You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 1-Authentication/1-sign-in/AppCreationScripts/AppCreationScripts.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
5
5
### Quick summary
6
6
7
-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
7
+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
8
8
9
9
```PowerShell
10
10
cd .\AppCreationScripts\
@@ -28,25 +28,25 @@
28
28
29
29
### Presentation of the scripts
30
30
31
-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
31
+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
32
32
33
33
These scripts are:
34
34
35
35
-`Configure.ps1` which:
36
-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36
+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
37
37
- changes the configuration files in the sample projects.
38
-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
38
+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
39
39
- the identifier of the application
40
40
- the AppId of the application
41
-
- the url of its registration in the [Azure portal](https://portal.azure.com).
41
+
- the url of its registration in the [Microsoft Entra admin center](https://entra.microsoft.com).
42
42
43
-
-`Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
43
+
-`Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
44
44
45
45
> :information_source: If the sample supports using certificates instead of client secrets, this folder will contain an additional set of scripts: `Configure-WithCertificates.ps1` and `Cleanup-WithCertificates.ps1`. You can use them in the same way to register app(s) that use certificates instead of client secrets.
46
46
47
47
### Usage pattern for tests and DevOps scenarios
48
48
49
-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
49
+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
50
50
51
51
## How to use the app creation scripts?
52
52
@@ -108,8 +108,8 @@ Note that the script will choose the tenant in which to create the applications,
108
108
109
109
if you want to create the apps in a particular tenant, you can use the following option:
110
110
111
-
- Open the [Azure portal](https://portal.azure.com)
112
-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
111
+
- Open the [Microsoft Entra admin center](https://entra.microsoft.com)
112
+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
113
113
- Find the "Active Directory" object in this tenant
114
114
- Go to **Properties** and copy the content of the **Directory Id** property
Copy file name to clipboardExpand all lines: 1-Authentication/1-sign-in/README-use-certificate.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Alternatively, download and build **OpenSSL** for your **OS** following the guid
39
39
-**Step 1: [Create a self-signed certificate](#create-a-self-signed-certificate)**
40
40
- Option 1: [create self-signed certificate on local machine](#create-self-signed-certificate-on-local-machine)
41
41
- Option 2: [create self-signed certificate on Key Vault](#create-self-signed-certificate-on-key-vault)
42
-
-**Step 2: [Configure an Azure AD app registration to use a certificate](#configure-an-azure-ad-app-registration-to-use-a-certificate)**
42
+
-**Step 2: [Configure a Microsoft Entra app registration to use a certificate](#configure-an-azure-ad-app-registration-to-use-a-certificate)**
43
43
-**Step 3: [Configure your app(s) to use a certificate](#configure-your-apps-to-use-a-certificate)**
44
44
- Option 1: [using an existing certificate from local machine](#using-an-existing-certificate-from-local-machine)
45
45
- Option 2: [using an existing certificate from Key Vault](#using-an-existing-certificate-from-key-vault)
@@ -96,9 +96,9 @@ You can use Azure Key Vault to generate a self-signed certificate for you. Doing
96
96
> ```
97
97
98
98
<details>
99
-
<summary>Click here to use Azure Portal</summary>
99
+
<summary>Click here to use Microsoft Entra admin center</summary>
100
100
101
-
Follow the guide: [Set and retrieve a certificate from Azure Key Vault using the Azure portal](https://learn.microsoft.com/azure/key-vault/certificates/quick-create-portal)
101
+
Follow the guide: [Set and retrieve a certificate from Azure Key Vault using the Microsoft Entra admin center](https://learn.microsoft.com/azure/key-vault/certificates/quick-create-portal)
102
102
103
103
Afterwards, proceed to [Step 2](#configure-an-azure-ad-app-registration-to-use-a-certificate).
104
104
@@ -113,13 +113,13 @@ Afterwards, proceed to [Step 2](#configure-an-azure-ad-app-registration-to-use-a
113
113
114
114
</details>
115
115
116
-
### Configure an Azure AD app registration to use a certificate
116
+
### Configure a Microsoft Entra app registration to use a certificate
117
117
118
-
Now you must associate your Azure AD app registration with the certificate you will use in your application.
118
+
Now you must associate your Microsoft Entra app registration with the certificate you will use in your application.
119
119
120
120
> :information_source: If you have the certificate locally available, you can follow the steps below. If your certificate(s) is on Azure Key Vault, you must first export and download them to your computer, and delete the local copy after following the steps below. See: [Export certificates from Azure Key Vault](https://learn.microsoft.com/azure/key-vault/certificates/how-to-export-certificate)
121
121
122
-
1. Navigate to [Azure portal](https://portal.azure.com) and select your Azure AD app registration.
122
+
1. Navigate to [Microsoft Entra admin center](https://entra.microsoft.com) and select your Microsoft Entra app registration.
123
123
1. Select **Certificates & secrets** blade on the left.
124
124
1. Click on **Upload** certificate and select the certificate file to upload (e.g. *msal-node-webapp*).
125
125
1. Click **Add**. Once the certificate is uploaded, the *thumbprint*, *start date*, and *expiration* values are displayed. Record the *thumbprint* value as you will make use of it later in your app's configuration file.
@@ -255,7 +255,7 @@ Once you deploy your app(s) to Azure App Service, you can assign a managed ident
255
255
256
256
### Create a system-assigned identity
257
257
258
-
1. Navigate to [Azure portal](https://portal.azure.com) and select the **Azure App Service**.
258
+
1. Navigate to [Microsoft Entra admin center](https://entra.microsoft.com) and select the **Azure App Service**.
259
259
1. Find and select the App Service instance you've created previously.
260
260
1. On App Service portal, select **Identity**.
261
261
1. Within the **System assigned** tab, switch **Status** to **On**. Click **Save**.
@@ -266,7 +266,7 @@ For more information, see [Add a system-assigned identity](https://docs.microsof
266
266
267
267
Now that your app deployed to App Service has a managed identity, in this step you grant it access to your key vault.
268
268
269
-
1. Go to the [Azure portal](https://portal.azure.com) and search for your Key Vault.
269
+
1. Go to the [Microsoft Entra admin center](https://entra.microsoft.com) and search for your Key Vault.
270
270
1. Select **Overview** > **Access policies** blade on the left.
@@ -281,7 +281,7 @@ Finally, you need to add environment variables to the App Service where you depl
281
281
282
282
> :warning: Make sure your application is able to read environment variables. Alternatively, you can hardcode the key vault URL and certificate name in your applications configuration file.
283
283
284
-
1. In the [Azure portal](https://portal.azure.com), search for and select **App Service**, and then select your app.
284
+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **App Service**, and then select your app.
285
285
1. Select **Configuration** blade on the left, then select **New Application Settings**.
286
286
1. Add the following variables (key-value pairs):
287
287
1.**KEY_VAULT_URL**: the URL of the key vault you've created, e.g. `https://example.vault.azure.net`
0 commit comments