Skip to content

Commit 3ef8aab

Browse files
committed
Renamings:
- AddMicrosoftIdentityPlatformAuthentication => AddSignIn - AddMsal => AddWebAppCallProtectedWebApi
1 parent db10333 commit 3ef8aab

File tree

34 files changed

+69
-68
lines changed

34 files changed

+69
-68
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,3 +122,4 @@
122122
/2-WebApp-graph-user/2-3-Multi-Tenant/.vs/WebApp-OpenIDConnect-DotNet
123123
/2-WebApp-graph-user/2-3-Multi-Tenant/bin/Debug/netcoreapp2.2
124124
/2-WebApp-graph-user/2-3-Multi-Tenant/obj
125+
/Microsoft.Identity.Web.Test/bin/Release/netcoreapp3.0

1-WebApp-OIDC/1-1-MyOrg/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ cd "1-WebApp-OIDC\1-1-MyOrg"
163163
by this line:
164164
165165
```CSharp
166-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
166+
services.AddSignIn(Configuration);
167167
```
168168
169169
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.

1-WebApp-OIDC/1-1-MyOrg/Startup.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ public void ConfigureServices(IServiceCollection services)
3030
});
3131

3232
// Sign-in users with the Microsoft identity platform
33-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
33+
services.AddSignIn(Configuration);
3434

3535
services.AddControllersWithViews(options =>
3636
{

1-WebApp-OIDC/1-2-AnyOrg/README-1-1-to-1-2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,14 @@ The actual sign-in audience (accounts to sign-in) is the lowest set of what is s
4848

4949
In order to restrict users from specific organizations to sign-in to your web app, you'll need to follow the steps above, and customize a bit more the code to restrict the valid token issuers. The token issuers are really the tenanted Azure AD authority which are allowed to issue a token to access your web application.
5050

51-
In the `Startup.cs` file, in the `ConfigureServices` method, after `services.AddMicrosoftIdentityPlatformAuthentication(Configuration)` add some code to validate specific issuers by overriding the `TokenValidationParameters.IssuerValidator` delegate.
51+
In the `Startup.cs` file, in the `ConfigureServices` method, after `services.AddSignIn(Configuration)` add some code to validate specific issuers by overriding the `TokenValidationParameters.IssuerValidator` delegate.
5252

5353
```CSharp
5454
public void ConfigureServices(IServiceCollection services)
5555
{
5656
...
5757
// Sign-in users with the Microsoft identity platform
58-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
58+
services.AddSignIn(Configuration);
5959

6060
// Restrict users to specific belonging to specific tenants
6161
services.Configure<OpenIdConnectOptions>(AzureADDefaults.OpenIdScheme, options =>

1-WebApp-OIDC/1-2-AnyOrg/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ cd "1-WebApp-OIDC\1-2-AnyOrg"
136136
by this line:
137137
138138
```CSharp
139-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
139+
services.AddSignIn(Configuration);
140140
```
141141
142142
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.

1-WebApp-OIDC/1-2-AnyOrg/Startup.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ public void ConfigureServices(IServiceCollection services)
3030
});
3131

3232
// Sign-in users with the Microsoft identity platform
33-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
33+
services.AddSignIn(Configuration);
3434

3535
services.AddControllersWithViews(options =>
3636
{

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ In the **appsettings.json** file:
150150
by this line:
151151
152152
```CSharp
153-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
153+
services.AddSignIn(Configuration);
154154
```
155155
156156
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.

1-WebApp-OIDC/1-3-AnyOrgOrPersonal/Startup.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ public void ConfigureServices(IServiceCollection services)
3131
});
3232

3333
// Sign-in users with the Microsoft identity platform
34-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
34+
services.AddSignIn(Configuration);
3535

3636
services.AddControllersWithViews(options =>
3737
{

1-WebApp-OIDC/1-4-Sovereign/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ cd "1-WebApp-OIDC\1-4-Sovereign"
124124
by this line:
125125
126126
```CSharp
127-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
127+
services.AddSignIn(Configuration);
128128
```
129129
130130
This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.

1-WebApp-OIDC/1-4-Sovereign/Startup.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ public void ConfigureServices(IServiceCollection services)
3131
});
3232

3333
// Sign-in users with the Microsoft identity platform
34-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration);
34+
services.AddSignIn(Configuration);
3535

3636
services.AddControllersWithViews(options =>
3737
{

1-WebApp-OIDC/1-6-SignOut/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ from <https://github.com/aspnet/AspNetCore/blob/master/src/Azure/AzureAD/Authent
5656
The ASP.NET Core OpenIdConnect middleware enables your app to intercept the call to the Microsoft identity platform logout endpoint by providing an OpenIdConnect event named `OnRedirectToIdentityProviderForSignOut`.
5757

5858
```CSharp
59-
public static IServiceCollection AddMicrosoftIdentityPlatformAuthentication(this IServiceCollection services,
59+
public static IServiceCollection AddSignIn(this IServiceCollection services,
6060
IConfiguration configuration)
6161
{
6262
services.Configure<OpenIdConnectOptions>(AzureADDefaults.OpenIdScheme, options =>
@@ -73,10 +73,10 @@ public static IServiceCollection AddMicrosoftIdentityPlatformAuthentication(this
7373

