Skip to content

Commit edc0b0b

Browse files
change the sample's application type from web to spa (Azure#18607)
1 parent 52093b7 commit edc0b0b

File tree

7 files changed

+7
-6
lines changed

7 files changed

+7
-6
lines changed

sdk/spring/azure-spring-boot-samples/azure-spring-boot-sample-active-directory-resource-server-by-filter/README.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,15 +58,16 @@ As a first step you'll need to:
5858
1. Select **New registration**.
5959
- In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `Spring Boot Sample`.
6060
- In the **Supported account types** section, select **Accounts in any organizational directory**.
61+
- Choose **Single-page application(SPA)** as application type.
6162
- Add `http://localhost:8080` as the `Reply URL` under Redirect URI.
62-
- Select **Register** to create the application.
63-
- After creating the application, on the application **Overview** page, click the **Redirect URIs** to edit, select the **Access tokens** and **ID tokens**, and click **Save**.
63+
- Select **Register** to create the application. ![create the application](docs/application-register.png "create the application")
64+
- After creating the application, on the application **Overview** page, click the **Redirect URIs** to edit, select the **Access tokens** and **ID tokens**, and click **Save**. ![add tokens](docs/add_tokens.png "add tokens")
6465
1. On the app **Overview** page, find the **Application (client) ID** value and record it for later. You'll need it to configure the application.properties file for this project.
6566
1. On selecting your application from the the registered applcations you can see **Certificates & secrets** in left navigation pane, go to that page and in the **Client secrets** section, choose **New client secret**:
6667

6768
- Type a key description (of instance `app secret`),
68-
- Select a key duration of either **In 1 year**, **In 2 years**, or **Never Expires**.
69-
- When you press the **Add** button, the key value will be displayed, copy, and save the value in a safe location.
69+
- Select a key duration of either **In 1 year**, **In 2 years**, or **Never Expires**. ![create the secret](docs/create_secret.png "create the secret")
70+
- When you press the **Add** button, the key value will be displayed, copy, and save the value in a safe location. ![secret value](docs/secret_value.png "secret value")
7071
- You'll need this key later to configure the project. This key value will not be displayed again, nor retrievable by any other means,
7172
so record it as soon as it is visible from the Azure portal.
7273

@@ -75,12 +76,12 @@ As a first step you'll need to:
7576
- Ensure that the **Microsoft APIs** tab is selected
7677
- In the *Commonly used Microsoft APIs* section, click on **Microsoft Graph**
7778
- In the **Delegated permissions** section, ensure that the right permissions are checked: **Directory.AccessAsUser.All**
78-
- Select the **Add permissions** button
79+
- Select the **Add permissions** button ![add permissions](docs/add_permissions.png "add permissions")
7980

8081
1. At this stage permissions are assigned correctly but the client app does not allow interaction.
8182
Therefore no consent can be presented via a UI and accepted to use the service app.
8283
Click the **Grant/revoke admin consent for {tenant}** button, and then select **Yes** when you are asked if you want to grant consent for the
83-
requested permissions for all account in the tenant.
84+
requested permissions for all account in the tenant. ![grant admin consent](docs/grant_admin_consent.png "grant admin consent")
8485
You need to be an Azure AD tenant admin to do this.
8586

8687
---
163 KB
Loading
126 KB
Loading
Loading
77.8 KB
Loading
Loading
84.2 KB
Loading

0 commit comments

Comments
 (0)