Welcome
-Learn about building Web apps with ASP.NET Core.
+Learn about building Web apps with ASP.NET Core.
Welcome
-Learn about building Web apps with ASP.NET Core.
+Learn about building Web apps with ASP.NET Core.
@@ -1909,7 +1909,7 @@
For this session cache to work effectively the ASP.NET Core session has to be configured properly.
- The latest guidance is provided at https://docs.microsoft.com/aspnet/core/fundamentals/app-state.
+ The latest guidance is provided at https://learn.microsoft.com/aspnet/core/fundamentals/app-state.
In the method public void ConfigureServices(IServiceCollection services) in Startup.cs, add the following:
@@ -1933,7 +1933,7 @@
For this session cache to work effectively the ASP.NET Core session has to be configured properly.
- The latest guidance is provided at https://docs.microsoft.com/aspnet/core/fundamentals/app-state.
+ The latest guidance is provided at https://learn.microsoft.com/aspnet/core/fundamentals/app-state.
In the method public void ConfigureServices(IServiceCollection services) in Startup.cs, add the following:
diff --git a/src/Microsoft.Identity.Web/Resource/RolesRequiredHttpContextExtensions.cs b/src/Microsoft.Identity.Web/Resource/RolesRequiredHttpContextExtensions.cs
index 6ffdf7517..9a682985b 100644
--- a/src/Microsoft.Identity.Web/Resource/RolesRequiredHttpContextExtensions.cs
+++ b/src/Microsoft.Identity.Web/Resource/RolesRequiredHttpContextExtensions.cs
@@ -36,7 +36,7 @@ public static void ValidateAppRole(this HttpContext context, params string[] acc
IEnumerable userClaims;
ClaimsPrincipal user;
- // Need to lock due to https://docs.microsoft.com/en-us/aspnet/core/performance/performance-best-practices?#do-not-access-httpcontext-from-multiple-threads
+ // Need to lock due to https://learn.microsoft.com/aspnet/core/performance/performance-best-practices?#do-not-access-httpcontext-from-multiple-threads
lock (context)
{
user = context.User;
diff --git a/src/Microsoft.Identity.Web/Resource/ScopesRequiredHttpContextExtensions.cs b/src/Microsoft.Identity.Web/Resource/ScopesRequiredHttpContextExtensions.cs
index d0f20f6dc..abef5025a 100644
--- a/src/Microsoft.Identity.Web/Resource/ScopesRequiredHttpContextExtensions.cs
+++ b/src/Microsoft.Identity.Web/Resource/ScopesRequiredHttpContextExtensions.cs
@@ -43,7 +43,7 @@ public static void VerifyUserHasAnyAcceptedScope(this HttpContext context, param
IEnumerable userClaims;
ClaimsPrincipal user;
- // Need to lock due to https://docs.microsoft.com/en-us/aspnet/core/performance/performance-best-practices?#do-not-access-httpcontext-from-multiple-threads
+ // Need to lock due to https://learn.microsoft.com/aspnet/core/performance/performance-best-practices?#do-not-access-httpcontext-from-multiple-threads
lock (context)
{
user = context.User;
diff --git a/src/Microsoft.Identity.Web/TokenCacheProviders/Session/MsalSessionTokenCacheProvider.cs b/src/Microsoft.Identity.Web/TokenCacheProviders/Session/MsalSessionTokenCacheProvider.cs
index bff9d251f..2e035a5f2 100644
--- a/src/Microsoft.Identity.Web/TokenCacheProviders/Session/MsalSessionTokenCacheProvider.cs
+++ b/src/Microsoft.Identity.Web/TokenCacheProviders/Session/MsalSessionTokenCacheProvider.cs
@@ -14,7 +14,7 @@ namespace Microsoft.Identity.Web.TokenCacheProviders.Session
///
///
/// For this session cache to work effectively, the ASP.NET Core session has to be configured properly.
- /// The latest guidance is provided at https://docs.microsoft.com/aspnet/core/fundamentals/app-state
+ /// The latest guidance is provided at https://learn.microsoft.com/aspnet/core/fundamentals/app-state.
