Skip to content

Commit af60e87

Browse files
committedJan 11, 2024
Entra Rebrand
1 parent 654f149 commit af60e87

File tree

11 files changed

+107
-107
lines changed

11 files changed

+107
-107
lines changed
 

‎.github/PULL_REQUEST_TEMPLATE.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ Verify that the following are valid
4242
* ...
4343

4444
## Other Information
45-
<!-- Add any other helpful information that may be needed here. -->
45+
<!-- Add any other helpful information that may be needed here. -->

‎1-Call-MSGraph/AppCreationScripts/AppCreationScripts.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
### Quick summary
66

7-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
7+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
88

99
```PowerShell
1010
cd .\AppCreationScripts\
@@ -28,23 +28,23 @@
2828

2929
### Presentation of the scripts
3030

31-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
31+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
3232

3333
These scripts are:
3434

3535
- `Configure.ps1` which:
36-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
3737
- changes the configuration files in the sample projects.
38-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
38+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
3939
- the identifier of the application
4040
- the AppId of the application
41-
- the url of its registration in the [Azure portal](https://portal.azure.com).
41+
- the url of its registration in the [Microsoft Entra admin center](https://portal.azure.com).
4242

43-
- `Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
43+
- `Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
4444

4545
### Usage pattern for tests and DevOps scenarios
4646

47-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
47+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
4848

4949
## How to use the app creation scripts?
5050

@@ -107,8 +107,8 @@ Note that the script will choose the tenant in which to create the applications,
107107
108108
if you want to create the apps in a particular tenant, you can use the following option:
109109
110-
- Open the [Azure portal](https://portal.azure.com)
111-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
110+
- Open the [Microsoft Entra admin center](https://portal.azure.com)
111+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
112112
- Find the "Active Directory" object in this tenant
113113
- Go to **Properties** and copy the content of the **Directory Id** property
114114
- Then use the full syntax to run the scripts:

‎1-Call-MSGraph/README.md

+25-25
Original file line numberDiff line numberDiff line change
@@ -3,29 +3,29 @@ topic: sample
33
languages:
44
- csharp
55
products:
6-
- azure-active-directory
6+
- microsoft-entra-id
77
- dotnet
88
- office-ms-graph
99
description: "Shows how a daemon console app uses MSAL.NET to get an access token and call Microsoft Graph."
1010
---
1111

1212
# A .NET Core daemon console application calling Microsoft Graph with its own identity
1313

14-
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
14+
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/aad%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
1515

1616
## About this sample
1717

1818
### Overview
1919

2020
This sample application shows how to use the [Microsoft identity platform](https://aka.ms/identityplatform) to access the data of Microsoft business customers in [Microsoft Graph](https://aka.ms/msgraph) in a long-running, non-interactive process. It uses the [OAuth 2 client credentials grant](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow) to acquire an [Access Tokens](https://aka.ms/access-tokens), which is then used to call the [Microsoft Graph](https://graph.microsoft.io) API and access organizational data.
2121

22-
The app is a .NET Core Console application. It gets the list of users in an Azure AD tenant by using the Microsoft Authentication Library for .NET ([MSAL.NET](https://aka.ms/msal-net)) to authenticate and acquire a token.
22+
The app is a .NET Core Console application. It gets the list of users in a Microsoft Entra tenant by using the Microsoft Authentication Library for .NET ([MSAL.NET](https://aka.ms/msal-net)) to authenticate and acquire a token.
2323

2424
## Scenario
2525

2626
The console application:
2727

28-
- gets a token from Azure AD for itself (without a user)
28+
- gets a token from Microsoft Entra ID for itself (without a user)
2929
- and then calls the Microsoft Graph `/users` endpoint to get the list of users, which it then displays on the screen
3030

3131
![Topology](./ReadmeFiles/topology.png)
@@ -34,7 +34,7 @@ For more information on the concepts used in this sample, be sure to read the [S
3434

3535
- Developers who wish to gain good familiarity of programming with Microsoft Graph are advised to go through the [An introduction to Microsoft Graph for developers](https://www.youtube.com/watch?v=EBbnpFdB92A) recorded session.
3636

37-
> ### Daemon applications can use two forms of credentials to authenticate themselves with Azure AD:
37+
> ### Daemon applications can use two forms of credentials to authenticate themselves with Microsoft Entra ID:
3838
>
3939
> - **Client secrets** (also called application password).
4040
> - **Certificates**.
@@ -51,7 +51,7 @@ To run this sample, you'll need:
5151
- A Windows machine (necessary if you want to run the app on Windows)
5252
- An OS X machine (necessary if you want to run the app on Mac)
5353
- A Linux machine (necessary if you want to run the app on Linux)
54-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
54+
- a Microsoft Entra tenant. For more information on how to get a Microsoft Entra tenant, see [How to get a Microsoft Entra tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
5555

5656
### Step 1: Clone or download this repository
5757

@@ -72,13 +72,13 @@ Navigate to the `"1-Call-MSGraph"` folder
7272
cd "1-Call-MSGraph"
7373
```
7474