7474
### Clearing the token cache
7575

76-
Your application can also intercept the logout event, for instance to clear the entry of the token cache associated with the account that signed out. We'll see in the second part of this tutorial (about the Web app calling a Web API), that the web app will store access tokens for the user in a cache. Intercepting the logout callback enables your web application to remove the user from the token cache. This is illustrated in the `AddMsal()` method of [StartupHelper.cs L137-143](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/b87a1d859ff9f9a4a98eb7b701e6a1128d802ec5/Microsoft.Identity.Web/StartupHelpers.cs#L137-L143)
76+
Your application can also intercept the logout event, for instance to clear the entry of the token cache associated with the account that signed out. We'll see in the second part of this tutorial (about the Web app calling a Web API), that the web app will store access tokens for the user in a cache. Intercepting the logout callback enables your web application to remove the user from the token cache. This is illustrated in the `AddWebAppCallProtectedWebApi()` method of [StartupHelper.cs L137-143](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/b87a1d859ff9f9a4a98eb7b701e6a1128d802ec5/Microsoft.Identity.Web/StartupHelpers.cs#L137-L143)
7777

7878
```CSharp
79-
public static IServiceCollection AddMsal(this IServiceCollection services, IEnumerable<string> initialScopes)
79+
public static IServiceCollection AddWebAppCallProtectedWebApi(this IServiceCollection services, IEnumerable<string> initialScopes)
8080
{
8181
services.AddTokenAcquisition();
8282

2-WebApp-graph-user/2-1-Call-MSGraph/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,8 @@ After the following lines in the ConfigureServices(IServiceCollection services)
102102
. . .
103103
// Token acquisition service based on MSAL.NET
104104
// and chosen token cache implementation
105-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
106-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
105+
services.AddSignIn(Configuration)
106+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
107107
.AddInMemoryTokenCache();
108108
```
109109

2-WebApp-graph-user/2-1-Call-MSGraph/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ public void ConfigureServices(IServiceCollection services)
3737

3838
// Token acquisition service based on MSAL.NET
3939
// and chosen token cache implementation
40-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
41-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
40+
services.AddSignIn(Configuration)
41+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
4242
.AddInMemoryTokenCaches();
4343

4444
/*

2-WebApp-graph-user/2-2-TokenCache/README-incremental-instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ public void ConfigureServices(IServiceCollection services)
9797
// Token acquisition service based on MSAL.NET
9898
// and the Sql server based token cache implementation
9999
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
100-
.AddMsal(new string[] { Constants.ScopeUserRead })
100+
.AddWebAppCallProtectedWebApi(new string[] { Constants.ScopeUserRead })
101101
.AddSqlAppTokenCache(Configuration)
102102
.AddSqlPerUserTokenCache(Configuration);
103103
```

2-WebApp-graph-user/2-2-TokenCache/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,8 +182,8 @@ public void ConfigureServices(IServiceCollection services)
182182
. . .
183183
// Token acquisition service based on MSAL.NET
184184
// and the Sql server based token cache implementation
185-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
186-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
185+
services.AddSignIn(Configuration)
186+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
187187
.AddDistributedTokenCaches();
188188

189189
services.AddDistributedSqlServerCache(options =>

2-WebApp-graph-user/2-2-TokenCache/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ dotnet tool install --global dotnet-sql-cache
4949

5050
// Token acquisition service based on MSAL.NET
5151
// and chosen token cache implementation
52-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
53-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
52+
services.AddSignIn(Configuration)
53+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
5454
.AddDistributedTokenCaches();
5555

5656
services.AddDistributedSqlServerCache(options =>

2-WebApp-graph-user/2-3-Multi-Tenant/README-National-Cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ The `https://graph.microsoft.com/.default` is a static scope that allows the ten
266266

267267
### Custom token validation allowing only registered tenants
268268

269-
On the `Startup.cs` we are calling `AddMicrosoftIdentityPlatformAuthentication` to configure the authentication, and within that method, we validates that the token issuer is from AAD.
269+
On the `Startup.cs` we are calling `AddSignIn` to configure the authentication, and within that method, we validates that the token issuer is from AAD.
270270

271271
```csharp
272272
options.TokenValidationParameters.IssuerValidator = AadIssuerValidator.GetIssuerValidator(options.Authority).Validate;

