diff --git a/1-WebApp-OIDC/1-1-MyOrg/README.md b/1-WebApp-OIDC/1-1-MyOrg/README.md index a1a029c7..6e26c043 100644 --- a/1-WebApp-OIDC/1-1-MyOrg/README.md +++ b/1-WebApp-OIDC/1-1-MyOrg/README.md @@ -98,7 +98,7 @@ As a first step you'll need to: - `https://localhost:44321/signin-oidc` - In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc` - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user.
Expand/collapse screenshot diff --git a/1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md b/1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md index 9e6c30f6..fe036362 100644 --- a/1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md +++ b/1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md @@ -93,7 +93,7 @@ As a first step you'll need to: - `https://localhost:44321/signin-oidc` - In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc` - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user. 1. Select **Save**. diff --git a/1-WebApp-OIDC/1-4-Sovereign/README.md b/1-WebApp-OIDC/1-4-Sovereign/README.md index 400a002b..7e6735ff 100644 --- a/1-WebApp-OIDC/1-4-Sovereign/README.md +++ b/1-WebApp-OIDC/1-4-Sovereign/README.md @@ -77,7 +77,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign" 1. In the list of pages for the app, select **Authentication**. - In the **Redirect URIs**, add a redirect URL of type Web and valued `https://localhost:44321/signin-oidc` - In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc` - - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to sign in the user. + - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign in the user. - Select **Save**. > Note that unless the Web App calls a Web API no certificate or secret is needed. diff --git a/2-WebApp-graph-user/2-2-TokenCache/README.md b/2-WebApp-graph-user/2-2-TokenCache/README.md index 94de5609..95617fc5 100644 --- a/2-WebApp-graph-user/2-2-TokenCache/README.md +++ b/2-WebApp-graph-user/2-2-TokenCache/README.md @@ -102,7 +102,7 @@ As a first step you'll need to: - `https://localhost:44321/signin-oidc` - In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc` - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user, and call an API. 1. Select **Save**. 1. From the **Certificates & secrets** page, in the **Client secrets** section, choose **New client secret**: diff --git a/2-WebApp-graph-user/2-3-Multi-Tenant/README.md b/2-WebApp-graph-user/2-3-Multi-Tenant/README.md index 465888c8..27e02e9d 100644 --- a/2-WebApp-graph-user/2-3-Multi-Tenant/README.md +++ b/2-WebApp-graph-user/2-3-Multi-Tenant/README.md @@ -135,7 +135,9 @@ As a first step you'll need to: - `https://localhost:44321/signin-oidc` - `https://localhost:44321/Onboarding/ProcessCode` - In the **Advanced settings** section, set **Logout URL** to `https://localhost:44321/signout-oidc`. - - In the **Advanced settings** | **Implicit grant** section, check the **ID tokens** option as the [AspNetCore security middleware](https://github.com/aspnet/AspNetCore/tree/master/src/Security) used in the sample uses the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) by default to get the user info right after sign-in. + - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to + sign-in the user. 1. Click the **Save** button on top to save the changes. 1. In the app's registration screen, click on the **Certificates & secrets** blade in the left to open the page where we can generate secrets and upload certificates. diff --git a/4-WebApp-your-API/4-1-MyOrg/README.md b/4-WebApp-your-API/4-1-MyOrg/README.md index fd154098..7dd3db01 100644 --- a/4-WebApp-your-API/4-1-MyOrg/README.md +++ b/4-WebApp-your-API/4-1-MyOrg/README.md @@ -148,7 +148,7 @@ As a first step you'll need to: - `https://localhost:44321/signin-oidc` - In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc` - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user, and call an API. 1. Select **Save**. 1. From the **Certificates & secrets** page, in the **Client secrets** section, choose **New client secret**: diff --git a/5-WebApp-AuthZ/5-1-Roles/README.md b/5-WebApp-AuthZ/5-1-Roles/README.md index 4e2a36e7..38b0dc1d 100644 --- a/5-WebApp-AuthZ/5-1-Roles/README.md +++ b/5-WebApp-AuthZ/5-1-Roles/README.md @@ -137,8 +137,8 @@ As a first step you'll need to: - `https://localhost:44321/` - `https://localhost:44321/signin-oidc` - In the **Advanced settings** section, set **Logout URL** to `https://localhost:44321/signout-oidc`. - - In the **Advanced settings** | **Implicit grant** section, check the **ID tokens** option as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user, and call an API. 1. Click the **Save** button on top to save the changes. diff --git a/5-WebApp-AuthZ/5-2-Groups/README.md b/5-WebApp-AuthZ/5-2-Groups/README.md index 52b330a9..bd8c93f4 100644 --- a/5-WebApp-AuthZ/5-2-Groups/README.md +++ b/5-WebApp-AuthZ/5-2-Groups/README.md @@ -128,8 +128,8 @@ As a first step you'll need to: - In the **Redirect URIs** section, enter the following redirect URIs. - `https://localhost:44321/signin-oidc` - In the **Logout URL** section, set it to `https://localhost:44321/signout-oidc`. - - In the **Implicit grant** section, check the **ID tokens** option as this sample requires - the [Implicit grant flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to + - In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires + the [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) to be enabled to sign-in the user, and call an API. 1. Select **Save** to save your changes.