Skip to content

Commit 982266b

Browse files
authored
Merge pull request #51 from Azure-Samples/fix-branding
Fix various bugs (branding, popup, css)
2 parents de402af + ef81fb8 commit 982266b

57 files changed

Lines changed: 175 additions & 127407 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1-Authentication/0-sign-in-vanillajs/App/package-lock.json

Lines changed: 0 additions & 8720 deletions
This file was deleted.

1-Authentication/0-sign-in-vanillajs/App/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "ciam-sign-in-javascript",
33
"version": "1.0.0",
4-
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD CIAM)",
4+
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD for Customers)",
55
"main": "server.js",
66
"scripts": {
77
"start": "node server.js",

1-Authentication/0-sign-in-vanillajs/App/public/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ <h5 id="welcome-div" class="card-header text-center d-none"></h5>
5959
<script type="text/javascript" src="./claimUtils.js"></script>
6060
<!-- <script type="text/javascript" src="./authRedirect.js"></script> -->
6161
<!-- uncomment the above line and comment the line below if you would like to use the redirect flow -->
62-
<script type="text/javascript" src="./authPopup.js"></script>
62+
<script type="text/javascript" src="./authRedirect.js"></script>
6363
</body>
6464

6565
</html>

1-Authentication/0-sign-in-vanillajs/App/public/styles.css

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
}
44

55
.table-responsive-ms {
6-
max-height: 39rem !important;
7-
padding-left: 10%;
8-
padding-right: 10%;
6+
max-height: 800px !important;
7+
padding-left: 50px;
8+
padding-right: 50px;
99
}

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/apps.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"Sample": {
3-
"Title": "A JavaScript single-page application using MSAL Angular to authenticate users against Azure AD CIAM",
3+
"Title": "A JavaScript single-page application using MSAL Angular to authenticate users against Azure AD for Customers",
44
"Client": "SinglePageApplication",
55
"Level": 100
66
},

1-Authentication/0-sign-in-vanillajs/README.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
page_type: sample
3-
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD CIAM
4-
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD CIAM)
3+
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
4+
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
55
languages:
66
- javascript
77
products:
@@ -21,7 +21,7 @@ extensions:
2121
- Vanilla JavaScript SPA
2222
---
2323

24-
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD CIAM
24+
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
2525

2626
* [Overview](#overview)
2727
* [Scenario](#scenario)
@@ -36,13 +36,13 @@ extensions:
3636

3737
## Overview
3838

39-
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD CIAM) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
39+
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD for Customers) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
4040
Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [OIDC scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [single-sign on](https://docs.microsoft.com/azure/active-directory/develop/msal-js-sso), **silent requests** and more.
4141

4242
## Scenario
4343

44-
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD CIAM**.
45-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD CIAM**.
44+
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
45+
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
4646

4747
![Scenario Image](./ReadmeFiles/topology.png)
4848

@@ -63,8 +63,8 @@ Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-dire
6363
* [Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
6464
* [VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
6565
* A modern web browser.
66-
* An **Azure AD CIAM** tenant. For more information, see: [How to get an Azure AD CIAM tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67-
* A user account with permissions to create applications in your **Azure AD CIAM** tenant.
66+
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67+
* A user account with permissions to create applications in your **Azure AD for Customers** tenant.
6868

6969
## Setup the sample
7070

@@ -115,12 +115,12 @@ There is one project in this sample. To register it, you can:
115115
116116
</details>
117117
118-
#### Choose the Azure AD CIAM tenant where you want to create your applications
118+
#### Choose the Azure AD for Customers tenant where you want to create your applications
119119
120120
To manually register the apps, as a first step you'll need to:
121121
122122
1. Sign in to the [Azure portal](https://portal.azure.com).
123-
1. If your account is present in more than one Azure AD CIAM tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD CIAM tenant.
123+
1. If your account is present in more than one Azure AD for Customers tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD for Customers tenant.
124124
125125
#### Create User Flows
126126
@@ -137,7 +137,7 @@ Please refer to:
137137
138138
#### Register the client app (ciam-msal-javascript-spa)
139139
140-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD CIAM** service.
140+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
141141
1. Select the **App Registrations** blade on the left, then select **New registration**.
142142
1. In the **Register an application page** that appears, enter your application's registration information:
143143
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ciam-msal-javascript-spa`.

1-Authentication/1-sign-in-react/AppCreationScripts/apps.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"Sample": {
3-
"Title": "A React single-page application using MSAL React to authenticate users against Azure AD CIAM",
3+
"Title": "A React single-page application using MSAL React to authenticate users against Azure AD for Customers",
44
"Client": "SinglePageApplication",
55
"Level": 100
66
},

1-Authentication/1-sign-in-react/README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
page_type: sample
3-
name: React single-page application using MSAL React to authentication users against Azure AD CIAM
4-
description: React single-page application using MSAL React to authentication users against Azure Active Directory Customer Identity Access Management (Azure AD CIAM)
3+
name: React single-page application using MSAL React to authentication users against Azure AD for Customers
4+
description: React single-page application using MSAL React to authentication users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
55
languages:
66
- javascript
77
products:
@@ -21,7 +21,7 @@ extensions:
2121
- React SPA
2222
---
2323

24-
# React single-page application using MSAL React to authenticate users against Azure AD CIAM
24+
# React single-page application using MSAL React to authenticate users against Azure AD for Customers
2525

2626
* [Overview](#overview)
2727
* [Scenario](#scenario)
@@ -44,8 +44,8 @@ Here you'll learn how to [sign-in](https://docs.microsoft.com/azure/active-direc
4444

4545
## Scenario
4646

47-
1. The client React SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD CIAM**.
48-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD CIAM**.
47+
1. The client React SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
48+
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
4949

5050
![Scenario Image](./ReadmeFiles/topology.png)
5151

@@ -62,8 +62,8 @@ Here you'll learn how to [sign-in](https://docs.microsoft.com/azure/active-direc
6262
* [Node.js](https://nodejs.org/en/download/) must be installed to run this sample.
6363
* [Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
6464
* [VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
65-
* An **Azure AD CIAM** tenant. For more information, see: [How to get an Azure AD CIAM tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
66-
* A user account in your **Azure AD CIAM** tenant.
65+
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
66+
* A user account in your **Azure AD for Customers** tenant.
6767

6868
>This sample will not work with a **personal Microsoft account**. If you're signed in to the [Azure portal](https://portal.azure.com) with a personal Microsoft account and have not created a user account in your directory before, you will need to create one before proceeding.
6969
@@ -142,7 +142,7 @@ Please refer to:
142142
143143
#### Register the client app (msal-react-spa)
144144
145-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD CIAM** service.
145+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
146146
1. Select the **App Registrations** blade on the left, then select **New registration**.
147147
1. In the **Register an application page** that appears, enter your application's registration information:
148148
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `msal-react-spa`.

0 commit comments

Comments
 (0)