You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/App/package.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
{
2
2
"name": "ciam-sign-in-javascript",
3
3
"version": "1.0.0",
4
-
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD for Customers)",
4
+
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Microsoft Entra External ID)",
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/AppCreationScripts/AppCreationScripts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ This sample comes with two PowerShell scripts, which automate the creation of th
33
33
These scripts are:
34
34
35
35
-`Configure.ps1` which:
36
-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36
+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
37
37
- changes the configuration files in the sample projects.
38
38
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/AppCreationScripts/quickstart.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.date: 04/19/2023
14
14
---
15
15
# Portal quickstart for JavaScript SPA
16
16
17
-
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript SPA that can sign in users with Azure AD for Customers.
17
+
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript SPA that can sign in users with Microsoft Entra External ID.
Copy file name to clipboardExpand all lines: 1-Authentication/0-sign-in-vanillajs/README.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
page_type: sample
3
-
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
4
-
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
3
+
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID
4
+
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Microsoft Entra External ID)
5
5
languages:
6
6
- javascript
7
7
products:
@@ -21,7 +21,7 @@ extensions:
21
21
- Vanilla JavaScript SPA
22
22
---
23
23
24
-
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
24
+
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID
25
25
26
26
*[Overview](#overview)
27
27
*[Scenario](#scenario)
@@ -36,13 +36,13 @@ extensions:
36
36
37
37
## Overview
38
38
39
-
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD for Customers) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
39
+
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Microsoft Entra External ID) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
40
40
Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [OIDC scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [single-sign on](https://docs.microsoft.com/azure/active-directory/develop/msal-js-sso), **silent requests** and more.
41
41
42
42
## Scenario
43
43
44
-
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
45
-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
44
+
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Microsoft Entra External ID**.
45
+
1. The **ID Token** proves that the user has successfully authenticated against **Microsoft Entra External ID**.
46
46
47
47

48
48
@@ -63,8 +63,8 @@ Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-dire
63
63
*[Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
64
64
*[VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
65
65
* A modern web browser.
66
-
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67
-
* A user account with permissions to create applications in your **Azure AD for Customers** tenant.
66
+
* An **Microsoft Entra External ID** tenant. For more information, see: [How to get an external tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67
+
* A user account with permissions to create applications in your **Microsoft Entra External ID** tenant.
68
68
69
69
## Setup the sample
70
70
@@ -93,7 +93,7 @@ There is one project in this sample. To register it, you can:
93
93
94
94
* follow the steps below for manually register your apps
95
95
* or use PowerShell scripts that:
96
-
***automatically** creates the Azure AD applications and related objects (passwords, permissions, dependencies) for you.
96
+
***automatically** creates the Microsoft Entra applications and related objects (passwords, permissions, dependencies) for you.
97
97
* modify the projects' configuration files.
98
98
99
99
<details>
@@ -115,18 +115,18 @@ There is one project in this sample. To register it, you can:
115
115
116
116
</details>
117
117
118
-
#### Choose the Azure AD for Customers tenant where you want to create your applications
118
+
#### Choose the Microsoft Entra External ID tenant where you want to create your applications
119
119
120
120
To manually register the apps, as a first step you'll need to:
121
121
122
122
1. Sign in to the [Azure portal](https://portal.azure.com).
123
-
1. If your account is present in more than one Azure AD for Customers tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD for Customers tenant.
123
+
1. If your account is present in more than one Microsoft Entra External ID tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Microsoft Entra External ID tenant.
124
124
125
125
#### Create User Flows
126
126
127
127
Please refer to: [Tutorial: Create user flow in Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/3-Create-sign-up-and-sign-in-user-flow.md)
128
128
129
-
> :information_source: To enable password reset in Customer Identity Access Management (CIAM) in Azure Active Directory (Azure AD), please refer to: [Tutorial: Enable self-service password reset](https://github.com/microsoft/entra-previews/blob/PP2/docs/4-Enable-password-reset.md)
129
+
> :information_source: To enable password reset in Microsoft Entra External ID in Azure Active Directory (Azure AD), please refer to: [Tutorial: Enable self-service password reset](https://github.com/microsoft/entra-previews/blob/PP2/docs/4-Enable-password-reset.md)
130
130
131
131
#### Add External Identity Providers
132
132
@@ -137,7 +137,7 @@ Please refer to:
137
137
138
138
#### Register the client app (ciam-msal-javascript-spa)
139
139
140
-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
140
+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Microsoft Entra External ID** service.
141
141
1. Select the **App Registrations** blade on the left, then select **New registration**.
142
142
1. In the **Register an application page** that appears, enter your application's registration information:
143
143
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ciam-msal-javascript-spa`.
@@ -157,7 +157,7 @@ Please refer to:
157
157
1. In the *Commonly used Microsoft APIs* section, select **Microsoft Graph**
158
158
1. In the **Delegated permissions** section, select **openid**, **offline_access** in the list. Use the search box if necessary.
159
159
1. Select the **Add permissions** button at the bottom.
160
-
1. At this stage, the permissions are assigned correctly, but since it's a CIAM tenant, the users themselves cannot consent to these permissions. To get around this problem, we'd let the [tenant administrator consent on behalf of all users in the tenant](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent). Select the **Grant admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the requested permissions for all accounts in the tenant. You need to be a tenant admin to be able to carry out this operation.
160
+
1. At this stage, the permissions are assigned correctly, but since it's an external tenant, the users themselves cannot consent to these permissions. To get around this problem, we'd let the [tenant administrator consent on behalf of all users in the tenant](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent). Select the **Grant admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the requested permissions for all accounts in the tenant. You need to be a tenant admin to be able to carry out this operation.
161
161
162
162
##### Configure the client app (ciam-msal-javascript-spa) to use your app registration
Copy file name to clipboardExpand all lines: 1-Authentication/1-sign-in-react/AppCreationScripts/AppCreationScripts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ This sample comes with two PowerShell scripts, which automate the creation of th
33
33
These scripts are:
34
34
35
35
-`Configure.ps1` which:
36
-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36
+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
37
37
- changes the configuration files in the sample projects.
38
38
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
0 commit comments