75-
### Step 2: Register the sample with your Azure Active Directory tenant
75+
### Step 2: Register the sample with your Microsoft Entra tenant
7676

7777
There is one project in this sample. To register it, you can:
7878

79-
- either follow the steps [Step 2: Register the sample with your Azure Active Directory tenant](#step-2-register-the-sample-with-your-azure-active-directory-tenant) and [Step 3: Configure the sample to use your Azure AD tenant](#choose-the-azure-ad-tenant-where-you-want-to-create-your-applications)
79+
- either follow the steps [Step 2: Register the sample with your Microsoft Entra tenant](#step-2-register-the-sample-with-your-azure-active-directory-tenant) and [Step 3: Configure the sample to use your Microsoft Entra tenant](#choose-the-azure-ad-tenant-where-you-want-to-create-your-applications)
8080
- or use PowerShell scripts that:
81-
- **automatically** creates the Azure AD applications and related objects (passwords, permissions, dependencies) for you
81+
- **automatically** creates the Microsoft Entra applications and related objects (passwords, permissions, dependencies) for you
8282
- modify the Visual Studio projects' configuration files.
8383

8484
If you want to use this automation:
@@ -90,7 +90,7 @@ If you want to use this automation:
9090
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force
9191
```
9292

93-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
93+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
9494

9595
```PowerShell
9696
cd AppCreationScripts
@@ -103,13 +103,13 @@ If you want to use this automation:
103103

104104
If you don't want to use this automation, follow the steps below
105105

106-
#### Choose the Azure AD tenant where you want to create your applications
106+
#### Choose the Microsoft Entra tenant where you want to create your applications
107107

108108
As a first step you'll need to:
109109

110-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
111-
1. If your account is present in more than one Azure AD tenant, select `Directory + Subscription` at the top right corner in the menu on top of the page, and switch your portal session to the desired Azure AD tenant.
112-
1. In the left-hand navigation pane, select the **Azure Active Directory** service, and then select **App registrations**.
110+
1. Sign in to the [Microsoft Entra admin center](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
111+
1. If your account is present in more than one Microsoft Entra tenant, select `Directory + Subscription` at the top right corner in the menu on top of the page, and switch your portal session to the desired Microsoft Entra tenant.
112+
1. In the left-hand navigation pane, select the **Microsoft Entra ID** service, and then select **App registrations**.
113113

114114
#### Register the client app (daemon-console)
115115

@@ -125,7 +125,7 @@ As a first step you'll need to:
125125
- Select a key duration of either **In 1 year**, **In 2 years**, or **Never Expires**.
126126
- When you press the **Add** button, the key value will be displayed, copy, and save the value in a safe location.
127127
- You'll need this key later to configure the project in Visual Studio. This key value will not be displayed again, nor retrievable by any other means,
128-
so record it as soon as it is visible from the Azure portal.
128+
so record it as soon as it is visible from the Microsoft Entra admin center.
129129
1. In the list of pages for the app, select **API permissions**
130130
- Click the **Add a permission** button and then,
131131
- Ensure that the **Microsoft APIs** tab is selected
@@ -135,9 +135,9 @@ As a first step you'll need to:
135135

136136
1. At this stage permissions are assigned correctly but a daemon client app has no user interaction. Therefore no consent can be presented via a UI when the application is running. So the consent will need to be provided in the portal itself.
137137
Click the **Grant/revoke admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the requested permission.
138-
You need to be an Azure AD tenant admin to do this.
138+
You need to be a Microsoft Entra tenant admin to do this.
139139

140-
### Step 3: Configure the sample to use your Azure AD tenant
140+
### Step 3: Configure the sample to use your Microsoft Entra tenant
141141

142142
In the steps below, "ClientID" is the same as "Application ID" or "AppId".
143143

@@ -148,13 +148,13 @@ Open the solution in Visual Studio to configure the project
148148
> Note: if you used the setup scripts, the changes below will have been applied for you, with the exception of the national cloud specific steps.
149149
150150
1. Open the `daemon-console\appsettings.json` file.
151-
1. Find the app key `TenantId` and replace the existing value with your Azure AD tenant name.
152-
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `daemon-console` application copied from the Azure portal.
153-
1. Find the app key `ClientSecret` and replace the existing value with the key you saved during the creation of the `daemon-console` app, in the Azure portal.
151+
1. Find the app key `TenantId` and replace the existing value with your Microsoft Entra tenant name.
152+
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `daemon-console` application copied from the Microsoft Entra admin center.
153+
1. Find the app key `ClientSecret` and replace the existing value with the key you saved during the creation of the `daemon-console` app, in the Microsoft Entra admin center.
154154

155155
##### If you are connecting to a national cloud, then:
156156

157-
1. Change the instance to the correct Azure AD endpoint. [See this reference for a list of Azure AD endpoints.](https://docs.microsoft.com/graph/deployments#app-registration-and-token-service-root-endpoints).
157+
1. Change the instance to the correct Microsoft Entra ID endpoint. [See this reference for a list of Microsoft Entra ID endpoints.](https://docs.microsoft.com/graph/deployments#app-registration-and-token-service-root-endpoints).
158158
1. open the 'daemon-console\Program.cs' file and change the graph endpoint on lines in which there is a "graph.microsoft.com" reference. [See this reference for more info on which graph endpoint to use.](https://docs.microsoft.com/graph/deployments#microsoft-graph-and-graph-explorer-service-root-endpoints)
159159