///
/// In the method public void ConfigureServices(IServiceCollection services) in Startup.cs, add the following:
///
diff --git a/src/Microsoft.Identity.Web/TokenCacheProviders/Session/SessionTokenCacheProviderExtension.cs b/src/Microsoft.Identity.Web/TokenCacheProviders/Session/SessionTokenCacheProviderExtension.cs
index ca31cb372..2a2881255 100644
--- a/src/Microsoft.Identity.Web/TokenCacheProviders/Session/SessionTokenCacheProviderExtension.cs
+++ b/src/Microsoft.Identity.Web/TokenCacheProviders/Session/SessionTokenCacheProviderExtension.cs
@@ -19,7 +19,7 @@ public static class SessionTokenCacheProviderExtension
///
///
/// For this session cache to work effectively the ASP.NET Core session has to be configured properly.
- /// The latest guidance is provided at https://docs.microsoft.com/aspnet/core/fundamentals/app-state.
+ /// The latest guidance is provided at https://learn.microsoft.com/aspnet/core/fundamentals/app-state.
///
/// In the method public void ConfigureServices(IServiceCollection services) in Startup.cs, add the following:
///
@@ -46,7 +46,7 @@ public static IServiceCollection AddSessionAppTokenCache(this IServiceCollection
///
///
/// For this session cache to work effectively the ASP.NET Core session has to be configured properly.
- /// The latest guidance is provided at https://docs.microsoft.com/aspnet/core/fundamentals/app-state.
+ /// The latest guidance is provided at https://learn.microsoft.com/aspnet/core/fundamentals/app-state.
///
/// In the method public void ConfigureServices(IServiceCollection services) in Startup.cs, add the following:
///
diff --git a/tests/DevApps/AjaxCallActionsWithDynamicConsent/Views/Home/Index.cshtml b/tests/DevApps/AjaxCallActionsWithDynamicConsent/Views/Home/Index.cshtml
index 0d8ce1466..ac669910e 100644
--- a/tests/DevApps/AjaxCallActionsWithDynamicConsent/Views/Home/Index.cshtml
+++ b/tests/DevApps/AjaxCallActionsWithDynamicConsent/Views/Home/Index.cshtml
@@ -4,7 +4,7 @@
Welcome
- Learn about building Web apps with ASP.NET Core.
+ Learn about building Web apps with ASP.NET Core.
@section Scripts {
diff --git a/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/css/site.css b/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/css/site.css
index e679a8ea7..eca3c55c4 100644
--- a/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/css/site.css
+++ b/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/css/site.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
for details on configuring this project to bundle and minify static web assets. */
a.navbar-brand {
diff --git a/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/js/site.js b/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/js/site.js
+++ b/tests/DevApps/AjaxCallActionsWithDynamicConsent/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs b/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
index edd668c3e..fa38ae502 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
+++ b/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
@@ -34,7 +34,7 @@ public void ConfigureServices(IServiceCollection services)
// This lambda determines whether user consent for non-essential cookies is needed for a given request.
options.CheckConsentNeeded = context => true;
options.MinimumSameSitePolicy = SameSiteMode.Unspecified;
- // Handling SameSite cookie according to https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1
+ // Handling SameSite cookie according to https://learn.microsoft.com/aspnet/core/security/samesite
options.HandleSameSiteCookieCompatibility();
});
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/css/site.css b/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/css/site.css
index e89c7811c..6ad3c45e0 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/css/site.css
+++ b/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/css/site.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification\
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
for details on configuring this project to bundle and minify static web assets. */
body {
padding-top: 50px;
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/js/site.js b/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/js/site.js
+++ b/tests/DevApps/B2CWebAppCallsWebApi/Client/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/README-incremental-instructions.md b/tests/DevApps/B2CWebAppCallsWebApi/README-incremental-instructions.md
index f2f070e53..df989dec1 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/README-incremental-instructions.md
+++ b/tests/DevApps/B2CWebAppCallsWebApi/README-incremental-instructions.md
@@ -16,7 +16,7 @@ endpoint: Microsoft identity platform
## About this sample
-This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
+This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
### Scenario
@@ -25,7 +25,7 @@ to use your Web API. Your API calls a downstream API (Microsoft Graph) to provid
### Overview
-This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
+This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
The client web application essentially takes the following steps to sign-in the user and obtain a bearer token for the Web API:
@@ -304,15 +304,15 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
For more information, visit the following links:
- Articles about the new Microsoft identity platform are at [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
- - [Azure AD OAuth Bearer protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols)
- - [The OAuth 2.0 protocol in Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow)
- - [Access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens)
- - [The OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc)
+ - [Azure AD OAuth Bearer protocol](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols)
+ - [The OAuth 2.0 protocol in Azure AD](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow)
+ - [Access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens)
