Skip to content

Commit 4ea2fda

Browse files
committed
Entra Rebrand
1 parent adef505 commit 4ea2fda

File tree

21 files changed

+243
-243
lines changed

21 files changed

+243
-243
lines changed

.github/ISSUE_TEMPLATE.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@
99
<!-- mark with an `x` -->
1010

1111
```console
12-
- [ ] 1-1) Sign-in with Azure AD
13-
- [ ] 1-2) Sign-in with Azure AD B2C
12+
- [ ] 1-1) Sign-in with Microsoft Entra ID
13+
- [ ] 1-2) Sign-in with Azure Active Directory B2C
1414
- [ ] 2-1) Acquire a Token and call Microsoft Graph
1515
- [ ] 3) Deploy to Azure Storage and App Service
1616
- [ ] 4-1) Use App Roles for Role-based Access Control

.github/PULL_REQUEST_TEMPLATE.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,4 +47,4 @@ ex: verify that the following are valid:
4747
* ...
4848

4949
## Other Information
50-
<!-- Add any other helpful information that may be needed here. -->
50+
<!-- Add any other helpful information that may be needed here. -->

1-Authentication/1-sign-in/AppCreationScripts/AppCreationScripts.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
### Quick summary
66

7-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
7+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
88

99
```PowerShell
1010
cd .\AppCreationScripts\
@@ -28,25 +28,25 @@
2828

2929
### Presentation of the scripts
3030

31-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
31+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
3232

3333
These scripts are:
3434

3535
- `Configure.ps1` which:
36-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
3737
- changes the configuration files in the sample projects.
38-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
38+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
3939
- the identifier of the application
4040
- the AppId of the application
41-
- the url of its registration in the [Azure portal](https://portal.azure.com).
41+
- the url of its registration in the [Microsoft Entra admin center](https://entra.microsoft.com).
4242

43-
- `Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
43+
- `Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
4444

4545
> :information_source: If the sample supports using certificates instead of client secrets, this folder will contain an additional set of scripts: `Configure-WithCertificates.ps1` and `Cleanup-WithCertificates.ps1`. You can use them in the same way to register app(s) that use certificates instead of client secrets.
4646
4747
### Usage pattern for tests and DevOps scenarios
4848

49-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
49+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
5050

5151
## How to use the app creation scripts?
5252

@@ -108,8 +108,8 @@ Note that the script will choose the tenant in which to create the applications,
108108
109109
if you want to create the apps in a particular tenant, you can use the following option:
110110
111-
- Open the [Azure portal](https://portal.azure.com)
112-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
111+
- Open the [Microsoft Entra admin center](https://entra.microsoft.com)
112+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
113113
- Find the "Active Directory" object in this tenant
114114
- Go to **Properties** and copy the content of the **Directory Id** property
115115
- Then use the full syntax to run the scripts:

