You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Write-Host-ForegroundColor Green "------------------------------------------------------------------------------------------------"
344
344
Write-Host"IMPORTANT: Please follow the instructions below to complete a few manual step(s) in the Azure portal":
345
345
Write-Host"- For 'service'"
346
346
Write-Host" - Navigate to '$servicePortalUrl'"
347
347
Write-Host" - Navigate to the Authentication blade, click 'Add a platform' then check the option https://login.microsoftonline.com/common/oauth2/nativeclient"-ForegroundColor Red
348
+
Write-Host" - Navigate to the Expose an API blade and change the Application ID URI to use the https pattern. i.e. https://<tenant_domain>/<app_name>"-ForegroundColor Red
348
349
Write-Host" - Navigate to the Manifest page and change 'signInAudience' to 'AzureADandPersonalMicrosoftAccount'."-ForegroundColor Red
349
350
Write-Host" - Navigate to the Manifest page and change 'accessTokenAcceptedVersion' to 2."-ForegroundColor Red
350
351
Write-Host" - [Optional] If you are a tenant admin, you can navigate to the API Permisions page and select 'Grant admin consent for (your tenant)'"-ForegroundColor Red
Copy file name to clipboardExpand all lines: 3.-Web-api-call-Microsoft-graph-for-personal-accounts/AppCreationScripts/sample.json
+4-1Lines changed: 4 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,9 @@
32
32
{
33
33
"Comment": "Navigate to the Authentication blade, click 'Add a platform' then check the option https://login.microsoftonline.com/common/oauth2/nativeclient"
34
34
},
35
+
{
36
+
"Comment": "Navigate to the Expose an API blade and change the Application ID URI to use the https pattern. i.e. https://<tenant_domain>/<app_name>"
37
+
},
35
38
{
36
39
"Comment": "Navigate to the Manifest page and change 'signInAudience' to 'AzureADandPersonalMicrosoftAccount'."
Copy file name to clipboardExpand all lines: 3.-Web-api-call-Microsoft-graph-for-personal-accounts/README.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ As a first step you'll need to:
127
127
it, users will be presented a consent screen enabling them to consent to using the web api.
128
128
1. Select the **Expose an API** section, and:
129
129
- Select **Add a scope**
130
-
-accept the proposed Application ID URI (api://{clientId}) by selecting**Save and Continue**
130
+
-Change the Application ID URI to the https pattern, [check AzureADandPersonalMicrosoftAccount restrictions](https://docs.microsoft.com/en-us/azure/active-directory/develop/supported-accounts-validation), (https://{tenant-domain}/{app-name}) and select**Save and Continue**.
131
131
- Enter the following parameters
132
132
- for **Scope name** use `access_as_user`
133
133
- Keep **Admins and users** for **Who can consent**
@@ -179,7 +179,7 @@ Note: if you used the setup scripts, the changes below will have been applied fo
179
179
180
180
1. In the *TodoListClient* project, open `App.config`.
181
181
1. Find the app key `ida:ClientId` and replace the value with the ApplicationID (Client ID) for the *TodoListClient-and-Service* app copied from the app registration page.
182
-
1.Find the app key `todo:TodoListScope`and replace the value with `<ClientId>/access_as_user`, i.e `986b487b-6dc0-492c-8b18-6224e35c5096/access_as_user`.
182
+
1.and replace the value with the scope of the TodoListClient-and-Service application copied from the app registration in the **Expose an API** tab, i.e `https://contoso.onmicrosoft.com/TodoListClient-and-Service/access_as_user`.
183
183
1.[Optional] If you changed the default URL for your service application, find the app key `todo:TodoListBaseAddress` and replace the value with the base address of the TodoListService project.
184
184
185
185
### Step 4: Run the sample
@@ -259,11 +259,12 @@ There is one change in the WebApp.Config, and one thing to check
259
259
<addkey="ida:Tenant"value="common"/>
260
260
```
261
261
262
-
- the thing to draw your attention to, is that you now have the same client ID (Application ID) for the client application and the service. This is not usually the case, which is why your attention is especially drawn here. Therefore the GUID used in `ida:ClientId` is the same as the one used in the Application ID URI for the service: `todo:TodoListScope`
262
+
- The thing to draw your attention to, is that you now have the same client ID (Application ID) for the client application and the service. This is not usually the case, which is why your attention is especially drawn here.
263
+
- The scope must use the https pattern, because of [AzureADandPersonalMicrosoftAccount restrictions](https://docs.microsoft.com/en-us/azure/active-directory/develop/supported-accounts-validation)
0 commit comments