160160
### Step 4: Run the sample
@@ -265,7 +265,7 @@ Content: {
265265

266266
## Variation: daemon application using client credentials with certificates
267267

268-
As we had explained earlier, daemon applications can use two types of credentials to authenticate themselves with Azure AD. In the following section we will discuss how to use a certificate instead of a client secret.
268+
As we had explained earlier, daemon applications can use two types of credentials to authenticate themselves with Microsoft Entra ID. In the following section we will discuss how to use a certificate instead of a client secret.
269269

270270
![Topology](./ReadmeFiles/topology-certificates.png)
271271

@@ -286,7 +286,7 @@ If you want to use the automation script:
286286
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force
287287
```
288288

289-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
289+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
290290

291291
```PowerShell
292292
.\AppCreationScripts-withCert\Configure.ps1
@@ -310,7 +310,7 @@ To complete this step, you will use the [New-SelfSignedCertificate]((https://doc
310310
311311
Alternatively you can use an existing certificate if you have one (just be sure to record its name for the next steps)
312312
313-
### Add the certificate for the daemon-console application in Azure AD
313+
### Add the certificate for the daemon-console application in Microsoft Entra ID
314314
315315
In the application registration blade for your application, in the **Certificates & secrets** page, in the **Certificates** section:
316316
@@ -382,7 +382,7 @@ It's also possible to get certificates from an [Azure Key Vault](https://docs.mi
382382

383383
#### Build and run
384384

385-
Build and run your project. You have the same output, but this time, your application is authenticated with Azure AD with the certificate instead of the application secret.
385+
Build and run your project. You have the same output, but this time, your application is authenticated with Microsoft Entra ID with the certificate instead of the application secret.
386386

387387
#### About the alternate code
388388

‎2-Call-OwnApi/AppCreationScripts/AppCreationScripts.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
### Quick summary
66

7-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
7+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
88

99
```PowerShell
1010
cd .\AppCreationScripts\
@@ -28,23 +28,23 @@
2828

2929
### Presentation of the scripts
3030

31-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
31+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
3232

3333
These scripts are:
3434

3535
- `Configure.ps1` which:
36-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
3737
- changes the configuration files in the sample projects.
38-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
38+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
3939
- the identifier of the application
4040
- the AppId of the application
41-
- the url of its registration in the [Azure portal](https://portal.azure.com).
41+
- the url of its registration in the [Microsoft Entra admin center](https://portal.azure.com).
4242

43-
- `Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
43+
- `Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, `git reset`).
4444

4545
### Usage pattern for tests and DevOps scenarios
4646

47-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
47+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
4848

4949
## How to use the app creation scripts?
5050

@@ -107,8 +107,8 @@ Note that the script will choose the tenant in which to create the applications,
107107
108108
if you want to create the apps in a particular tenant, you can use the following option:
109109
110-
- Open the [Azure portal](https://portal.azure.com)
111-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
110+
- Open the [Microsoft Entra admin center](https://portal.azure.com)
111+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
112112
- Find the "Active Directory" object in this tenant
113113
- Go to **Properties** and copy the content of the **Directory Id** property
114114
- Then use the full syntax to run the scripts:

‎2-Call-OwnApi/README.md

+28-28
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ topic: sample
33
languages:
44
- csharp
55
products:
6-
- azure-active-directory
6+
- microsoft-entra-id
77
- dotnet-core
88
- office-ms-graph
99
description: "Shows how a daemon console app uses MSAL.NET to get an access token and call a protected Web API."
1010
---
1111

1212
# A .NET Core daemon console application calling a protected Web API with its own identity
1313

14-
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
14+
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/aad%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
1515

1616
## About this sample
1717

@@ -25,14 +25,14 @@ The app is a .NET Core console application that gets the list of "ToDos" from `T
2525

2626
The console application:
2727

28-
- acquires an access token from Azure AD by authenticating as an application (no user interaction)
28+
- acquires an access token from Microsoft Entra ID by authenticating as an application (no user interaction)
2929
- and then calls the Web API `TodoList-WebApi` protected using [Microsoft.Identity.Web](https://aka.ms/microsoft-identity-web) to get the a list of ToDo's, and displays the result
3030

3131
![Topology](./ReadmeFiles/daemon-with-secret.svg)
3232

3333
For more information on the concepts used in this sample, be sure to read the [Scenario: Daemon application that calls web APIs](https://docs.microsoft.com/azure/active-directory/develop/scenario-daemon-overview).
3434

35-
> ### Daemon applications can use two forms of credentials to authenticate themselves with Azure AD:
35+
> ### Daemon applications can use two forms of credentials to authenticate themselves with Microsoft Entra ID:
3636
>
3737
> - **Client secrets** (also called application password).
3838
> - **Certificates**.
@@ -49,7 +49,7 @@ To run this sample, you'll need:
4949
- A Windows machine (necessary if you want to run the app on Windows)
5050
- An OS X machine (necessary if you want to run the app on Mac)
5151
- A Linux machine (necessary if you want to run the app on Linux)
52-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
52+
- a Microsoft Entra tenant. For more information on how to get a Microsoft Entra tenant, see [How to get a Microsoft Entra tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
5353

5454
### Step 1: Clone or download this repository
5555

@@ -69,13 +69,13 @@ Navigate to the `"2-Call-OwnApi"` folder
6969
cd "2-Call-OwnApi"
7070
```
7171

