api://00001111-aaaa-2222-bbbb-3333cccc4444`) * Scope name (for example, `API.Access`) > [!IMPORTANT] @@ -86,7 +86,7 @@ Register an ME-ID app for the *Client app*: > [!NOTE] > Supplying the port number for a `localhost` ME-ID redirect URI isn't required. For more information, see [Redirect URI (reply URL) restrictions and limitations: Localhost exceptions (Entra documentation)](/entra/identity-platform/reply-url#localhost-exceptions). -Record the **:::no-loc text="Client":::** app Application (client) ID (for example, `4369008b-21fa-427c-abaa-9b53bf58e538`). +Record the **:::no-loc text="Client":::** app Application (client) ID (for example, `11112222-bbbb-3333-cccc-4444dddd5555`). In **Authentication** > **Platform configurations** > **Single-page application**: @@ -121,12 +121,12 @@ dotnet new blazorwasm -au SingleOrg --api-client-id "{SERVER API APP CLIENT ID}" | Placeholder | Azure portal name | Example | | --- | --- | --- | | `{PROJECT NAME}` | — | `BlazorSample` | -| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `4369008b-21fa-427c-abaa-9b53bf58e538` | +| `{CLIENT APP CLIENT ID}` | Application (client) ID for the **:::no-loc text="Client":::** app | `11112222-bbbb-3333-cccc-4444dddd5555` | | `{DEFAULT SCOPE}` | Scope name | `API.Access` | -| `{SERVER API APP CLIENT ID}` | Application (client) ID for the *Server API app* | `41451fa7-82d9-4673-8fa5-69eff5a761fd` | -| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) | +| `{SERVER API APP CLIENT ID}` | Application (client) ID for the *Server API app* | `00001111-aaaa-2222-bbbb-3333cccc4444` | +| `{SERVER API APP ID URI GUID}` | Application ID URI GUID | `00001111-aaaa-2222-bbbb-3333cccc4444` (GUID ONLY, matches the `{SERVER API APP CLIENT ID}`) | | `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` | -| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-8bb4-4c41-aefd-918e0565a45e` | +| `{TENANT ID}` | Directory (tenant) ID | `aaaabbbb-0000-cccc-1111-dddd2222eeee` | The output location specified with the `-o|--output` option creates a project folder if it doesn't exist and becomes part of the project's name. **Avoid using dashes (`-`) in the app name that break the formation of the OIDC app identifier (see the earlier WARNING).** @@ -191,8 +191,8 @@ Example: "AzureAd": { "Instance": "https://login.microsoftonline.com/", "Domain": "contoso.onmicrosoft.com", - "TenantId": "e86c78e2-8bb4-4c41-aefd-918e0565a45e", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "TenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "CallbackPath": "/signin-oidc", "Scopes": "API.Access" } @@ -281,7 +281,7 @@ Example: { "AzureAd": { "Authority": "https://login.microsoftonline.com/e86c78e2-...-918e0565a45e", - "ClientId": "4369008b-21fa-427c-abaa-9b53bf58e538", + "ClientId": "11112222-bbbb-3333-cccc-4444dddd5555", "ValidateAuthority": true } } @@ -364,7 +364,7 @@ Example default access token scope: ```csharp options.ProviderOptions.DefaultAccessTokenScopes.Add( - "api://41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access"); + "api://00001111-aaaa-2222-bbbb-3333cccc4444/API.Access"); ``` For more information, see the following sections of the *Additional scenarios* article: @@ -448,7 +448,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O Example: ```json - "Audience": "https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd" + "Audience": "https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444" ``` * In the `Program` file of the **`Client`** app, set the audience of the scope (App ID URI) to match the server API app's audience: @@ -467,7 +467,7 @@ Instead of the App ID URI matching the format `api://{SERVER API APP CLIENT ID O .Add("https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd/API.Access"); ``` - In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/41451fa7-82d9-4673-8fa5-69eff5a761fd` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`). + In the preceding scope, the App ID URI/audience is the `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444` portion of the value, which doesn't include a trailing slash (`/`) and doesn't include the scope name (`API.Access`). ## Use of a custom App ID URI diff --git a/aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md b/aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md index fa12f06151bc..3c85f04c78c0 100644 --- a/aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md +++ b/aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md @@ -47,7 +47,7 @@ Register an AAD B2C app: Record the following information: -* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`). +* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`). * AAD B2C instance (for example, `https://contoso.b2clogin.com/`, which includes the trailing slash): The instance is the scheme and host