Skip to content

Commit b8cc81b

Browse files
committed
update readmes
1 parent d8a3ebb commit b8cc81b

82 files changed

Lines changed: 260 additions & 260 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1-Authentication/0-sign-in-vanillajs/App/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "ciam-sign-in-javascript",
33
"version": "1.0.0",
4-
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Azure AD for Customers)",
4+
"description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD Customer Identity Access Management (Microsoft Entra External ID)",
55
"main": "server.js",
66
"scripts": {
77
"start": "node server.js",

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/AppCreationScripts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This sample comes with two PowerShell scripts, which automate the creation of th
3333
These scripts are:
3434

3535
- `Configure.ps1` which:
36-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
3737
- changes the configuration files in the sample projects.
3838
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
3939
- the identifier of the application

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/Cleanup.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Function Cleanup
1818

1919
<#
2020
.Description
21-
This function removes the Azure AD applications for the sample. These applications were created by the Configure.ps1 script
21+
This function removes the Microsoft Entra applications for the sample. These applications were created by the Configure.ps1 script
2222
#>
2323

2424
# $tenantId is the Active Directory Tenant. This is a GUID which represents the "Directory ID" of the AzureAD tenant

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/Configure.ps1

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ param(
99
)
1010

1111
<#
12-
This script creates the Azure AD applications needed for this sample and updates the configuration files
13-
for the visual Studio projects from the data in the Azure AD applications.
12+
This script creates the Microsoft Entra applications needed for this sample and updates the configuration files
13+
for the visual Studio projects from the data in the Microsoft Entra applications.
1414
1515
In case you don't have Microsoft.Graph.Applications already installed, the script will automatically install it for the current user
1616
@@ -173,7 +173,7 @@ Function CreateOptionalClaim([string] $name)
173173
Function ConfigureApplications
174174
{
175175
<#.Description
176-
This function creates the Azure AD applications for the sample in the provided Azure AD tenant and updates the
176+
This function creates the Microsoft Entra applications for the sample in the provided Azure AD tenant and updates the
177177
configuration files in the client and service project of the visual studio solution (App.Config and Web.Config)
178178
so that they are consistent with the Applications parameters
179179
#>

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/apps.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"Sample": {
3-
"Title": "A JavaScript single-page application using MSAL Angular to authenticate users against Azure AD for Customers",
3+
"Title": "A JavaScript single-page application using MSAL Angular to authenticate users against Microsoft Entra External ID",
44
"Client": "SinglePageApplication",
55
"Level": 100
66
},

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 04/19/2023
1414
---
1515
# Portal quickstart for JavaScript SPA
1616

17-
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript SPA that can sign in users with Azure AD for Customers.
17+
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript SPA that can sign in users with Microsoft Entra External ID.
1818
>
1919
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2020
>

1-Authentication/0-sign-in-vanillajs/AppCreationScripts/sample.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"Sample": {
3-
"Title": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Customer Identity Access Management (CIAM)",
3+
"Title": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID",
44
"Level": 100,
55
"Client": "Vanilla JavaScript SPA",
66
"RepositoryUrl": "ms-identity-ciam-javascript-tutorial",
77
"Endpoint": "AAD v2.0",
88
"Languages": [
99
"javascript"
1010
],
11-
"Description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Customer Identity Access Management (CIAM)",
11+
"Description": "Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID",
1212
"Products": [
1313
"azure-active-directory",
1414
"msal-js",

1-Authentication/0-sign-in-vanillajs/README.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
page_type: sample
3-
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
4-
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Azure AD for Customers)
3+
name: Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID
4+
description: This sample demonstrates a Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure Active Directory Customer Identity Access Management (Microsoft Entra External ID)
55
languages:
66
- javascript
77
products:
@@ -21,7 +21,7 @@ extensions:
2121
- Vanilla JavaScript SPA
2222
---
2323

24-
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Azure AD for Customers
24+
# Vanilla JavaScript single-page application using MSAL.js to authenticate users against Microsoft Entra External ID
2525

2626
* [Overview](#overview)
2727
* [Scenario](#scenario)
@@ -36,13 +36,13 @@ extensions:
3636

3737
## Overview
3838

39-
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Azure AD for Customers) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
39+
This sample demonstrates a vanilla JavaScript single-page application (SPA) that lets users authenticate to [Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md) (Microsoft Entra External ID) using the [Microsoft Authentication Library for JavaScript](https://github.com/AzureAD/microsoft-authentication-library-for-js) (MSAL.js).
4040
Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [OIDC scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [single-sign on](https://docs.microsoft.com/azure/active-directory/develop/msal-js-sso), **silent requests** and more.
4141

4242
## Scenario
4343

44-
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Azure AD for Customers**.
45-
1. The **ID Token** proves that the user has successfully authenticated against **Azure AD for Customers**.
44+
1. The client JavaScript SPA uses the to sign-in a user and obtain a JWT [ID Token](https://aka.ms/id-tokens) from **Microsoft Entra External ID**.
45+
1. The **ID Token** proves that the user has successfully authenticated against **Microsoft Entra External ID**.
4646

