Skip to content

Commit 52f6658

Browse files
committed
update readme
1 parent 1902bb3 commit 52f6658

File tree

2 files changed

+26
-14
lines changed

2 files changed

+26
-14
lines changed

3-Authorization-II/2-call-api-b2c/README-incremental.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11

22
# Angular single-page application that authenticates users with Azure AD B2C and calls a protected .NET Core web API
33

4-
1. [Overview](#overview)
5-
1. [Scenario](#scenario)
6-
1. [Contents](#contents)
7-
1. [Setup](#setup)
8-
1. [Registration](#registration)
9-
1. [Running the sample](#running-the-sample)
10-
1. [Explore the sample](#explore-the-sample)
11-
1. [About the code](#about-the-code)
12-
1. [More information](#more-information)
13-
1. [Community Help and Support](#community-help-and-support)
14-
1. [Contributing](#contributing)
4+
* [Overview](#overview)
5+
* [Scenario](#scenario)
6+
* [Prerequisites](#prerequisites)
7+
* [Explore the sample](#explore-the-sample)
8+
* [Troubleshooting](#troubleshooting)
9+
* [About the code](#about-the-code)
10+
* [Next Steps](#next-steps)
11+
* [Contributing](#contributing)
1512

1613
## Overview
1714

1815
This sample demonstrates an Angular single-page application (SPA) calling a ASP.NET Core web API secured with [Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/overview) using the [Microsoft Authentication Library for Angular](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular) (MSAL Angular) for the SPA and the [Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-identity-web) (M.I.W) for the web API.
1916

17+
> :information_source: See the community call: [Deep dive on using MSAL.js to integrate Angular single-page applications with Azure Active Directory](https://www.youtube.com/watch?v=EJey9KP1dZA)
18+
2019
## Scenario
2120

22-
1. The client Angular SPA uses **MSAL Angular** to sign-in and obtain a JWT access token from **Azure AD B2C**.
23-
2. The access token is used as a bearer token to authorize the user to call the .NET Core web API protected by **Azure AD B2C**.
21+
1. The client Angular SPA uses [MSAL Angular](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular) to sign-in a user and obtain a JWT [Access Token](https://aka.ms/access-tokens) from **Azure AD B2C**.
22+
1. The access token is used as a *bearer* token to authorize the user to call the .NET Core web API protected by **Azure AD B2C**.
23+
1. The service uses the [Microsoft.Identity.Web](https://aka.ms/microsoft-identity-web) to protect the Web api, check permissions and validate tokens.
2424

25-
![Overview](./ReadmeFiles/topology.png)
25+
![Scenario Image](./ReadmeFiles/topology.png)
2626

2727
## Contents
2828

3-Authorization-II/2-call-api-b2c/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,12 +46,24 @@ This sample demonstrates an Angular single-page application (SPA) calling a ASP.
4646

4747
![Scenario Image](./ReadmeFiles/topology.png)
4848

49+
## Contents
50+
51+
| File/folder | Description |
52+
|-------------------------------------|------------------------------------------------------------|
53+
| `SPA/src/app/auth-config.ts` | Authentication parameters for SPA project reside here. |
54+
| `SPA/src/app/app.module.ts` | MSAL Angular is initialized here. |
55+
| `API/TodoListAPI/appsettings.json` | Authentication parameters for API project reside here. |
56+
| `API/TodoListAPI/Startup.cs` | Microsoft.Identity.Web is initialized here. |
57+
| `API/TodoListAPI/Controllers/TodoListController.cs` | Contains logic for controlling access to data. |
58+
4959
## Prerequisites
5060

5161
* Either [Visual Studio](https://visualstudio.microsoft.com/downloads/) or [Visual Studio Code](https://code.visualstudio.com/download) and [.NET Core SDK](https://www.microsoft.com/net/learn/get-started)
5262
* An **Azure AD B2C** tenant. For more information, see: [How to get an Azure AD B2C tenant](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant)
5363
* A user account in your **Azure AD B2C** tenant.## Setup the sample
5464

65+
## Setup the sample
66+
5567
### Step 1: Clone or download this repository
5668

5769
From your shell or command line:

0 commit comments

Comments
 (0)