of an Azure B2C app registration, which can be found by opening the **Endpoints** window from the **App registrations** page in the Azure portal. * AAD B2C Primary/Publisher/Tenant domain (for example, `contoso.onmicrosoft.com`): The domain is available as the **Publisher domain** in the **Branding** blade of the Azure portal for the registered app. @@ -78,7 +78,7 @@ dotnet new blazorwasm -au IndividualB2C --aad-b2c-instance "{AAD B2C INSTANCE}" | ----------------------------- | ------------------------------- | ------------------------------------------------------------- | | `{AAD B2C INSTANCE}` | Instance | `https://contoso.b2clogin.com/` (includes the trailing slash) | | `{PROJECT NAME}` | — | `BlazorSample` | -| `{CLIENT ID}` | Application (client) ID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` | +| `{CLIENT ID}` | Application (client) ID | `00001111-aaaa-2222-bbbb-3333cccc4444` | | `{SIGN UP OR SIGN IN POLICY}` | Sign-up/sign-in user flow | `B2C_1_signupsignin1` | | `{TENANT DOMAIN}` | Primary/Publisher/Tenant domain | `contoso.onmicrosoft.com` | @@ -152,7 +152,7 @@ Example: { "AzureAdB2C": { "Authority": "https://contoso.b2clogin.com/contoso.onmicrosoft.com/B2C_1_signupsignin1", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "ValidateAuthority": false } } diff --git a/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-accounts.md b/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-accounts.md index 03408313a017..8cb0ad193abd 100644 --- a/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-accounts.md +++ b/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-accounts.md @@ -43,7 +43,7 @@ Register an ME-ID app: > [!NOTE] > Supplying the port number for a `localhost` ME-ID redirect URI isn't required. For more information, see [Redirect URI (reply URL) restrictions and limitations: Localhost exceptions (Entra documentation)](/entra/identity-platform/reply-url#localhost-exceptions). -Record the Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`). +Record the Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`). In **Authentication** > **Platform configurations** > **Single-page application**: @@ -63,7 +63,7 @@ dotnet new blazorwasm -au SingleOrg --client-id "{CLIENT ID}" --tenant-id "commo | Placeholder | Azure portal name | Example | | ---------------- | ----------------------- | -------------------------------------- | | `{PROJECT NAME}` | — | `BlazorSample` | -| `{CLIENT ID}` | Application (client) ID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` | +| `{CLIENT ID}` | Application (client) ID | `00001111-aaaa-2222-bbbb-3333cccc4444` | The output location specified with the `-o|--output` option creates a project folder if it doesn't exist and becomes part of the project's name. @@ -128,7 +128,7 @@ Example: { "AzureAd": { "Authority": "https://login.microsoftonline.com/common", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "ValidateAuthority": true } } diff --git a/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-entra-id.md b/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-entra-id.md index 71af7bf83679..4d13b87e8a38 100644 --- a/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-entra-id.md +++ b/aspnetcore/blazor/security/webassembly/standalone-with-microsoft-entra-id.md @@ -45,8 +45,8 @@ Register an ME-ID app: Record the following information: -* Application (client) ID (for example, `41451fa7-82d9-4673-8fa5-69eff5a761fd`) -* Directory (tenant) ID (for example, `e86c78e2-8bb4-4c41-aefd-918e0565a45e`) +* Application (client) ID (for example, `00001111-aaaa-2222-bbbb-3333cccc4444`) +* Directory (tenant) ID (for example, `aaaabbbb-0000-cccc-1111-dddd2222eeee`) In **Authentication** > **Platform configurations** > **Single-page application**: @@ -66,8 +66,8 @@ dotnet new blazorwasm -au SingleOrg --client-id "{CLIENT ID}" -o {PROJECT NAME} | Placeholder | Azure portal name | Example | | ---------------- | ----------------------- | -------------------------------------- | | `{PROJECT NAME}` | — | `BlazorSample` | -| `{CLIENT ID}` | Application (client) ID | `41451fa7-82d9-4673-8fa5-69eff5a761fd` | -| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-8bb4-4c41-aefd-918e0565a45e` | +| `{CLIENT ID}` | Application (client) ID | `00001111-aaaa-2222-bbbb-3333cccc4444` | +| `{TENANT ID}` | Directory (tenant) ID | `aaaabbbb-0000-cccc-1111-dddd2222eeee` | The output location specified with the `-o|--output` option creates a project folder if it doesn't exist and becomes part of the project's name. @@ -132,7 +132,7 @@ Example: { "AzureAd": { "Authority": "https://login.microsoftonline.com/e86c78e2-...-918e0565a45e", - "ClientId": "41451fa7-82d9-4673-8fa5-69eff5a761fd", + "ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444", "ValidateAuthority": true } }