1-Authentication/1-sign-in/README-use-certificate.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Alternatively, download and build **OpenSSL** for your **OS** following the guid
3939
- **Step 1: [Create a self-signed certificate](#create-a-self-signed-certificate)**
4040
- Option 1: [create self-signed certificate on local machine](#create-self-signed-certificate-on-local-machine)
4141
- Option 2: [create self-signed certificate on Key Vault](#create-self-signed-certificate-on-key-vault)
42-
- **Step 2: [Configure an Azure AD app registration to use a certificate](#configure-an-azure-ad-app-registration-to-use-a-certificate)**
42+
- **Step 2: [Configure a Microsoft Entra app registration to use a certificate](#configure-an-azure-ad-app-registration-to-use-a-certificate)**
4343
- **Step 3: [Configure your app(s) to use a certificate](#configure-your-apps-to-use-a-certificate)**
4444
- Option 1: [using an existing certificate from local machine](#using-an-existing-certificate-from-local-machine)
4545
- Option 2: [using an existing certificate from Key Vault](#using-an-existing-certificate-from-key-vault)
@@ -96,9 +96,9 @@ You can use Azure Key Vault to generate a self-signed certificate for you. Doing
9696
> ```
9797
9898
<details>
99-
<summary>Click here to use Azure Portal</summary>
99+
<summary>Click here to use Microsoft Entra admin center</summary>
100100
101-
Follow the guide: [Set and retrieve a certificate from Azure Key Vault using the Azure portal](https://learn.microsoft.com/azure/key-vault/certificates/quick-create-portal)
101+
Follow the guide: [Set and retrieve a certificate from Azure Key Vault using the Microsoft Entra admin center](https://learn.microsoft.com/azure/key-vault/certificates/quick-create-portal)
102102
103103
Afterwards, proceed to [Step 2](#configure-an-azure-ad-app-registration-to-use-a-certificate).
104104
@@ -113,13 +113,13 @@ Afterwards, proceed to [Step 2](#configure-an-azure-ad-app-registration-to-use-a
113113
114114
</details>
115115
116-
### Configure an Azure AD app registration to use a certificate
116+
### Configure a Microsoft Entra app registration to use a certificate
117117
118-
Now you must associate your Azure AD app registration with the certificate you will use in your application.
118+
Now you must associate your Microsoft Entra app registration with the certificate you will use in your application.
119119
120120
> :information_source: If you have the certificate locally available, you can follow the steps below. If your certificate(s) is on Azure Key Vault, you must first export and download them to your computer, and delete the local copy after following the steps below. See: [Export certificates from Azure Key Vault](https://learn.microsoft.com/azure/key-vault/certificates/how-to-export-certificate)
121121
122-
1. Navigate to [Azure portal](https://portal.azure.com) and select your Azure AD app registration.
122+
1. Navigate to [Microsoft Entra admin center](https://entra.microsoft.com) and select your Microsoft Entra app registration.
123123
1. Select **Certificates & secrets** blade on the left.
124124
1. Click on **Upload** certificate and select the certificate file to upload (e.g. *msal-node-webapp*).
125125
1. Click **Add**. Once the certificate is uploaded, the *thumbprint*, *start date*, and *expiration* values are displayed. Record the *thumbprint* value as you will make use of it later in your app's configuration file.
@@ -255,7 +255,7 @@ Once you deploy your app(s) to Azure App Service, you can assign a managed ident
255255

256256
### Create a system-assigned identity
257257

258-
1. Navigate to [Azure portal](https://portal.azure.com) and select the **Azure App Service**.
258+
1. Navigate to [Microsoft Entra admin center](https://entra.microsoft.com) and select the **Azure App Service**.
259259
1. Find and select the App Service instance you've created previously.
260260
1. On App Service portal, select **Identity**.
261261
1. Within the **System assigned** tab, switch **Status** to **On**. Click **Save**.
@@ -266,7 +266,7 @@ For more information, see [Add a system-assigned identity](https://docs.microsof
266266

267267
Now that your app deployed to App Service has a managed identity, in this step you grant it access to your key vault.
268268

269-
1. Go to the [Azure portal](https://portal.azure.com) and search for your Key Vault.
269+
1. Go to the [Microsoft Entra admin center](https://entra.microsoft.com) and search for your Key Vault.
270270
1. Select **Overview** > **Access policies** blade on the left.
271271
1. Click on **Add Access Policy** > **Certificate permissions** > **Get**
272272
1. Click on **Add Access Policy** > **Secret permissions** > **Get**
@@ -281,7 +281,7 @@ Finally, you need to add environment variables to the App Service where you depl
281281

282282
> :warning: Make sure your application is able to read environment variables. Alternatively, you can hardcode the key vault URL and certificate name in your applications configuration file.
283283
284-
1. In the [Azure portal](https://portal.azure.com), search for and select **App Service**, and then select your app.
284+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **App Service**, and then select your app.
285285
1. Select **Configuration** blade on the left, then select **New Application Settings**.
286286
1. Add the following variables (key-value pairs):
287287
1. **KEY_VAULT_URL**: the URL of the key vault you've created, e.g. `https://example.vault.azure.net`

0 commit comments

Comments
 (0)