Skip to content

Commit 6a1845c

Browse files
committed
fix readme indentation
1 parent b767e6b commit 6a1845c

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

5-AccessControl/2-call-api-groups/README.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
page_type: sample
3-
level: 300
43
languages:
54
- typescript
65
- csharp
@@ -172,7 +171,7 @@ To manually register the apps, as a first step you'll need to:
172171
1. The generated key value will be displayed when you select the **Add** button. Copy and save the generated value for use in later steps.
173172
1. You'll need this key later in your code's configuration files. This key value will not be displayed again, and is not retrievable by any other means, so make sure to note it from the Azure portal before navigating to any other screen or blade.
174173
> :bulb: For enhanced security, instead of using client secrets, consider [using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Certificates) and [Azure KeyVault](https://azure.microsoft.com/services/key-vault/#product-overview).
175-
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can publish the permission as an API for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for. The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this API. To declare an resource URI(Application ID URI), follow the following steps:
174+
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can publish the permission as an API for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for. The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this API. To declare an resource URI(Application ID URI), follow the following steps:
176175
1. Select **Set** next to the **Application ID URI** to generate a URI that is unique for this app.
177176
1. For this sample, accept the proposed Application ID URI (`api://{clientId}`) by selecting **Save**. Read more about Application ID URI at [Validation differences by supported account types \(signInAudience\)](https://docs.microsoft.com/azure/active-directory/develop/supported-accounts-validation).
178177
@@ -201,16 +200,18 @@ To manually register the apps, as a first step you'll need to:
201200
1. Select the **Add a permission** button and then:
202201
1. Ensure that the **My APIs** tab is selected.
203202
1. In the list of APIs, select the API `msal-angular-app`.
204-
* Since this app signs-in users, we will now proceed to select **delegated permissions**, which is is requested by apps when signing-in users.
205-
1. In the **Delegated permissions** section, select **access_via_group_assignments** in the list. Use the search box if necessary.
203+
1. Select **delegated permissions**, which is is requested by apps when signing-in users.
204+
1. In the **Delegated permissions** section, select **access_via_group_assignments** in the list. Use the search box if necessary.
206205
1. Select the **Add permissions** button at the bottom.
207206
1. Select the **Add a permission** button and then:
208207
1. Ensure that the **Microsoft APIs** tab is selected.
209208
1. In the *Commonly used Microsoft APIs* section, select **Microsoft Graph**
210-
* Since this app signs-in users, we will now proceed to select **delegated permissions**, which is is requested by apps when signing-in users.
211-
1. In the **Delegated permissions** section, select **User.Read**, **GroupMember.Read.All** in the list. Use the search box if necessary.
209+
1. Select **delegated permissions**, which is is requested by apps when signing-in users.
210+
1. In the **Delegated permissions** section, select **User.Read**, **GroupMember.Read.All** in the list. Use the search box if necessary.
212211
1. Select the **Add permissions** button at the bottom.
213212
213+
> :warning: For the overage scenario, make sure you have granted **Admin Consent** for the MS Graph API's **GroupMember.Read.All** scope (see the **App Registration** steps above).
214+
214215
##### Configure Optional Claims
215216
216217
1. Still on the same app registration, select the **Token configuration** blade to the left.

0 commit comments

Comments
 (0)