Skip to content

Commit ca3aa52

Browse files
author
Tiago Brenck
committed
Update readme
1 parent 764e654 commit ca3aa52

File tree

6 files changed

+17
-3
lines changed

6 files changed

+17
-3
lines changed

2-WebApp-graph-user/2-3-Multi-Tenant/README.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,19 @@ endpoint: Microsoft identity platform
88
---
99

1010

11-
# An ASP.NET Core Web app signing-in users in any org with the Microsoft identity platform
11+
# Build a multi-tenant SaaS web application that calls Microsoft Graph using Azure AD & OpenID Connect
1212

1313
> This sample is for Azure AD, not Azure AD B2C.
1414
1515
[![Build status](https://identitydivision.visualstudio.com/IDDP/_apis/build/status/AAD%20Samples/.NET%20client%20samples/ASP.NET%20Core%20Web%20App%20tutorial)](https://identitydivision.visualstudio.com/IDDP/_build/latest?definitionId=819)
1616

1717
## Scenario
1818

19-
This sample shows how to build a .NET Core MVC Web app that uses OpenID Connect to sign in users from multi-tenants. Users can use a work and school accounts from any company or organization that has integrated with Azure Active Directory. It leverages the ASP.NET Core OpenID Connect middleware.
19+
This sample shows how to build a .NET Core MVC web application that uses OpenID Connect to sign in users from multi-tenants in Azure Active Directory. It leverages the ASP.NET Core OpenID Connect middleware. Additionally it also introduces developers to the concept of a [multi-tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/single-and-multi-tenant-apps) application.
2020

21-
![Sign in with Azure AD](ReadmeFiles/sign-in.png)
21+
For more information about apps and tenancy, see [Tenancy in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/single-and-multi-tenant-apps)
22+
23+
![Sign in with Azure AD](ReadmeFiles/topology.png)
2224

2325
## How to run this sample
2426

@@ -139,10 +141,22 @@ Ideally, you would want to have two Azure AD tenants so you can test the multi-t
139141

140142
Users can only sign-in if their tenant had been onboarded. The sample will guide them how to do so, but it requires a **tenant admin account** to complete the onboarding process. Once the admin have consented, all users from their tenant will be able to sign-in.
141143

144+
If you try to sign-in for the first time without an admin account, you will be presented with the following screen. Please switch to an admin account for this step:
145+
146+
![Admin Approval](ReadmeFiles/admin-approval.png)
147+
148+
If you try to sign-in with a tenant that haven't been onboarded yet, you will land in this page. Please click on **Take me to the onboarding process** button and follow the instructions to get your tenant registered in the sample database:
149+
150+
![Unauthorized Tenant](ReadmeFiles/unauthorized-tenant.png)
151+
142152
#### Todo List
143153

144154
Users from one tenant can't see todo items from other tenants. They will be able to perform basic CRUD operations on todo items assigned to them. When editing a todo item, users can assign it to any other user from their tenant. The list of users is coming from Microsoft Graph, using the [Graph SDK](https://github.com/microsoftgraph/msgraph-sdk-dotnet).
145155

156+
The list of users will be presented in the dropdown:
157+
158+
![Todo Edit](ReadmeFiles/todo-edit.png)
159+
146160
## About The code
147161

148162
This sample covers the following topics on a multi-tenant app.
Loading
Binary file not shown.
Loading
Loading
Loading

0 commit comments

Comments
 (0)