You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ With Azure Active Directory taking the full responsibility of verifying user's r
30
30
### What to validate
31
31
While you should always validate tokens issued to the resources (audience) that you are developing, your application will also obtain access tokens for other resources from AAD. AAD will provide an access token in whatever token format that is appropriate to that resource.
32
32
This access token itself should be treated like an opaque blob by your application, as your app isn’t the access token’s intended audience and thus your app should not bother itself with looking into the contents of this access token.
33
-
Your app should just pass it in the call to the resource. It's the called resource's responsibility to validate this access token token.
33
+
Your app should just pass it in the call to the resource. It's the called resource's responsibility to validate this access token.
34
34
35
35
### Validating the claims
36
36
@@ -41,7 +41,7 @@ When an application receives an access token upon user sign-in, it should also p
41
41
-**issuer** claim, to verify that the token was issued to your app by the v2.0 endpoint
42
42
-**nonce**, as a token replay attack mitigation
43
43
44
-
You are advised to use standard library methods like [JwtSecurityTokenHandler.ValidateToken Method (JwtSecurityToken)](https://msdn.microsoft.com/en-us/library/dn451163(v=vs.114).aspx) to do most of the aforementioned heavy lifting. You can further extend the validation process by making decisions based on claims received in the token. For example, multi-tenant applications can extend the standard validation by inspecting value of the ``tid`` claim (Tenant ID) against a set of pre-selected tenants to ensure they only honor token from tenants of their choice. Details on the claims provided in JWT tokens are listed in the [Azure AD token reference](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-token-and-claims). When you debug your application and want to understand the claims held by the token, you might find it useful to use the [JWT token inspector](https://jwt.ms) tool.
44
+
You are advised to use standard library methods like [JwtSecurityTokenHandler.ValidateToken Method (JwtSecurityToken)](https://msdn.microsoft.com/en-us/library/dn451163(v=vs.114).aspx) to do most of the aforementioned heavy lifting. You can further extend the validation process by making decisions based on claims received in the token. For example, multi-tenant applications can extend the standard validation by inspecting the value of the ``tid`` claim (Tenant ID) against a set of pre-selected tenants to ensure they only honor tokens from tenants of their choice. Details on the claims provided in JWT tokens are listed in the [Azure AD token reference](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-token-and-claims). When you debug your application and want to understand the claims held by the token, you might find it useful to use the [JWT token inspector](https://jwt.ms) tool.
45
45
46
46
> Looking for previous versions of this code sample? Check out the tags on the [releases](../../releases) GitHub page.
47
47
@@ -62,7 +62,7 @@ From your shell or command line:
> Given that the name of the sample is pretty long, and so are the name of the referenced NuGet pacakges, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
65
+
> Given that the name of the sample is pretty long, and so are the name of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
66
66
67
67
### Step 2: Register the sample with your Azure Active Directory tenant
68
68
@@ -177,7 +177,7 @@ First, in Visual Studio 2017 create an empty solution to host the projects. The
177
177
3. Addassemblyreferencesto `System.Net.Http`, `System.Web.Extensions`, and `System.Configuration`.
178
178
4. Addanewclassto the project called `TodoItem.cs`. Copy the code from the sample project file of the same name into this class, completely replacing the code in the file in the new project.
179
179
5. Add a new class to the project called `FileCache.cs`. Copy the code from the sample project file of the same name into this class, completely replacing the code in the file in the new project.
180
-
6. Copy the markup from `MainWindow.xaml' in the sample project into the file of the same name in the new project, completely replacing the markup in the file in the new project.
180
+
6. Copy the markup from `MainWindow.xaml` in the sample project into the file of the same name in the new project, completely replacing the markup in the file in the new project.
181
181
7. Copy the code from `MainWindow.xaml.cs` in the sample project into the file of the same name in the new project, completely replacing the code in the file in the new project.
182
182
8. In `app.config` create keys for `ida:AADInstance`, `ida:Tenant`, `ida:ClientId`, `ida:RedirectUri`, `todo:TodoListResourceId`, and `todo:TodoListBaseAddress` andsetthemaccordingly. FortheglobalAzurecloud, thevalueof `ida:AADInstance` is `https://login.microsoftonline.com/{0}`.
0 commit comments