+ - [The OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc)
- To lean more about the application registration, visit:
- - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app)
- - [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
- - [Quickstart: Configure an application to expose web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
+ - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+ - [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+ - [Quickstart: Configure an application to expose web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
- To learn more about the code, visit:
- [Conceptual documentation for MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki#conceptual-documentation) and in particular:
@@ -320,6 +320,6 @@ For more information, visit the following links:
- [Customizing Token cache serialization](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/token-cache-serialization)
- To learn more about security in aspnetcore,
- - [Introduction to Identity on ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity?view=aspnetcore-2.1&tabs=visual-studio%2Caspnetcore2x)
- - [AuthenticationBuilder](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder?view=aspnetcore-2.0)
- - [Azure Active Directory with ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/azure-active-directory/?view=aspnetcore-2.1)
+ - [Introduction to Identity on ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/identity/)
+ - [AuthenticationBuilder](https://learn.microsoft.com/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder)
+ - [Azure Active Directory with ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/azure-active-directory/)
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/README.md b/tests/DevApps/B2CWebAppCallsWebApi/README.md
index 579f7cad6..2a95905f5 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/README.md
+++ b/tests/DevApps/B2CWebAppCallsWebApi/README.md
@@ -22,11 +22,11 @@ This sample is essentially a guide for developers who want to secure their Web A
### Scenario
-This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
+This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
### Overview
-This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
+This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
The client web application essentially takes the following steps to sign-in the user and obtain a bearer token for the Web API:
@@ -94,7 +94,7 @@ Copy this policy name, so you can use it in step 5.
### Step 4: Create your own Web app
-Now you need to [register your web app in your B2C tenant](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-app-registration#register-a-web-application), so that it has its own Application ID.
+Now you need to [register your web app in your B2C tenant](https://learn.microsoft.com/azure/active-directory-b2c/active-directory-b2c-app-registration#register-a-web-application), so that it has its own Application ID.
Your web application registration should include the following information:
@@ -377,15 +377,15 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
For more information, visit the following links:
- Articles about the Microsoft identity platform are at [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
- - [Azure AD OAuth Bearer protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols)
- - [The OAuth 2.0 protocol in Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow)
- - [Access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens)
- - [The OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc)
+ - [Azure AD OAuth Bearer protocol](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols)
+ - [The OAuth 2.0 protocol in Azure AD](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow)
+ - [Access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens)
+ - [The OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc)
- To lean more about the application registration, visit:
- - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app)
- - [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
- - [Quickstart: Configure an application to expose web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
+ - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+ - [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+ - [Quickstart: Configure an application to expose web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
- To learn more about the code, visit:
- [Conceptual documentation for MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki#conceptual-documentation) and in particular:
@@ -393,6 +393,6 @@ For more information, visit the following links:
- [Customizing Token cache serialization](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/token-cache-serialization)
- To learn more about security in aspnetcore,
- - [Introduction to Identity on ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity?view=aspnetcore-2.1&tabs=visual-studio%2Caspnetcore2x)
- - [AuthenticationBuilder](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder?view=aspnetcore-2.0)
- - [Azure Active Directory with ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/azure-active-directory/?view=aspnetcore-2.1)
+ - [Introduction to Identity on ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/identity/)
+ - [AuthenticationBuilder](https://learn.microsoft.com/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder)
+ - [Azure Active Directory with ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/azure-active-directory/)
diff --git a/tests/DevApps/MultipleAuthSchemes/Views/Home/Index.cshtml b/tests/DevApps/MultipleAuthSchemes/Views/Home/Index.cshtml
index 0a94fe87c..6f29c1b58 100644
--- a/tests/DevApps/MultipleAuthSchemes/Views/Home/Index.cshtml
+++ b/tests/DevApps/MultipleAuthSchemes/Views/Home/Index.cshtml
@@ -4,7 +4,7 @@
Welcome
- Learn about building Web apps with ASP.NET Core.
+ Learn about building Web apps with ASP.NET Core.
