Skip to content

Commit 46812d0

Browse files
authored
Merge branch 'master' into patch-2
2 parents 87a5d22 + abbe001 commit 46812d0

File tree

6 files changed

+22
-22
lines changed

6 files changed

+22
-22
lines changed

2. Web API now calls Microsoft Graph/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ author: jmprieur
55
level: 400
66
client: .NET Desktop (WPF)
77
service: ASP.NET Core Web API, Microsoft Graph
8-
endpoint: AAD v2.0
8+
endpoint: Microsoft identity platform
99
---
10-
# ASP.NET Core Web API calling Microsoft Graph, itself called from a WPF application using Azure AD V2
10+
# ASP.NET Core Web API calling Microsoft Graph, itself called from a WPF application using Microsoft identity platform
1111

1212
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnet-native-aspnetcore-v2)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=516)
1313

@@ -115,7 +115,7 @@ If you want to use this automation:
115115
> Other ways of running the scripts are described in [App Creation Scripts](./AppCreationScripts/AppCreationScripts.md)
116116
117117
1. In the list of pages for the application registration of the `TodoListService-v2` application, select **Manifest**
118-
- in the manifest, search for **"accessTokenAcceptedVersion"**, and replace **null** by **2**. This property lets Azure AD know that the Web API accepts v2.0 tokens
118+
- in the manifest, search for **"accessTokenAcceptedVersion"**, and replace **null** by **2**. This property lets Azure AD know that the Web API accepts Microsoft identity platform (v2.0) tokens
119119
- Select **Save**
120120

121121

@@ -174,7 +174,7 @@ If you want to register your apps manually, as a first step you'll need to:
174174
- in the manifest, search for **"accessTokenAcceptedVersion"**, and see that its value is **2**. This property lets Azure AD know that the Web API accepts v2.0 tokens
175175
- Select **Save**
176176

177-
> Important: it's up to the Web API to decide which version of token (v1.0 or v2.0) it accepts. Then when clients request a token for your Web API using the v2.0 endpoint, they'll get a token which version is accepted by the Web API. The code validating the tokens in this sample was written to accept both versions.
177+
> Important: it's up to the Web API to decide which version of token (v1.0 or v2.0) it accepts. Then when clients request a token for your Web API using the Microsoft identity platform endpoint, they'll get a token which version is accepted by the Web API. The code validating the tokens in this sample was written to accept both versions.
178178
179179
#### Register the client app (TodoListClient)
180180

@@ -309,7 +309,7 @@ Update `Startup.cs` file:
309309

310310
`AddProtectWebApiWithMicrosoftIdentityPlatformV2` does the following:
311311
- add the **Jwt**BearerAuthenticationScheme (Note the replacement of BearerAuthenticationScheme by **Jwt**BearerAuthenticationScheme)
312-
- set the authority to be the Microsoft identity platform v2.0 identity
312+
- set the authority to be the Microsoft identity platform identity
313313
- sets the audiences to validate
314314
- register an issuer validator that accepts issuers to be in the Microsoft identity platform clouds.
315315
-
@@ -325,7 +325,7 @@ Update `Startup.cs` file:
325325
// Added
326326
services.Configure<JwtBearerOptions>(AzureADDefaults.JwtBearerAuthenticationScheme, options =>
327327
{
328-
// This is an Azure AD v2.0 Web API
328+
// This is an Microsoft identity platform Web API
329329
options.Authority += "/v2.0";
330330

331331
// The valid audiences are both the Client ID (options.Audience) and api://{ClientID}

3.-Web-api-call-Microsoft-graph-for-personal-accounts/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ author: jmprieur
55
level: 400
66
client: .NET Desktop (WPF)
77
service: ASP.NET Core Web API, Microsoft Graph
8-
endpoint: AAD v2.0
8+
endpoint: Microsoft identity platform
99
---
10-
# ASP.NET Core Web API calling Microsoft Graph including personal accounts, itself called from a WPF application using the Microsoft identity platform (formerly named Azure AD v2.0)
10+
# ASP.NET Core Web API calling Microsoft Graph including personal accounts, itself called from a WPF application using the Microsoft identity platform
1111

1212
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnet-native-aspnetcore-v2)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=516)
1313

@@ -372,8 +372,8 @@ For more information, visit the following links:
372372
- [Acquiring tokens with authorization codes on web apps](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/Acquiring-tokens-with-authorization-codes-on-web-apps)
373373
- [Customizing Token cache serialization](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/token-cache-serialization)
374374

375-
- Articles about the Azure AD V2 endpoint [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
376-
- [Azure Active Directory v2.0 and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-on-behalf-of)
375+
- Articles about the Microsoft identity platform endpoint [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
376+
- [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-on-behalf-of)
377377

378378
- [Introduction to Identity on ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity?view=aspnetcore-2.1&tabs=visual-studio%2Caspnetcore2x)
379379
- [AuthenticationBuilder](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder?view=aspnetcore-2.0)

Microsoft.Identity.Web/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ This library contains a set of reusable classes useful in Web Applications and W
55
The library contains helper classes to:
66

77
- **Bootstrap the web resource from the Startup.cs file** in your web application by just calling a few methods
8-
- `AddAzureAdV2Authentication` to add authentication with the Microsoft Identity platform (AAD v2.0), including managing the authority validation.
8+
- `AddAzureAdV2Authentication` to add authentication with the Microsoft Identity platform, including managing the authority validation.
99