72-
### Step 2: Register the sample with your Azure Active Directory tenant
72+
### Step 2: Register the sample with your Microsoft Entra tenant
7373

7474
There is one project in this sample. To register it, you can:
7575

76-
- either follow the steps [Step 2: Register the sample with your Azure Active Directory tenant](#step-2-register-the-sample-with-your-azure-active-directory-tenant) and [Step 3: Configure the sample to use your Azure AD tenant](#choose-the-azure-ad-tenant-where-you-want-to-create-your-applications)
76+
- either follow the steps [Step 2: Register the sample with your Microsoft Entra tenant](#step-2-register-the-sample-with-your-azure-active-directory-tenant) and [Step 3: Configure the sample to use your Microsoft Entra tenant](#choose-the-azure-ad-tenant-where-you-want-to-create-your-applications)
7777
- or use PowerShell scripts that:
78-
- **automatically** creates the Azure AD applications and related objects (passwords, permissions, dependencies) for you
78+
- **automatically** creates the Microsoft Entra applications and related objects (passwords, permissions, dependencies) for you
7979
- modify the Visual Studio projects' configuration files.
8080

8181
If you want to use this automation:
@@ -87,7 +87,7 @@ If you want to use this automation:
8787
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force
8888
```
8989

90-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly.
90+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly.
9191

9292
```PowerShell
9393
.\AppCreationScripts\Configure.ps1
@@ -99,13 +99,13 @@ If you want to use this automation:
9999

100100
If you don't want to use this automation, follow the steps below
101101

102-
#### Choose the Azure AD tenant where you want to create your applications
102+
#### Choose the Microsoft Entra tenant where you want to create your applications
103103

104104
As a first step you'll need to:
105105

106-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
107-
1. If your account is present in more than one Azure AD tenant, select `Directory + Subscription` at the top right corner in the menu on top of the page, and switch your portal session to the desired Azure AD tenant.
108-
1. In the left-hand navigation pane, select the **Azure Active Directory** service, and then select **App registrations**.
106+
1. Sign in to the [Microsoft Entra admin center](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
107+
1. If your account is present in more than one Microsoft Entra tenant, select `Directory + Subscription` at the top right corner in the menu on top of the page, and switch your portal session to the desired Microsoft Entra tenant.
108+
1. In the left-hand navigation pane, select the **Microsoft Entra ID** service, and then select **App registrations**.
109109

110110
#### Register the service app (TodoList-webapi-daemon-v2)
111111

@@ -161,7 +161,7 @@ The content of `appRoles` should be the following (the `id` can be any unique **
161161
- Select a key duration of either **In 1 year**, **In 2 years**, or **Never Expires**.
162162
- When you press the **Add** button, the key value will be displayed, copy, and save the value in a safe location.
163163
- You'll need this key later to configure the project in Visual Studio. This key value will not be displayed again, nor retrievable by any other means,
164-
so record it as soon as it is visible from the Azure portal.
164+
so record it as soon as it is visible from the Microsoft Entra admin center.
165165
1. In the list of pages for the app, select **API permissions**
166166
- Click the **Add a permission** button and then,
167167
- Ensure that the **My APIs** tab is selected
@@ -172,9 +172,9 @@ The content of `appRoles` should be the following (the `id` can be any unique **
172172
Therefore no consent can be presented via a UI and accepted to use the service app.
173173
Click the **Grant/revoke admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the
174174
requested permissions for all account in the tenant.
175-
You need to be an Azure AD tenant admin to do this.
175+
You need to be a Microsoft Entra tenant admin to do this.
176176

177-
### Step 3: Configure the sample to use your Azure AD tenant
177+
### Step 3: Configure the sample to use your Microsoft Entra tenant
178178

179179
In the steps below, "ClientID" is the same as "Application ID" or "AppId".
180180

@@ -185,17 +185,17 @@ Open the solution in Visual Studio to configure the projects
185185
> Note: if you used the setup scripts, the changes below will have been applied for you
186186
187187
1. Open the `TodoList-WebApi\appsettings.json` file
188-
1. Find the app key `Domain` and replace the existing value with your Azure AD tenant name.
189-
1. Find the app key `TenantId` and replace the existing value with your Azure AD tenant ID.
190-
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `TodoList-webapi-daemon-v2` application copied from the Azure portal.
188+
1. Find the app key `Domain` and replace the existing value with your Microsoft Entra tenant name.
189+
1. Find the app key `TenantId` and replace the existing value with your Microsoft Entra tenant ID.
190+
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `TodoList-webapi-daemon-v2` application copied from the Microsoft Entra admin center.
191191

