You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 17, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: 3-Authorization-II/2-call-api-b2c/README-incremental.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ This sample demonstrates an Angular single-page application (SPA) calling a ASP.
39
39
40
40
```console
41
41
cd ms-identity-javascript-angular-tutorial
42
-
cd 3-Authorization-II/2-call-api-b2c/API
42
+
cd 3-Authorization-II/2-call-api-b2c/API/TodoListAPI
43
43
dotnet restore
44
44
```
45
45
@@ -88,7 +88,7 @@ The first thing that we need to do is to declare the unique [resource](https://d
88
88
- For this sample, accept the proposed Application ID URI (`https://{tenantName}.onmicrosoft.com/{clientId}`) by selecting **Save**.
89
89
1. All APIs have to publish a minimum of one [scope](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
90
90
- Select **Add a scope** button open the **Add a scope** screen and Enter the values as indicated below:
91
-
- For **Scope name**, use `access_as_user`.
91
+
- For **Scope name**, use `demo.read`.
92
92
- For **Admin consent display name** type `Access msal-dotnet-api`.
93
93
- For **Admin consent description** type `Allows the app to access msal-dotnet-api as the signed-in user.`
94
94
- Keep **State** as **Enabled**.
@@ -104,9 +104,9 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
104
104
> In the steps below, "ClientID" is the same as "Application ID" or "AppId".
105
105
106
106
1. Open the `API\appsettings.json` file.
107
-
1. Find the key `Instance` and replace the existing value with your Azure AD B2C tenant name.
107
+
1. Find the key `Instance` and replace the existing value with your Azure AD B2C tenant name e.g.`https://{tenantName}.b2clogin.com`.
108
108
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of `msal-dotnet-api` app copied from the Azure portal.
109
-
1. Find the key `Domain` and replace the existing value with your Azure AD B2C tenant name.
109
+
1. Find the key `Domain` and replace the existing value with your Azure AD B2C tenant name e.g.`{tenantName}.onmicrosoft.com`
110
110
111
111
1. Find the key `SignUpSignInPolicyId` and replace the existing value with your sign-up/sign-in user-flow string e.g. `b2c_1_susi`.
112
112
1. Find the key `EditProfilePolicyId` and replace the existing value with your profile-edit user-flow string e.g. `b2c_1_edit`.
@@ -141,7 +141,7 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
141
141
142
142
1. Open the `SPA\src\app\auth-config.ts` file.
143
143
1. Find the key `clientId` and replace the existing value with the application ID (clientId) of `msal-angular-spa` app copied from the Azure portal.
144
-
1. Find the key `protectedResources.todoListApi.scopes` and replace the existing value with the scope of the web API that you have just exposed during the web API registration steps, for example `https://{tenantName}.onmicrosoft.com/{service_clientId}/access_as_user`
144
+
1. Find the key `protectedResources.todoListApi.scopes` and replace the existing value with the scope of the web API that you have just exposed during the web API registration steps, for example `https://{tenantName}.onmicrosoft.com/{service_clientId}/demo.read`
145
145
146
146
To setup your B2C user-flows, do the following:
147
147
@@ -161,7 +161,7 @@ Using a command line interface such as VS Code integrated terminal, locate the a
161
161
In a separate console window, execute the following commands:
Copy file name to clipboardExpand all lines: 3-Authorization-II/2-call-api-b2c/README.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ or download and extract the repository .zip file.
55
55
56
56
```console
57
57
cd ms-identity-javascript-angular-tutorial
58
-
cd 3-Authorization-II/2-call-api-b2c/API
58
+
cd 3-Authorization-II/2-call-api-b2c/API/TodoListAPI
59
59
dotnet restore
60
60
```
61
61
@@ -111,7 +111,7 @@ The first thing that we need to do is to declare the unique [resource](https://d
111
111
- For this sample, accept the proposed Application ID URI (`https://{tenantName}.onmicrosoft.com/{clientId}`) by selecting **Save**.
112
112
1. All APIs have to publish a minimum of one [scope](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
113
113
- Select **Add a scope** button open the **Add a scope** screen and Enter the values as indicated below:
114
-
- For **Scope name**, use `access_as_user`.
114
+
- For **Scope name**, use `demo.read`.
115
115
- For **Admin consent display name** type `Access msal-dotnet-api`.
116
116
- For **Admin consent description** type `Allows the app to access msal-dotnet-api as the signed-in user.`
117
117
- Keep **State** as **Enabled**.
@@ -127,9 +127,9 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
127
127
> In the steps below, "ClientID" is the same as "Application ID" or "AppId".
128
128
129
129
1. Open the `API\appsettings.json` file.
130
-
1. Find the key `Instance` and replace the existing value with your Azure AD B2C tenant name.
130
+
1. Find the key `Instance` and replace the existing value with your Azure AD B2C tenant name e.g.`https://{tenantName}.b2clogin.com`.
131
131
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of `msal-dotnet-api` app copied from the Azure portal.
132
-
1. Find the key `Domain` and replace the existing value with your Azure AD B2C tenant name.
132
+
1. Find the key `Domain` and replace the existing value with your Azure AD B2C tenant name e.g.`{tenantName}.onmicrosoft.com`
133
133
134
134
1. Find the key `SignUpSignInPolicyId` and replace the existing value with your sign-up/sign-in user-flow string e.g. `b2c_1_susi`.
135
135
1. Find the key `EditProfilePolicyId` and replace the existing value with your profile-edit user-flow string e.g. `b2c_1_edit`.
@@ -164,7 +164,7 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
164
164
165
165
1. Open the `SPA\src\app\auth-config.ts` file.
166
166
1. Find the key `clientId` and replace the existing value with the application ID (clientId) of `msal-angular-spa` app copied from the Azure portal.
167
-
1. Find the key `protectedResources.todoListApi.scopes` and replace the existing value with the scope of the web API that you have just exposed during the web API registration steps, for example `https://{tenantName}.onmicrosoft.com/{service_clientId}/access_as_user`
167
+
1. Find the key `protectedResources.todoListApi.scopes` and replace the existing value with the scope of the web API that you have just exposed during the web API registration steps, for example `https://{tenantName}.onmicrosoft.com/{service_clientId}/demo.read`
168
168
169
169
To setup your B2C user-flows, do the following:
170
170
@@ -184,7 +184,7 @@ Using a command line interface such as VS Code integrated terminal, locate the a
184
184
In a separate console window, execute the following commands:
0 commit comments