1010
```CSharp
1111
services.AddAzureAdV2Authentication();
@@ -22,7 +22,7 @@ The library contains helper classes to:
2222
![image](https://user-images.githubusercontent.com/13203188/53899064-a100ab80-4039-11e9-8869-fa9cffcd345a.png)
2323
2424
- Protect Web resources (in the `Resources` folder)
25-
- `AadIssuerValidator` is used to validate the issuer in multi-tenant applications, taking into account the aliases for authorities exising in Azure AD. This class works both for Azure AD v1.0 and Microsoft Identity platform v2.0 web resources. You should not need to use it directly, as it's used by `AddAzureAdV2Authentication`
25+
- `AadIssuerValidator` is used to validate the issuer in multi-tenant applications, taking into account the aliases for authorities exising in Azure AD. This class works both for Azure AD v1.0 and Microsoft identity platform web resources. You should not need to use it directly, as it's used by `AddAzureAdV2Authentication`
2626
- `OpenIdConnectMiddlewareDiagnostics` helps you understand what happens in the Open Id Connect Middleware. This is a diagnostics class that can help you troubleshooting your Web apps.
2727
- `ClaimsPrincipalExtensions` provides a set of extension methods on `ClaimsPrincipal` helping getting information from the signed-in user. It's used in the other classes of the libraries.
2828

Microsoft.Identity.Web/StartupHelpers.cs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ namespace Microsoft.Identity.Web
3838
public static class StartupHelpers
3939
{
4040
/// <summary>
41-
/// Add authentication with Microsoft identity platform v2.0 (AAD v2.0).
41+
/// Add authentication with Microsoft identity platform (v2.0).
4242
/// This expects the configuration files will have a section named "AzureAD"
4343
/// </summary>
4444
/// <param name="services">Service collection to which to add this authentication scheme</param>
@@ -70,7 +70,7 @@ public static IServiceCollection AddAzureAdV2Authentication(this IServiceCollect
7070

7171
// Set the nameClaimType to be preferred_username.
7272
// This change is needed because certain token claims from Azure AD V1 endpoint
73-
// (on which the original .NET core template is based) are different than Azure AD V2 endpoint.
73+
// (on which the original .NET core template is based) are different than V2 endpoint.
7474
// For more details see [ID Tokens](https://docs.microsoft.com/en-us/azure/active-directory/develop/id-tokens)
7575
// and [Access Tokens](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens)
7676
options.TokenValidationParameters.NameClaimType = "preferred_username";
@@ -161,4 +161,4 @@ public static IServiceCollection AddMsal(this IServiceCollection services, IEnum
161161
return services;
162162
}
163163
}
164-
}
164+
}

Microsoft.Identity.Web/WebApiStartupHelpers.cs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ namespace Microsoft.Identity.Web
4343
public static class WebApiStartupHelpers
4444
{
4545
/// <summary>
46-
/// Protects the Web API with Microsoft Identity Platform v2.0 (AAD v2.0)
46+
/// Protects the Web API with Microsoft identity platform (v2.0)
4747
/// This expects the configuration files will have a section named "AzureAD"
4848
/// </summary>
4949
/// <param name="services">Service collection to which to add this authentication scheme</param>
@@ -57,13 +57,13 @@ public static IServiceCollection AddProtectWebApiWithMicrosoftIdentityPlatformV2
5757
// Add session if you are planning to use session based token cache , .AddSessionTokenCaches()
5858
services.AddSession();
5959

60-
// Change the authentication configuration to accommodate the Azure AD v2.0 endpoint.
60+
// Change the authentication configuration to accommodate the identity platform endpoint.
6161
services.Configure<JwtBearerOptions>(AzureADDefaults.JwtBearerAuthenticationScheme, options =>
6262
{
6363
// Reinitialize the options as this has changed to JwtBearerOptions to pick configuration values for attributes unique to JwtBearerOptions
6464
configuration.Bind("AzureAd", options);
6565

66-
// This is an Azure AD v2.0 Web API
66+
// This is an identity platform Web API
6767
options.Authority += "/v2.0";
6868

6969
// The valid audiences are both the Client ID (options.Audience) and api://{ClientID}
@@ -105,7 +105,7 @@ public static IServiceCollection AddProtectWebApiWithMicrosoftIdentityPlatformV2
105105
}
106106

107107
/// <summary>
108-
/// Protects the Web API with Microsoft Identity Platform v2.0 (AAD v2.0)
108+
/// Protects the Web API with Microsoft identity platform (v2.0)
109109
/// This supposes that the configuration files have a section named "AzureAD"
110110
/// </summary>
111111
/// <param name="services">Service collection to which to add authentication</param>
@@ -149,4 +149,4 @@ public static IServiceCollection AddProtectedApiCallsWebApis(this IServiceCollec
149149
return services;
150150
}
151151
}
152-
}
152+
}

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,6 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
101101

102102
## Other samples and documentation
103103

104-
- Other samples for Azure AD v2.0 are available from [https://aka.ms/aaddevsamplesv2](https://aka.ms/aaddevsamplesv2)
104+
- Other samples for Microsoft identity platform are available from [https://aka.ms/aaddevsamplesv2](https://aka.ms/aaddevsamplesv2)
105105
- The conceptual documentation for MSAL.NET is available from [https://aka.ms/msalnet](https://aka.ms/msalnet)
106-
- the documentation for Azure AD v2.0 is available from [https://aka.ms/aadv2](https://aka.ms/aadv2)
106+
- the documentation for identity platform is available from [https://aka.ms/aadv2](https://aka.ms/aadv2)

0 commit comments

Comments
 (0)