4747
![Scenario Image](./ReadmeFiles/topology.png)
4848

@@ -63,8 +63,8 @@ Here you'll learn about [ID Tokens](https://docs.microsoft.com/azure/active-dire
6363
* [Visual Studio Code](https://code.visualstudio.com/download) is recommended for running and editing this sample.
6464
* [VS Code Azure Tools](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack) extension is recommended for interacting with Azure through VS Code Interface.
6565
* A modern web browser.
66-
* An **Azure AD for Customers** tenant. For more information, see: [How to get an Azure AD for Customers tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67-
* A user account with permissions to create applications in your **Azure AD for Customers** tenant.
66+
* An **Microsoft Entra External ID** tenant. For more information, see: [How to get an external tenant](https://github.com/microsoft/entra-previews/blob/PP2/docs/1-Create-a-CIAM-tenant.md)
67+
* A user account with permissions to create applications in your **Microsoft Entra External ID** tenant.
6868

6969
## Setup the sample
7070

@@ -93,7 +93,7 @@ There is one project in this sample. To register it, you can:
9393

9494
* follow the steps below for manually register your apps
9595
* or use PowerShell scripts that:
96-
* **automatically** creates the Azure AD applications and related objects (passwords, permissions, dependencies) for you.
96+
* **automatically** creates the Microsoft Entra applications and related objects (passwords, permissions, dependencies) for you.
9797
* modify the projects' configuration files.
9898

9999
<details>
@@ -115,18 +115,18 @@ There is one project in this sample. To register it, you can:
115115
116116
</details>
117117
118-
#### Choose the Azure AD for Customers tenant where you want to create your applications
118+
#### Choose the Microsoft Entra External ID tenant where you want to create your applications
119119
120120
To manually register the apps, as a first step you'll need to:
121121
122122
1. Sign in to the [Azure portal](https://portal.azure.com).
123-
1. If your account is present in more than one Azure AD for Customers tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD for Customers tenant.
123+
1. If your account is present in more than one Microsoft Entra External ID tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Microsoft Entra External ID tenant.
124124
125125
#### Create User Flows
126126
127127
Please refer to: [Tutorial: Create user flow in Azure Active Directory CIAM](https://github.com/microsoft/entra-previews/blob/PP2/docs/3-Create-sign-up-and-sign-in-user-flow.md)
128128
129-
> :information_source: To enable password reset in Customer Identity Access Management (CIAM) in Azure Active Directory (Azure AD), please refer to: [Tutorial: Enable self-service password reset](https://github.com/microsoft/entra-previews/blob/PP2/docs/4-Enable-password-reset.md)
129+
> :information_source: To enable password reset in Microsoft Entra External ID in Azure Active Directory (Azure AD), please refer to: [Tutorial: Enable self-service password reset](https://github.com/microsoft/entra-previews/blob/PP2/docs/4-Enable-password-reset.md)
130130
131131
#### Add External Identity Providers
132132
@@ -137,7 +137,7 @@ Please refer to:
137137
138138
#### Register the client app (ciam-msal-javascript-spa)
139139
140-
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD for Customers** service.
140+
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Microsoft Entra External ID** service.
141141
1. Select the **App Registrations** blade on the left, then select **New registration**.
142142
1. In the **Register an application page** that appears, enter your application's registration information:
143143
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ciam-msal-javascript-spa`.
@@ -157,7 +157,7 @@ Please refer to:
157157
1. In the *Commonly used Microsoft APIs* section, select **Microsoft Graph**
158158
1. In the **Delegated permissions** section, select **openid**, **offline_access** in the list. Use the search box if necessary.
159159
1. Select the **Add permissions** button at the bottom.
160-
1. At this stage, the permissions are assigned correctly, but since it's a CIAM tenant, the users themselves cannot consent to these permissions. To get around this problem, we'd let the [tenant administrator consent on behalf of all users in the tenant](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent). Select the **Grant admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the requested permissions for all accounts in the tenant. You need to be a tenant admin to be able to carry out this operation.
160+
1. At this stage, the permissions are assigned correctly, but since it's an external tenant, the users themselves cannot consent to these permissions. To get around this problem, we'd let the [tenant administrator consent on behalf of all users in the tenant](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent). Select the **Grant admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the requested permissions for all accounts in the tenant. You need to be a tenant admin to be able to carry out this operation.
161161
162162
##### Configure the client app (ciam-msal-javascript-spa) to use your app registration
163163

1-Authentication/1-sign-in-react/AppCreationScripts/AppCreationScripts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This sample comes with two PowerShell scripts, which automate the creation of th
3333
These scripts are:
3434

3535
- `Configure.ps1` which:
36-
- creates Azure AD applications and their related objects (permissions, dependencies, secrets, app roles),
36+
- creates Microsoft Entra applications and their related objects (permissions, dependencies, secrets, app roles),
3737
- changes the configuration files in the sample projects.
3838
- creates a summary file named `createdApps.html` in the folder from which you ran the script, and containing, for each Azure AD application it created:
3939
- the identifier of the application

1-Authentication/1-sign-in-react/AppCreationScripts/Cleanup.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Function Cleanup
1818

1919
<#
2020
.Description
21-
This function removes the Azure AD applications for the sample. These applications were created by the Configure.ps1 script
21+
This function removes the Microsoft Entra applications for the sample. These applications were created by the Configure.ps1 script
2222
#>
2323

2424
# $tenantId is the Active Directory Tenant. This is a GUID which represents the "Directory ID" of the AzureAD tenant

0 commit comments

Comments
 (0)