192192
#### Configure the client project
193193

194194
1. Open the `Daemon-Console\appsettings.json` file
195-
1. If you are connecting to a national cloud, change the instance to the correct Azure AD endpoint. [See this reference for a list of Azure AD endpoints.](https://docs.microsoft.com/graph/deployments#app-registration-and-token-service-root-endpoints)
196-
1. Find the app key `Tenant` and replace the existing value with your Azure AD tenant name.
197-
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `daemon-console-v2` application copied from the Azure portal.
198-
1. Find the app key `ClientSecret` and replace the existing value with the key you saved during the creation of the `daemon-console-v2` app, in the Azure portal.
195+
1. If you are connecting to a national cloud, change the instance to the correct Microsoft Entra ID endpoint. [See this reference for a list of Microsoft Entra ID endpoints.](https://docs.microsoft.com/graph/deployments#app-registration-and-token-service-root-endpoints)
196+
1. Find the app key `Tenant` and replace the existing value with your Microsoft Entra tenant name.
197+
1. Find the app key `ClientId` and replace the existing value with the application ID (clientId) of the `daemon-console-v2` application copied from the Microsoft Entra admin center.
198+
1. Find the app key `ClientSecret` and replace the existing value with the key you saved during the creation of the `daemon-console-v2` app, in the Microsoft Entra admin center.
199199
1. Find the app key `TodoListBaseAddress` and set to `https://localhost:44372`
200200
1. Find the app key `TodoListScope` and replace the existing value with the **App ID URI** of your web API, followed by "/.default".
201201

@@ -246,7 +246,7 @@ The relevant code for this sample is in the `Program.cs` file:
246246
{
247247
"AzureAd": {
248248
"Instance": "https://login.microsoftonline.com/",
249-
"TenantId": "[Enter here the tenantID or domain name for your Azure AD tenant]",
249+
"TenantId": "[Enter here the tenantID or domain name for your Microsoft Entra tenant]",
250250
"ClientId": "[Enter here the ClientId for your application]",
251251
"ClientCredentials": [
252252
{
@@ -298,7 +298,7 @@ The relevant code for the Web API is in the `Startup.cs` class. We are using the
298298

299299
2. Protecting the Web API
300300

301-
Only apps that have added the **application role** created on **Azure Portal** for the `TodoList-webapi-daemon-v2`, will contain the claim `roles` on their tokens. This is also taken care by [Microsoft Identity Web](https://github.com/AzureAD/microsoft-identity-web)
301+
Only apps that have added the **application role** created on **Microsoft Entra admin center** for the `TodoList-webapi-daemon-v2`, will contain the claim `roles` on their tokens. This is also taken care by [Microsoft Identity Web](https://github.com/AzureAD/microsoft-identity-web)
302302
303303
The protection can also be done on the `Controller` level, using the `Authorize` attribute and `Policy`. Read more about [policy based authorization](https://docs.microsoft.com/aspnet/core/security/authorization/policies?view=aspnetcore-6.0):
304304
@@ -336,7 +336,7 @@ Content: {
336336

337337
## Variation: daemon application using client credentials with certificates
338338

339-
Daemon applications can use two forms of secrets to authenticate themselves with Azure AD:
339+
Daemon applications can use two forms of secrets to authenticate themselves with Microsoft Entra ID:
340340

341341
- **application secrets** (also named application password). This is what we've seen so far.
342342
- **certificates**. This is the object of this paragraph.
@@ -364,7 +364,7 @@ store such as the Computer or service store (See [How to: View Certificates with
364364
365365
Alternatively you can use an existing certificate if you have one (just be sure to record its name for the next steps)
366366

367-
### Add the certificate for the daemon-console-v2 application in Azure AD
367+
### Add the certificate for the daemon-console-v2 application in Microsoft Entra ID
368368

369369
In the application registration blade for your application, in the **Certificates & secrets** page, in the **Certificates** section:
370370

@@ -431,7 +431,7 @@ It's also possible to get certificates from an [Azure Key Vault](https://docs.mi
431431

432432
#### Build and run
433433

434-
Build and run your project. You have the same output, but this time, your application is authenticated with Azure AD with the certificate instead of the application secret.
434+
Build and run your project. You have the same output, but this time, your application is authenticated with Microsoft Entra ID with the certificate instead of the application secret.
435435

436436
## Next Steps
437437

‎3-Using-KeyVault/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You'll need:
2525
- A Windows machine (necessary if you want to run the app on Windows)
2626
- An OS X machine (necessary if you want to run the app on Mac)
2727
- A Linux machine (necessary if you want to run the app on Linux)
28-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
28+
- a Microsoft Entra tenant. For more information on how to get a Microsoft Entra tenant, see [How to get a Microsoft Entra tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
2929

3030
### Step 1: Clone or download this repository
3131

@@ -47,7 +47,7 @@ In this step you'll need to create a Key Vault on your Azure tenant and then cre
4747

4848
You can find the instructions for creating a Key Vault [here](https://docs.microsoft.com/azure/key-vault/general/quick-create-portal).
4949

