Skip to content

Commit 3b8c19d

Browse files
authored
Merge pull request #78 from rwike77/patch-1
Branding updates
2 parents 301b4d6 + e507de6 commit 3b8c19d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

1. Desktop app calls Web API/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ author: jmprieur
55
level: 300
66
client: .NET Desktop (WPF)
77
service: ASP.NET Core Web API
8-
endpoint: AAD v2.0
8+
endpoint: Microsoft identity platform
99
---
10-
# Calling an ASP.NET Core Web API from a WPF application using Azure AD V2
10+
# Calling an ASP.NET Core Web API from a WPF application using Microsoft identity platform
1111

1212
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnet-native-aspnetcore-v2)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=516)
1313

@@ -45,7 +45,7 @@ The .Net application uses the Active Directory Authentication Library [MSAL.NET]
4545
![Topology](./ReadmeFiles/topology.png)
4646

4747
> This sample is very similar to the [active-directory-dotnet-native-aspnetcore](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore) sample except that that one is for the Azure AD V1 endpoint
48-
> and the token is acquired using [ADAL.NET](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet), whereas this sample is for the V2 endpoint, and the token is acquired using [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet). The Web API was also modified to accept both V1 and V2 tokens.
48+
> and the token is acquired using [ADAL.NET](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet), whereas this sample is for the Microsoft identity platform endpoint, and the token is acquired using [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet). The Web API was also modified to accept both V1 and V2 tokens.
4949
5050
### User experience when using this sample
5151

@@ -152,7 +152,7 @@ If you want to register your apps manually, as a first step you'll need to:
152152
- in the manifest, search for **"accessTokenAcceptedVersion"**, and see that its value is **2**. This property lets Azure AD know that the Web API accepts v2.0 tokens
153153
- Select **Save**
154154

155-
> Important: it's up to the Web API to decide which version of token (v1.0 or v2.0) it accepts. Then when clients request a token for your Web API using the v2.0 endpoint, they'll get a token which version is accepted by the Web API. The code validating the tokens in this sample was written to accept both versions.
155+
> Important: it's up to the Web API to decide which version of token (v1.0 or v2.0) it accepts. Then when clients request a token for your Web API using the identity platform endpoint, they'll get a token which version is accepted by the Web API. The code validating the tokens in this sample was written to accept both versions.
156156
157157
#### Register the client app (TodoListClient)
158158

@@ -395,7 +395,7 @@ This code validates that the issuer of the token sent, by its client, to the Web
395395

396396
#### Modify the startup.cs file so that the Web API becomes v2.0 multi-tenant app
397397

398-
Currently the ASP.NET Core templates create Azure AD v1.0 Web APIs. However you can easylly change them to use the Azure AD v2.0 endpoint. To update them, make the following changes in the `Startup.cs` file.
398+
Currently the ASP.NET Core templates create Azure AD v1.0 Web APIs. However you can easylly change them to use the Microsoft identity platform endpoint. To update them, make the following changes in the `Startup.cs` file.
399399

400400
Add a using for `Microsoft.AspNetCore.Authentication.JwtBearer`
401401

@@ -428,7 +428,7 @@ services.Configure<JwtBearerOptions>(AzureADDefaults.JwtBearerAuthenticationSche
428428

429429
This code makes sure that:
430430

431-
- the tokens are validated with Azure AD v2.0 (the ASP.NET Core 2.1 template is for the moment an Azure AD v1.0 template)
431+
- the tokens are validated with Microsoft identity platform (the ASP.NET Core 2.1 template is for the moment an Azure AD v1.0 template)
432432
- the valid audiences are both the ClientID of our Web API (default value of `options.Audience` with the ASP.NET Core template and api://{ClientID}
433433
- the issuer is validated (for the multi-tenant case)
434434

0 commit comments

Comments
 (0)