2-WebApp-graph-user/2-3-Multi-Tenant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ The `https://graph.microsoft.com/.default` is a static scope that allows the ten
242242

243243
### Custom token validation allowing only registered tenants
244244

245-
On the `Startup.cs` we are calling `AddMicrosoftIdentityPlatformAuthentication` to configure the authentication, and within that method, we validates that the token issuer is from AAD.
245+
On the `Startup.cs` we are calling `AddSignIn` to configure the authentication, and within that method, we validates that the token issuer is from AAD.
246246

247247
```csharp
248248
options.TokenValidationParameters.IssuerValidator = AadIssuerValidator.GetIssuerValidator(options.Authority).Validate;

2-WebApp-graph-user/2-3-Multi-Tenant/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,8 @@ public void ConfigureServices(IServiceCollection services)
7575
services.AddScoped<IMSGraphService, MSGraphService>();
7676

7777
// Sign-in users with the Microsoft identity platform
78-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
79-
.AddMsal(Configuration, new string[] { GraphScope.UserReadAll })
78+
services.AddSignIn(Configuration)
79+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { GraphScope.UserReadAll })
8080
.AddInMemoryTokenCaches();
8181

8282
services.Configure<OpenIdConnectOptions>(AzureADDefaults.OpenIdScheme, options =>

2-WebApp-graph-user/2-4-Sovereign-Call-MSGraph/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ After the following lines in the ConfigureServices(IServiceCollection services)
9393
. . .
9494
// Token acquisition service based on MSAL.NET
9595
// and chosen token cache implementation
96-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
97-
.AddMsal(new string[] { Constants.ScopeUserRead })
96+
services.AddSignIn(Configuration)
97+
.AddWebAppCallProtectedWebApi(new string[] { Constants.ScopeUserRead })
9898
.AddInMemoryTokenCache();
9999
```
100100

2-WebApp-graph-user/2-4-Sovereign-Call-MSGraph/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ public void ConfigureServices(IServiceCollection services)
3636

3737
// Token acquisition service based on MSAL.NET
3838
// and chosen token cache implementation
39-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
40-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
39+
services.AddSignIn(Configuration)
40+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
4141
.AddInMemoryTokenCaches();
4242

4343
// Add Graph

3-WebApp-multi-APIs/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,16 +76,16 @@ Starting from the [previous phase of the tutorial](../../2-WebApp-graph-user/2-1
7676

7777
### Update the `Startup.cs` file to enable TokenAcquisition by a MSAL.NET based service
7878

79-
After the following lines in the ConfigureServices(IServiceCollection services) method, after `services.AddMicrosoftIdentityPlatformAuthentication(Configuration);`, add `services.AddHttpClient<IArmOperations, ArmApiOperationService>();`:
79+
After the following lines in the ConfigureServices(IServiceCollection services) method, after `services.AddSignIn(Configuration);`, add `services.AddHttpClient<IArmOperations, ArmApiOperationService>();`:
8080

8181
```CSharp
8282
public void ConfigureServices(IServiceCollection services)
8383
{
8484
. . .
8585
// Token acquisition service based on MSAL.NET
8686
// and chosen token cache implementation
87-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
88-
.AddMsal(new string[] { Constants.ScopeUserRead })
87+
services.AddSignIn(Configuration)
88+
.AddWebAppCallProtectedWebApi(new string[] { Constants.ScopeUserRead })
8989
.AddInMemoryTokenCache();
9090
services.AddHttpClient<IArmOperations, ArmApiOperationService>();
9191
```

3-WebApp-multi-APIs/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ public void ConfigureServices(IServiceCollection services)
3737

3838
// Token acquisition service based on MSAL.NET
3939
// and chosen token cache implementation
40-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
41-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
40+
services.AddSignIn(Configuration)
41+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
4242
.AddInMemoryTokenCaches();
4343

4444
// Add APIs

4-WebApp-your-API/Client/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ public void ConfigureServices(IServiceCollection services)
4444

4545
// Token acquisition service based on MSAL.NET
4646
// and chosen token cache implementation
47-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
48-
.AddMsal(Configuration, new string[] { Configuration["TodoList:TodoListScope"] })
47+
services.AddSignIn(Configuration)
48+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Configuration["TodoList:TodoListScope"] })
4949
.AddInMemoryTokenCaches();
5050