50-
After the Key Vault is created [upload your own certificate or create a new certificate entirely](https://docs.microsoft.com/azure/key-vault/certificates/tutorial-import-certificate) and store it in the Key Vault. To generate a certificate in the Azure portal select **Generate** as the **Method of Certificate Creation** instead of **Import** and fill in the configuration as appropriate.
50+
After the Key Vault is created [upload your own certificate or create a new certificate entirely](https://docs.microsoft.com/azure/key-vault/certificates/tutorial-import-certificate) and store it in the Key Vault. To generate a certificate in the Microsoft Entra admin center select **Generate** as the **Method of Certificate Creation** instead of **Import** and fill in the configuration as appropriate.
5151

5252
If you create a new certificate you should download a **CER** format copy of the certificate. You'll need it to [register the certificate with your application](https://docs.microsoft.com/azure/active-directory/develop/quickstart-register-app#add-credentials).
5353

@@ -99,17 +99,17 @@ Cloud applications and services use cryptographic keys and secrets to help keep
9999

100100
### About Managed Identities for Azure Resources
101101

102-
Azure Key Vault provides a way to securely store credentials, secrets, and other keys, but your code has to authenticate to Key Vault to retrieve them. The [managed identities for Azure resources](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) feature in Azure Active Directory (Azure AD) solves this problem. The feature provides Azure services with an automatically managed identity in Azure AD. You can use the identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials in your code.
102+
Azure Key Vault provides a way to securely store credentials, secrets, and other keys, but your code has to authenticate to Key Vault to retrieve them. The [managed identities for Azure resources](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) feature in Microsoft Entra ID solves this problem. The feature provides Azure services with an automatically managed identity in Microsoft Entra ID. You can use the identity to authenticate to any service that supports Microsoft Entra authentication, including Key Vault, without any credentials in your code.
103103

104104
In a daemon application scenario, Managed Identity will work if you have it deployed it in an [Azure Virtual Machine](https://azure.microsoft.com/services/virtual-machines/) or [Azure Web Job](https://docs.microsoft.com/azure/app-service/webjobs-create). Please, read [this documentation](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to understand how Managed Identity works with an Azure VM.
105105

106106
#### Configure Managed identity on Azure VM to access Key Vault
107107

108108
To authenticate to Key Vault using your Azure VM, you must first grant it permissions to Key Vault using the **Key Vault Access Policies**. To do that, follow the steps:
109109

110-
1. On Azure Portal, note the name of the Azure VM where you deployed the daemon application.
110+
1. On Microsoft Entra admin center, note the name of the Azure VM where you deployed the daemon application.
111111
1. [Enable managed identity on the virtual machine](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm).
112-
1. On Azure Portal, navigate to **Key Vaults** and select the one that you want the daemon application's VM to access.
112+
1. On Microsoft Entra admin center, navigate to **Key Vaults** and select the one that you want the daemon application's VM to access.
113113
1. Then click on **Access policies** menu and click on **+Add Access Policy**.
114114
1. Select an adequate template from the dropdown "Configure from template" (ie "Secret & Certificate Management") or set the permissions manually (this sample requires the permission **GET** for Secret and Certificate to be checked).
115115
1. For **Select principal**, search for the Azure VM *name* or *ObjectId*, select it and click on **Select** button.

‎4-Call-OwnApi-Pop/AppCreationScripts-withCert/AppCreationScripts.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
```PowerShell
1010
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force
1111
```
12-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly. (Other ways of running the scripts are described below)
12+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly. (Other ways of running the scripts are described below)
1313
```PowerShell
1414
.\AppCreationScripts\Configure.ps1
1515
```
@@ -31,23 +31,23 @@ The following paragraphs:
3131

3232
### Presentation of the scripts
3333

34-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
34+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
3535

3636
These scripts are:
3737

3838
- `Configure.ps1` which:
39-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets),
39+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets),
4040
- changes the configuration files in the C# and JavaScript projects.
41-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
41+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
4242
- the identifier of the application
4343
- the AppId of the application
44-
- the url of its registration in the [Azure portal](https://portal.azure.com).
44+
- the url of its registration in the [Microsoft Entra admin center](https://portal.azure.com).
4545

46-
- `Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, git reset).
46+
- `Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, git reset).
4747

4848
### Usage pattern for tests and DevOps scenarios
4949

50-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
50+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
5151

5252
## How to use the app creation scripts ?
5353

@@ -121,8 +121,8 @@ Of course, in real life, you might already get the password as a `SecureString`.
121121
#### Option 3 (Interactive, but create apps in a specified tenant)
122122

123123
if you want to create the apps in a particular tenant, you can use the following option:
124-
- open the [Azure portal](https://portal.azure.com)
125-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
124+
- open the [Microsoft Entra admin center](https://portal.azure.com)
125+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
126126
- Find the "Active Directory" object in this tenant
127127
- Go to **Properties** and copy the content of the **Directory Id** property
128128
- Then use the full syntax to run the scripts:

