You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/App/package.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
{
2
2
"name": "ciam-sign-in-javascript",
3
3
"version": "1.0.0",
4
-
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD CIAM)",
4
+
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD for Customers)",
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/README.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
page_type: sample
3
-
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD CIAM
4
-
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD CIAM)
3
+
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
4
+
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
5
5
languages:
6
6
- javascript
7
7
products:
@@ -21,7 +21,7 @@ extensions:
21
21
- Vanilla JavaScript SPA
22
22
---
23
23
24
-
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD CIAM
24
+
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
25
25
26
26
*[Overview](#overview)
27
27
*[Scenario](#scenario)
@@ -36,13 +36,13 @@ extensions:
36
36
37
37
## Overview
38
38
39
-
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD CIAM) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
39
+
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD for Customers) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
40
40
Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [OIDC scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [single-sign on](https://docs.microsoft.com/azure/active-directory/develop/msal-js-sso), **silent requests** and more.
41
41
42
42
## Scenario
43
43
44
-
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD CIAM**.
45
-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD CIAM**.
44
+
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
45
+
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
46
46
47
47

48
48
@@ -63,8 +63,8 @@ Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-dire
63
63
*[Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
64
64
*[VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
65
65
* A modern web browser.
66
-
* An **Azure AD CIAM** tenant. For more information, see: [How to get an Azure AD CIAM tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67
-
* A user account with permissions to create applications in your **Azure AD CIAM** tenant.
66
+
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67
+
* A user account with permissions to create applications in your **Azure AD for Customers** tenant.
68
68
69
69
## Setup the sample
70
70
@@ -115,12 +115,12 @@ There is one project in this sample. To register it, you can:
115
115
116
116
</details>
117
117
118
-
#### Choose the Azure AD CIAM tenant where you want to create your applications
118
+
#### Choose the Azure AD for Customers tenant where you want to create your applications
119
119
120
120
To manually register the apps, as a first step you'll need to:
121
121
122
122
1. Sign in to the [Azure portal](https://portal.azure.com).
123
-
1. If your account is present in more than one Azure AD CIAM tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD CIAM tenant.
123
+
1. If your account is present in more than one Azure AD for Customers tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD for Customers tenant.
124
124
125
125
#### Create User Flows
126
126
@@ -137,7 +137,7 @@ Please refer to:
137
137
138
138
#### Register the client app (ciam-msal-javascript-spa)
139
139
140
-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD CIAM** service.
140
+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
141
141
1. Select the **App Registrations** blade on the left, then select **New registration**.
142
142
1. In the **Register an application page** that appears, enter your application's registration information:
143
143
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ciam-msal-javascript-spa`.
Copy file name to clipboardExpand all lines: 1-Authentication/1-sign-in-react/README.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
page_type: sample
3
-
name: React single-page application using MSAL React to authentication users against Azure AD CIAM
4
-
description: React single-page application using MSAL React to authentication users against Azure Active Directory Customer Identity Access Management (Azure AD CIAM)
3
+
name: React single-page application using MSAL React to authentication users against Azure AD for Customers
4
+
description: React single-page application using MSAL React to authentication users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
5
5
languages:
6
6
- javascript
7
7
products:
@@ -21,7 +21,7 @@ extensions:
21
21
- React SPA
22
22
---
23
23
24
-
# React single-page application using MSAL React to authenticate users against Azure AD CIAM
24
+
# React single-page application using MSAL React to authenticate users against Azure AD for Customers
25
25
26
26
*[Overview](#overview)
27
27
*[Scenario](#scenario)
@@ -44,8 +44,8 @@ Here you'll learn how to [sign-in](https://docs.microsoft.com/azure/active-direc
44
44
45
45
## Scenario
46
46
47
-
1. The client React SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD CIAM**.
48
-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD CIAM**.
47
+
1. The client React SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
48
+
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
49
49
50
50

51
51
@@ -62,8 +62,8 @@ Here you'll learn how to [sign-in](https://docs.microsoft.com/azure/active-direc
62
62
*[Node.js](https://nodejs.org/en/download/) must be installed to run this sample.
63
63
*[Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
64
64
*[VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
65
-
* An **Azure AD CIAM** tenant. For more information, see: [How to get an Azure AD CIAM tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
66
-
* A user account in your **Azure AD CIAM** tenant.
65
+
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
66
+
* A user account in your **Azure AD for Customers** tenant.
67
67
68
68
>This sample will not work with a **personal Microsoft account**. If you're signed in to the [Azure portal](https://portal.azure.com) with a personal Microsoft account and have not created a user account in your directory before, you will need to create one before proceeding.
69
69
@@ -142,7 +142,7 @@ Please refer to:
142
142
143
143
#### Register the client app (msal-react-spa)
144
144
145
-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD CIAM** service.
145
+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
146
146
1. Select the **App Registrations** blade on the left, then select **New registration**.
147
147
1. In the **Register an application page** that appears, enter your application's registration information:
148
148
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `msal-react-spa`.
0 commit comments