Skip to content

Commit 40960e9

Browse files
author
Kalyan Krishna
authored
Merge pull request #30 from dwillmer/minor-typos
Minor typos and grammaticals
2 parents e2e282f + f73ef79 commit 40960e9

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ With Azure Active Directory taking the full responsibility of verifying user's r
3030
### What to validate
3131
While you should always validate tokens issued to the resources (audience) that you are developing, your application will also obtain access tokens for other resources from AAD. AAD will provide an access token in whatever token format that is appropriate to that resource.
3232
This access token itself should be treated like an opaque blob by your application, as your app isn’t the access token’s intended audience and thus your app should not bother itself with looking into the contents of this access token.
33-
Your app should just pass it in the call to the resource. It's the called resource's responsibility to validate this access token token.
33+
Your app should just pass it in the call to the resource. It's the called resource's responsibility to validate this access token.
3434

3535
### Validating the claims
3636

@@ -41,7 +41,7 @@ When an application receives an access token upon user sign-in, it should also p
4141
- **issuer** claim, to verify that the token was issued to your app by the v2.0 endpoint
4242
- **nonce**, as a token replay attack mitigation
4343

44-
You are advised to use standard library methods like [JwtSecurityTokenHandler.ValidateToken Method (JwtSecurityToken)](https://msdn.microsoft.com/en-us/library/dn451163(v=vs.114).aspx) to do most of the aforementioned heavy lifting. You can further extend the validation process by making decisions based on claims received in the token. For example, multi-tenant applications can extend the standard validation by inspecting value of the ``tid`` claim (Tenant ID) against a set of pre-selected tenants to ensure they only honor token from tenants of their choice. Details on the claims provided in JWT tokens are listed in the [Azure AD token reference](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-token-and-claims). When you debug your application and want to understand the claims held by the token, you might find it useful to use the [JWT token inspector](https://jwt.ms) tool.
44+
You are advised to use standard library methods like [JwtSecurityTokenHandler.ValidateToken Method (JwtSecurityToken)](https://msdn.microsoft.com/en-us/library/dn451163(v=vs.114).aspx) to do most of the aforementioned heavy lifting. You can further extend the validation process by making decisions based on claims received in the token. For example, multi-tenant applications can extend the standard validation by inspecting the value of the ``tid`` claim (Tenant ID) against a set of pre-selected tenants to ensure they only honor tokens from tenants of their choice. Details on the claims provided in JWT tokens are listed in the [Azure AD token reference](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-token-and-claims). When you debug your application and want to understand the claims held by the token, you might find it useful to use the [JWT token inspector](https://jwt.ms) tool.
4545

4646
> Looking for previous versions of this code sample? Check out the tags on the [releases](../../releases) GitHub page.
4747
@@ -62,7 +62,7 @@ From your shell or command line:
6262

6363
`git clone https://github.com/Azure-Samples/active-directory-dotnet-webapi-manual-jwt-validation.git`
6464

65-
> Given that the name of the sample is pretty long, and so are the name of the referenced NuGet pacakges, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
65+
> Given that the name of the sample is pretty long, and so are the name of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
6666
6767
### Step 2: Register the sample with your Azure Active Directory tenant
6868

@@ -177,7 +177,7 @@ First, in Visual Studio 2017 create an empty solution to host the projects. The
177177
3. Add assembly references to `System.Net.Http`, `System.Web.Extensions`, and `System.Configuration`.
178178
4. Add a new class to the project called `TodoItem.cs`. Copy the code from the sample project file of the same name into this class, completely replacing the code in the file in the new project.
179179
5. Add a new class to the project called `FileCache.cs`. Copy the code from the sample project file of the same name into this class, completely replacing the code in the file in the new project.
180-
6. Copy the markup from `MainWindow.xaml' in the sample project into the file of the same name in the new project, completely replacing the markup in the file in the new project.
180+
6. Copy the markup from `MainWindow.xaml` in the sample project into the file of the same name in the new project, completely replacing the markup in the file in the new project.
181181
7. Copy the code from `MainWindow.xaml.cs` in the sample project into the file of the same name in the new project, completely replacing the code in the file in the new project.
182182
8. In `app.config` create keys for `ida:AADInstance`, `ida:Tenant`, `ida:ClientId`, `ida:RedirectUri`, `todo:TodoListResourceId`, and `todo:TodoListBaseAddress` and set them accordingly. For the global Azure cloud, the value of `ida:AADInstance` is `https://login.microsoftonline.com/{0}`.
183183

0 commit comments

Comments
 (0)