You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Clarifies the supported account types that can be used
Updates flow of instructions to align to portal updates
Fixes port used launchSettings when running from command line
Co-authored-by: Sébastien Levert <[email protected]>
Copy file name to clipboardExpand all lines: samples/proxy-provider-asp-net-core/README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,15 +53,13 @@ To use the Microsoft Graph Connect Sample for ASP.NET Core 3.1, you need the fol
53
53
5. On the **Register an application** page, specify the following values:
54
54
55
55
-**Name** = [Desired app name]
56
-
-**Supported account types** = [Choose the value that applies to your needs]
56
+
-**Supported account types** = [Choose the **Multi-tenant**value that applies to your needs]
57
57
-**Redirect URI**
58
58
- Type (dropdown) = Web
59
59
- Value = `https://localhost:44334/signin-oidc`
60
60
61
61
> **Note:** Ensure that the Redirect URI value is unique within your domain. This value can be changed at a later time and does not need to point to a hosted URI. If the example URI above is already used please choose a unique value.
62
-
63
-
1. Under **Advanced settings**, set the value of the **Logout URL** to `https://localhost:44334/Account/SignOut`
64
-
2. Copy the **Redirect URI** as you will need it later.
62
+
- Copy the **Redirect URI** as you will need it later.
65
63
66
64
6. Once the app is created, copy the **Application (client) ID** and **Directory (tenant) ID** from the overview page and store it temporarily as you will need both later.
67
65
@@ -81,7 +79,9 @@ To use the Microsoft Graph Connect Sample for ASP.NET Core 3.1, you need the fol
81
79
> In production apps you should always use certificates as your application secrets, but for this sample we will use a simple shared secret password.
82
80
83
81
8. Click **Authentication** from the current blade navigation pane.
84
-
1. Select 'ID tokens'
82
+
1. Configure the **Front-channel logout URL** to `https://localhost:44334/Account/SignOut`
83
+
2. Select 'ID tokens' in the **Implicit grant and hybrid flows** section
84
+
85
85
9. Click **API permissions** from the current blade navigation pane.
86
86
87
87
1. Click **Add a permission** from the current blade content.
0 commit comments