You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 1-WebApp-OIDC/1-1-MyOrg/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ platforms: dotnet
4
4
author: jmprieur
5
5
level: 100
6
6
client: ASP.NET Core Web App
7
-
endpoint: AAD v2.0
7
+
endpoint: Microsoft identity platform
8
8
---
9
9
10
10
# An ASP.NET Core Web app signing-in users with the Microsoft identity platform in your organization
@@ -85,7 +85,7 @@ As a first step you'll need to:
85
85
86
86
### Step 2: Download/ Clone this sample code or build the application using a template
87
87
88
-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
88
+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
142
+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
143
143
144
144
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
145
145
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -149,7 +149,7 @@ cd "1-WebApp-OIDC\1-1-MyOrg"
149
149
150
150
1. Build the solution and run it.
151
151
152
-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
152
+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the identity platform endpoint. Sign in with your personal account or with work or school account.
Copy file name to clipboardExpand all lines: 1-WebApp-OIDC/1-2-AnyOrg/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ platforms: dotnet
4
4
author: jmprieur
5
5
level: 100
6
6
client: ASP.NET Core Web App
7
-
endpoint: AAD v2.0
7
+
endpoint: Microsoft identity platform
8
8
---
9
9
10
10
@@ -86,7 +86,7 @@ As a first step you'll need to:
86
86
87
87
### Step 2: Download/ Clone this sample code or build the application using a template
88
88
89
-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
89
+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
142
+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
143
143
144
144
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
145
145
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -149,7 +149,7 @@ cd "1-WebApp-OIDC\1-2-AnyOrg"
149
149
150
150
1. Build the solution and run it.
151
151
152
-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
152
+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
Copy file name to clipboardExpand all lines: 1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ platforms: dotnet
4
4
author: jmprieur
5
5
level: 100
6
6
client: ASP.NET Core Web App
7
-
endpoint: AAD v2.0
7
+
endpoint: Microsoft identity platform
8
8
---
9
9
# An ASP.NET Core Web app signing-in users with Work or School accounts or Microsoft personal accounts
10
10
@@ -100,7 +100,7 @@ As a first step you'll need to:
100
100
101
101
### Step 2: Download/ Clone this sample code or build the application using a template
102
102
103
-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint. You can clone/download this repository or create the sample from the command line:
103
+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint. You can clone/download this repository or create the sample from the command line:
104
104
105
105
#### Option 1: Download/ clone this sample
106
106
@@ -153,7 +153,7 @@ In the **appsettings.json** file:
This enables your application to use the Microsoft identity platform (formerly Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
156
+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
157
157
158
158
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
159
159
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -163,11 +163,11 @@ In the **appsettings.json** file:
163
163
164
164
1. Build the solution and run it.
165
165
166
-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
166
+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
167
167
168
168
## Optional: Restrict sign-in access to your application
169
169
170
-
By default, when you use the dotnet core template with `SingleOrg` authentication option and follow the instructions in this guide to configure the application to use the Microsoft identity platform (fomerly Azure AD v2.0) endpoint, both personal accounts - like outlook.com, live.com, and others - as well as Work or school accounts from any organizations that are integrated with Azure AD can sign in to your application. These multi-tenant apps are typically used on SaaS applications.
170
+
By default, when you use the dotnet core template with `SingleOrg` authentication option and follow the instructions in this guide to configure the application to use the Microsoft identity platform endpoint, both personal accounts - like outlook.com, live.com, and others - as well as Work or school accounts from any organizations that are integrated with Azure AD can sign in to your application. These multi-tenant apps are typically used on SaaS applications.
171
171
172
172
It's possible to restric the audience foryour application by changing the audiencein your application registration.
Copy file name to clipboardExpand all lines: 1-WebApp-OIDC/1-4-Sovereign/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ platforms: dotnet
4
4
author: negoe
5
5
level: 100
6
6
client: ASP.NET Core Web App
7
-
endpoint: AAD v2.0
7
+
endpoint: Microsoft identity platform
8
8
---
9
9
# Build an ASP.NET Core Web app signing-in users in sovereign clouds with the Microsoft identity platform
10
10
@@ -42,7 +42,7 @@ To run this sample:
42
42
43
43
44
44
### Step 1: Download/Clone this sample code
45
-
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Azure AD V2 endpoint.