‎4-Call-OwnApi-Pop/AppCreationScripts/AppCreationScripts.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
```PowerShell
1010
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force
1111
```
12-
1. Run the script to create your Azure AD application and configure the code of the sample application accordingly. (Other ways of running the scripts are described below)
12+
1. Run the script to create your Microsoft Entra application and configure the code of the sample application accordingly. (Other ways of running the scripts are described below)
1313
```PowerShell
1414
.\AppCreationScripts\Configure.ps1
1515
```
@@ -31,23 +31,23 @@ The following paragraphs:
3131

3232
### Presentation of the scripts
3333

34-
This sample comes with two PowerShell scripts, which automate the creation of the Azure Active Directory applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
34+
This sample comes with two PowerShell scripts, which automate the creation of the Microsoft Entra applications, and the configuration of the code for this sample. Once you run them, you will only need to build the solution and you are good to test.
3535

3636
These scripts are:
3737

3838
- `Configure.ps1` which:
39-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets),
39+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets),
4040
- changes the configuration files in the C# and JavaScript projects.
41-
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
41+
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Microsoft Entra application it created:
4242
- the identifier of the application
4343
- the AppId of the application
44-
- the url of its registration in the [Azure portal](https://portal.azure.com).
44+
- the url of its registration in the [Microsoft Entra admin center](https://portal.azure.com).
4545

46-
- `Cleanup.ps1` which cleans-up the Azure AD objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, git reset).
46+
- `Cleanup.ps1` which cleans-up the Microsoft Entra objects created by `Configure.ps1`. Note that this script does not revert the changes done in the configuration files, though. You will need to undo the change from source control (from Visual Studio, or from the command line using, for instance, git reset).
4747

4848
### Usage pattern for tests and DevOps scenarios
4949

50-
The `Configure.ps1` will stop if it tries to create an Azure AD application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
50+
The `Configure.ps1` will stop if it tries to create a Microsoft Entra application which already exists in the tenant. For this, if you are using the script to try/test the sample, or in DevOps scenarios, you might want to run `Cleanup.ps1` just before `Configure.ps1`. This is what is shown in the steps below.
5151

5252
## How to use the app creation scripts ?
5353

@@ -121,8 +121,8 @@ Of course, in real life, you might already get the password as a `SecureString`.
121121
#### Option 3 (Interactive, but create apps in a specified tenant)
122122

123123
if you want to create the apps in a particular tenant, you can use the following option:
124-
- open the [Azure portal](https://portal.azure.com)
125-
- Select the Azure Active directory you are interested in (in the combo-box below your name on the top right of the browser window)
124+
- open the [Microsoft Entra admin center](https://portal.azure.com)
125+
- Select the Microsoft Entra ID you are interested in (in the combo-box below your name on the top right of the browser window)
126126
- Find the "Active Directory" object in this tenant
127127
- Go to **Properties** and copy the content of the **Directory Id** property
128128
- Then use the full syntax to run the scripts:

‎4-Call-OwnApi-Pop/Microsoft.Identity.Web.Future/README.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
# Microsoft Identity Web
22

3-
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/ASP.NET%20Core%20Web%20App%20tutorial)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=819)
3+
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/aad%20Samples/.NET%20client%20samples/ASP.NET%20Core%20Web%20App%20tutorial)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=819)
44

55
This library contains a set of reusable classes useful in ASP.NET Core:
66

77
- [Web applications](#web-apps) that sign in users, and, optionally, call web APIs
88
- [Protected web APIs](#web-apis), which, optionally call downstream web APIs
99

10-
to enable them to work with the Microsoft identity platform (formerly named Azure AD v2.0 endpoint). In the library, web apps and protected web APIs are collectively referred to as web resources.
10+
to enable them to work with the Microsoft identity platform (formerly named Microsoft Entra ID v2.0 endpoint). In the library, web apps and protected web APIs are collectively referred to as web resources.
1111

1212
## Web apps
1313

14-
As of today, ASP.NET Core web apps templates (`dot net new mvc -auth`) create web apps that sign in users with the Azure AD v1.0 endpoint (allowing to sign in users with their organizational accounts, also named *Work or school accounts*). This library brings `ServiceCollection` extension methods to be used in the ASP.NET Core web app **Startup.cs** file to enable the web app to sign in users with the Microsoft identity platform (formerly Azure AD v2.0 endpoint), and, optionally enable the web app to call APIs on behalf of the signed-in user.
14+
As of today, ASP.NET Core web apps templates (`dot net new mvc -auth`) create web apps that sign in users with the Microsoft Entra ID v1.0 endpoint (allowing to sign in users with their organizational accounts, also named *Work or school accounts*). This library brings `ServiceCollection` extension methods to be used in the ASP.NET Core web app **Startup.cs** file to enable the web app to sign in users with the Microsoft identity platform (formerly Microsoft Entra ID v2.0 endpoint), and, optionally enable the web app to call APIs on behalf of the signed-in user.
1515

1616
![WebAppServiceCollectionExtensions](https://user-images.githubusercontent.com/13203188/64252959-82ae3680-cf1c-11e9-8a01-0a0be728a78e.png)
1717