5151
// Add APIs

4-WebApp-your-API/README-incremental-instructions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -207,8 +207,8 @@ Add a reference to the `Microsoft.Identity.Web` library if not already present.
207207
1. Update the `configureServices` method in `startup.cs` to add the MSAL library and a token cache.
208208

209209
```CSharp
210-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
211-
.AddMsal(new string[] { Configuration["TodoList:TodoListScope"] })
210+
services.AddSignIn(Configuration)
211+
.AddWebAppCallProtectedWebApi(new string[] { Configuration["TodoList:TodoListScope"] })
212212
.AddInMemoryTokenCaches();
213213
```
214214

4-WebApp-your-API/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -248,8 +248,8 @@ NOTE: Remember, the To-Do list is stored in memory in this `TodoListService` app
248248
by this line:
249249
250250
```CSharp
251-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
252-
.AddMsal(new string[] { Configuration["TodoList:TodoListScope"] })
251+
services.AddSignIn(Configuration)
252+
.AddWebAppCallProtectedWebApi(new string[] { Configuration["TodoList:TodoListScope"] })
253253
.AddInMemoryTokenCaches();
254254
```
255255
@@ -279,8 +279,8 @@ NOTE: Remember, the To-Do list is stored in memory in this `TodoListService` app
279279
1. Update the `configureServices` method in `startup.cs` to add the MSAL library and a token cache.
280280

281281
```CSharp
282-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
283-
.AddMsal(new string[] { Configuration["TodoList:TodoListScope"] })
282+
services.AddSignIn(Configuration)
283+
.AddWebAppCallProtectedWebApi(new string[] { Configuration["TodoList:TodoListScope"] })
284284
.AddInMemoryTokenCaches();
285285
```
286286
1. Update the `Configure` method to include **app.UseAuthentication();** before **app.UseMvc();**

5-WebApp-AuthZ/5-1-Roles/README-incremental-instructions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ The asp.net middleware supports roles populated from claims by specifying the cl
178178
```CSharp
179179

180180
// Startup.cs
181-
public static IServiceCollection AddMicrosoftIdentityPlatformAuthentication(this IServiceCollection services, IConfiguration configuration, X509Certificate2 tokenDecryptionCertificate = null)
181+
public static IServiceCollection AddSignIn(this IServiceCollection services, IConfiguration configuration, X509Certificate2 tokenDecryptionCertificate = null)
182182
{
183183
// [removed for] brevity
184184
@@ -232,8 +232,8 @@ The following files have the code that would be of interest to you.
232232
// by this line:
233233
234234
//This enables your application to use the Microsoft identity platform endpoint. This endpoint is capable of signing-in users both with their Work and School and Microsoft Personal accounts.
235-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
236-
.AddMsal(Configuration, new string[] { "User.Read", "Directory.Read.All" }) // Adds support for the MSAL library with the permissions necessary to retrieve the signed-in user's group info in case of a token overage
235+
services.AddSignIn(Configuration)
236+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { "User.Read", "Directory.Read.All" }) // Adds support for the MSAL library with the permissions necessary to retrieve the signed-in user's group info in case of a token overage
237237
.AddInMemoryTokenCaches(); // Adds aspnetcore MemoryCache as Token cache provider for MSAL.
238238
239239
services.AddMSGraphService(Configuration); // Adds the IMSGraphService as an available service for this app.

5-WebApp-AuthZ/5-1-Roles/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ The asp.net middleware supports roles populated from claims by specifying the cl
253253
```CSharp
254254

255255
// Startup.cs
256-
public static IServiceCollection AddMicrosoftIdentityPlatformAuthentication(this IServiceCollection services, IConfiguration configuration, X509Certificate2 tokenDecryptionCertificate = null)
256+
public static IServiceCollection AddSignIn(this IServiceCollection services, IConfiguration configuration, X509Certificate2 tokenDecryptionCertificate = null)
257257
{
258258
// [removed for] brevity
259259

5-WebApp-AuthZ/5-1-Roles/Startup.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ public void ConfigureServices(IServiceCollection services)
4646

4747
// Token acquisition service based on MSAL.NET
4848
// and chosen token cache implementation
49-
services.AddMicrosoftIdentityPlatformAuthentication(Configuration)
50-
.AddMsal(Configuration, new string[] { Constants.ScopeUserRead })
49+
services.AddSignIn(Configuration)
50+
.AddWebAppCallProtectedWebApi(Configuration, new string[] { Constants.ScopeUserRead })
5151
.AddInMemoryTokenCaches();
5252

5353
// Add Graph

0 commit comments

Comments
 (0)