45
+
This sample was created from the dotnet core 2.2 [dotnet new mvc](https://docs.microsoft.com/dotnet/core/tools/dotnet-new?tabs=netcore2x) template with `SingleOrg` authentication, and then tweaked to let it support tokens for the Microsoft identity platform endpoint.
46
46
47
47
You can clone this sample from your shell or command line:
48
48
@@ -127,7 +127,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
This enables your application to use the Microsoft identity platform (formerly known as Azure AD v2.0) endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
130
+
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
131
131
132
132
1. Change the `Properties\launchSettings.json` file to ensure that you start your web app from <https://localhost:44321> as registered. For this:
133
133
- update the `sslPort` of the `iisSettings` section to be `44321`
@@ -137,7 +137,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
137
137
138
138
1. Build the solution and run it.
139
139
140
-
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Azure AD v2 endpoint. Sign in with your personal account or with work or school account.
140
+
2. Open your web browser and make a request to the app. Accept the IIS Express SSL certificate if needed. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with work or school account.
Copy file name to clipboardExpand all lines: 1-WebApp-OIDC/1-6-SignOut/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ This page explains how sign-out works
7
7
## What sign out involves
8
8
9
9
Signing out from a Web app is about more than removing the information about the signed-in account from the Web App's state.
10
-
The Web app must also redirect the user to the Microsoft identity platform v2.0 `logout` endpoint to sign out. When your web app redirects the user to the `logout` endpoint, this endpoint clears the user's session from the browser. If your app did not go to the `logout` endpoint, the user would reauthenticate to your app without entering their credentials again, because they would have a valid single sign-in session with the Microsoft Identity platform v2.0 endpoint.
10
+
The Web app must also redirect the user to the Microsoft identity platform `logout` endpoint to sign out. When your web app redirects the user to the `logout` endpoint, this endpoint clears the user's session from the browser. If your app did not go to the `logout` endpoint, the user would reauthenticate to your app without entering their credentials again, because they would have a valid single sign-in session with the Microsoft identity platform endpoint.
11
11
12
-
To learn more, see the [Send a sign-out request](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc#send-a-sign-out-request) paragraph in the [Microsoft Identity platform v2.0 and the OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) conceptual documentation
12
+
To learn more, see the [Send a sign-out request](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc#send-a-sign-out-request) paragraph in the [Microsoft identity platform and the OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) conceptual documentation
Copy file name to clipboardExpand all lines: 2-WebApp-graph-user/2-1-Call-MSGraph/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: jmprieur
5
5
level: 200
6
6
client: ASP.NET Core 2.x Web App
7
7
service: Microsoft Graph
8
-
endpoint: AAD v2.0
8
+
endpoint: Microsoft identity platform
9
9
---
10
10
11
11
# Using the Microsoft identity platform to call the Microsoft Graph API from an An ASP.NET Core 2.x Web App, on behalf of a user signing-in using their work and school or Microsoft personal account
@@ -16,7 +16,7 @@ endpoint: AAD v2.0
16
16
17
17
Starting from a .NET Core 2.2 MVC Web app that uses OpenID Connect to sign in users, this phase of the tutorial shows how to call Microsoft Graph /me endpoint on behalf of the signed-in user. It leverages the ASP.NET Core OpenID Connect middleware and Microsoft Authentication Library for .NET (MSAL.NET). Their complexities where encapsultated into the `Microsoft.Identity.Web` reusable library project part of this tutorial. Once again the notion of ASP.NET services injected by dependency injection is heavily used.
18
18
19
-

19
+

20
20
21
21
## How to run this sample
22
22
@@ -72,7 +72,7 @@ Go to the `"2-WebApp-graph-user\2-1-Call-MSGraph"` folder
72
72
73
73
1. Build the solution and run it.
74
74
75
-
2. Open your web browser and make a request to the app. The app immediately attempts to authenticate you via the Microsoft identity platform (fomerly Azure AD v2.0) endpoint. Sign in with your personal account or with a work or school account.
75
+
2. Open your web browser and make a request to the app. The app immediately attempts to authenticate you via the Microsoft identity platform endpoint. Sign in with your personal account or with a work or school account.
76
76
77
77
3. Go to the **Profile** page, you should now see all kind of information about yourself as well as your picture (a call was made to the Microsoft Graph */me* endpoint)
0 commit comments