@@ -54,7 +54,7 @@ public class Startup
5454
}
5555
```
5656

57-
This method adds authentication with the Microsoft Identity platform (formerly Azure AD v2.0). This includes validating the token in all scenarios (single tenant application, multi tenant applications) in Azure public cloud as well as national clouds.
57+
This method adds authentication with the Microsoft Identity platform (formerly Microsoft Entra ID v2.0). This includes validating the token in all scenarios (single tenant application, multi tenant applications) in Azure public cloud as well as national clouds.
5858

5959
See also:
6060

@@ -185,7 +185,7 @@ public class Startup
185185
}
186186
```
187187

188-
This method enables your web API to be protected using the Microsoft Identity platform (formerly Azure AD v2.0). It takes care of validating the token in all scenarios (single tenant application, multi tenant applications), in Azure public cloud as well as national clouds.
188+
This method enables your web API to be protected using the Microsoft Identity platform (formerly Microsoft Entra ID v2.0). It takes care of validating the token in all scenarios (single tenant application, multi tenant applications), in Azure public cloud as well as national clouds.
189189

190190
See also:
191191

@@ -327,11 +327,11 @@ Finally, you can create a `ClaimsPrincipal` from an instance of MSAL.NET `IAccou
327327

328328
### Troubleshooting your web app or web API
329329

330-
In order to troubleshoot your web app you can set the `subscribeToOpenIdConnectMiddlewareDiagnosticsEvents` optional boolean to `true` when you call `AddMicrosoftIdentityPlatformAuthentication`. This will display on the output window the progression of the OpenID connect message through OpenID Connect middleware (from the reception of the message from Azure Active directory to the availability of the user identity in `HttpContext.User`)
330+
In order to troubleshoot your web app you can set the `subscribeToOpenIdConnectMiddlewareDiagnosticsEvents` optional boolean to `true` when you call `AddMicrosoftIdentityPlatformAuthentication`. This will display on the output window the progression of the OpenID connect message through OpenID Connect middleware (from the reception of the message from Microsoft Entra ID to the availability of the user identity in `HttpContext.User`)
331331

332332
<img alt="OpenIdConnectMiddlewareDiagnostics" src="https://user-images.githubusercontent.com/13203188/62538366-75ac0380-b807-11e9-9ce0-d0eec9381b78.png" width="75%"/>
333333

334-
In order to troubleshoot your web API you can set the `subscribeToJwtBearerMiddlewareDiagnosticsEvents` optional boolean to `true` when you call `AddMicrosoftWebApiAuthentication`. Enabling these diagnostics will display on the output window the progression of the OAuth 2.0 message through the JWTBearer middleware (from the reception of the message from Azure Active directory to the availability of the user identity in `HttpContext.User`)
334+
In order to troubleshoot your web API you can set the `subscribeToJwtBearerMiddlewareDiagnosticsEvents` optional boolean to `true` when you call `AddMicrosoftWebApiAuthentication`. Enabling these diagnostics will display on the output window the progression of the OAuth 2.0 message through the JWTBearer middleware (from the reception of the message from Microsoft Entra ID to the availability of the user identity in `HttpContext.User`)
335335

336336
<img alt="JwtBearerMiddlewareDiagnostics" src="https://user-images.githubusercontent.com/13203188/62538382-7d6ba800-b807-11e9-9540-560e7129197b.png" width="65%"/>
337337

‎LICENSE.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,4 @@
1818
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
1919
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
2020
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21-
SOFTWARE
21+
SOFTWARE

‎README.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ languages:
44
- csharp
55
- powershell
66
products:
7-
- azure-active-directory
7+
- microsoft-entra-id
88
description: "Daemon or unattended application consuming Microsoft Graph or your own Web Apis using Microsoft Identity Platform to acquire tokens."
99
urlFragment: ms-identity-daemon
1010
---
1111

1212
# A .NET Core daemon console application using MSAL.NET to acquire tokens for resources
1313

14-
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
14+
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/aad%20Samples/.NET%20client%20samples/active-directory-dotnetcore-daemon-v2%20CI)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=695)
1515

1616
## About this sample
1717

@@ -40,8 +40,8 @@ To run this sample, you'll need:
4040
- A Windows machine (necessary if you want to run the app on Windows)
4141
- An OS X machine (necessary if you want to run the app on Mac)
4242
- A Linux machine (necessary if you want to run the app on Linux)
43-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
44-
- A user account in your Azure AD tenant. This sample will not work with a Microsoft account (formerly Windows Live account). Therefore, if you signed in to the [Azure portal](https://portal.azure.com) with a Microsoft account and have never created a user account in your directory before, you need to do that now.
43+
- a Microsoft Entra tenant. For more information on how to get a Microsoft Entra tenant, see [How to get a Microsoft Entra tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
44+
- A user account in your Microsoft Entra tenant. This sample will not work with a Microsoft account (formerly Windows Live account). Therefore, if you signed in to the [Microsoft Entra admin center](https://portal.azure.com) with a Microsoft account and have never created a user account in your directory before, you need to do that now.
4545

4646
### Step 1: Clone or download this repository
4747

0 commit comments

Comments
 (0)
Please sign in to comment.