Skip to content

Commit 80ae6fd

Browse files
author
Tiago Brenck
authored
Fixed Readmes (#361)
1 parent 1f57dc2 commit 80ae6fd

File tree

8 files changed

+12
-10
lines changed

8 files changed

+12
-10
lines changed

1-WebApp-OIDC/1-1-MyOrg/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ As a first step you'll need to:
9898
- `https://localhost:44321/signin-oidc`
9999
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
100100
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
101-
the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
101+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
102102
sign-in the user.
103103
<details open=true>
104104
<summary>Expand/collapse screenshot</summary>

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ As a first step you'll need to:
9393
- `https://localhost:44321/signin-oidc`
9494
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
9595
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
96-
the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
96+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
9797
sign-in the user.
9898
1. Select **Save**.
9999

1-WebApp-OIDC/1-4-Sovereign/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
7777
1. In the list of pages for the app, select **Authentication**.
7878
- In the **Redirect URIs**, add a redirect URL of type Web and valued `https://localhost:44321/signin-oidc`
7979
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
80-
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to sign in the user.
80+
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign in the user.
8181
- Select **Save**.
8282

8383
> Note that unless the Web App calls a Web API no certificate or secret is needed.

2-WebApp-graph-user/2-2-TokenCache/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ As a first step you'll need to:
102102
- `https://localhost:44321/signin-oidc`
103103
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
104104
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
105-
the [Implicit grant flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
105+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
106106
sign-in the user, and call an API.
107107
1. Select **Save**.
108108
1. From the **Certificates & secrets** page, in the **Client secrets** section, choose **New client secret**:

2-WebApp-graph-user/2-3-Multi-Tenant/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,9 @@ As a first step you'll need to:
156156
- `https://localhost:44321/signin-oidc`
157157
- `https://localhost:44321/Onboarding/ProcessCode`
158158
- In the **Advanced settings** section, set **Logout URL** to `https://localhost:44321/signout-oidc`.
159-
- In the **Advanced settings** | **Implicit grant** section, check the **ID tokens** option as the [AspNetCore security middleware](https://github.com/aspnet/AspNetCore/tree/master/src/Security) used in the sample uses the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) by default to get the user info right after sign-in.
159+
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
160+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
161+
sign-in the user.
160162

161163
1. Click the **Save** button on top to save the changes.
162164
1. In the app's registration screen, click on the **Certificates & secrets** blade in the left to open the page where we can generate secrets and upload certificates.

4-WebApp-your-API/4-1-MyOrg/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ As a first step you'll need to:
148148
- `https://localhost:44321/signin-oidc`
149149
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
150150
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
151-
the [Implicit grant flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
151+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
152152
sign-in the user, and call an API.
153153
1. Select **Save**.
154154
1. From the **Certificates & secrets** page, in the **Client secrets** section, choose **New client secret**:

5-WebApp-AuthZ/5-1-Roles/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,8 +137,8 @@ As a first step you'll need to:
137137
- `https://localhost:44321/`
138138
- `https://localhost:44321/signin-oidc`
139139
- In the **Advanced settings** section, set **Logout URL** to `https://localhost:44321/signout-oidc`.
140-
- In the **Advanced settings** | **Implicit grant** section, check the **ID tokens** option as this sample requires
141-
the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
140+
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
141+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
142142
sign-in the user, and call an API.
143143

144144
1. Click the **Save** button on top to save the changes.

5-WebApp-AuthZ/5-2-Groups/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,8 +128,8 @@ As a first step you'll need to:
128128
- In the **Redirect URIs** section, enter the following redirect URIs.
129129
- `https://localhost:44321/signin-oidc`
130130
- In the **Logout URL** section, set it to `https://localhost:44321/signout-oidc`.
131-
- In the **Implicit grant** section, check the **ID tokens** option as this sample requires
132-
the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
131+
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
132+
the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to
133133
sign-in the user, and call an API.
134134

135135
1. Select **Save** to save your changes.

0 commit comments

Comments
 (0)