Api result
diff --git a/tests/DevApps/MultipleAuthSchemes/Views/HomeB2C/Index.cshtml b/tests/DevApps/MultipleAuthSchemes/Views/HomeB2C/Index.cshtml
index 5fe085f19..4f005744d 100644
--- a/tests/DevApps/MultipleAuthSchemes/Views/HomeB2C/Index.cshtml
+++ b/tests/DevApps/MultipleAuthSchemes/Views/HomeB2C/Index.cshtml
@@ -4,7 +4,7 @@
Welcome
- Learn about building Web apps with ASP.NET Core and AAD B2C.
+ Learn about building Web apps with ASP.NET Core and AAD B2C.
Api result
diff --git a/tests/DevApps/MultipleAuthSchemes/wwwroot/css/site.css b/tests/DevApps/MultipleAuthSchemes/wwwroot/css/site.css
index e679a8ea7..eca3c55c4 100644
--- a/tests/DevApps/MultipleAuthSchemes/wwwroot/css/site.css
+++ b/tests/DevApps/MultipleAuthSchemes/wwwroot/css/site.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
for details on configuring this project to bundle and minify static web assets. */
a.navbar-brand {
diff --git a/tests/DevApps/MultipleAuthSchemes/wwwroot/js/site.js b/tests/DevApps/MultipleAuthSchemes/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/MultipleAuthSchemes/wwwroot/js/site.js
+++ b/tests/DevApps/MultipleAuthSchemes/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tests/DevApps/WebAppCallsMicrosoftGraph/Pages/Index.cshtml b/tests/DevApps/WebAppCallsMicrosoftGraph/Pages/Index.cshtml
index 018f3fcee..05da6d682 100644
--- a/tests/DevApps/WebAppCallsMicrosoftGraph/Pages/Index.cshtml
+++ b/tests/DevApps/WebAppCallsMicrosoftGraph/Pages/Index.cshtml
@@ -8,7 +8,7 @@
Welcome
- @name, Learn about building Web apps with ASP.NET Core.
+ @name, Learn about building Web apps with ASP.NET Core.
result = @json
diff --git a/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/css/site.css b/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/css/site.css
index e679a8ea7..eca3c55c4 100644
--- a/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/css/site.css
+++ b/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/css/site.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
for details on configuring this project to bundle and minify static web assets. */
a.navbar-brand {
diff --git a/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/js/site.js b/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/js/site.js
+++ b/tests/DevApps/WebAppCallsMicrosoftGraph/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
index 578c26e3e..2f36cae6d 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
@@ -37,7 +37,7 @@ public void ConfigureServices(IServiceCollection services)
// This lambda determines whether user consent for non-essential cookies is needed for a given request.
options.CheckConsentNeeded = context => true;
options.MinimumSameSitePolicy = SameSiteMode.Unspecified;
- // Handling SameSite cookie according to https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1
+ // Handling SameSite cookie according to https://learn.microsoft.com/aspnet/core/security/samesite
options.HandleSameSiteCookieCompatibility();
});
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/css/site.css b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/css/site.css
index e89c7811c..63359163a 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/css/site.css
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/css/site.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification\
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification\
for details on configuring this project to bundle and minify static web assets. */
body {
padding-top: 50px;
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/js/site.js b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/js/site.js
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/README-incremental-instructions.md b/tests/DevApps/WebAppCallsWebApiCallsGraph/README-incremental-instructions.md
index f2f070e53..df989dec1 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/README-incremental-instructions.md
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/README-incremental-instructions.md
@@ -16,7 +16,7 @@ endpoint: Microsoft identity platform
## About this sample
-This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
+This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
### Scenario
@@ -25,7 +25,7 @@ to use your Web API. Your API calls a downstream API (Microsoft Graph) to provid
### Overview
-This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
+This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
The client web application essentially takes the following steps to sign-in the user and obtain a bearer token for the Web API:
@@ -304,15 +304,15 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
For more information, visit the following links:
- Articles about the new Microsoft identity platform are at [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
- - [Azure AD OAuth Bearer protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols)
- - [The OAuth 2.0 protocol in Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow)
- - [Access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens)
- - [The OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc)
+ - [Azure AD OAuth Bearer protocol](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols)
+ - [The OAuth 2.0 protocol in Azure AD](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow)
+ - [Access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens)
+ - [The OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc)
- To lean more about the application registration, visit:
- - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app)
- - [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
- - [Quickstart: Configure an application to expose web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
+ - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+ - [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+ - [Quickstart: Configure an application to expose web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
- To learn more about the code, visit:
- [Conceptual documentation for MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki#conceptual-documentation) and in particular:
@@ -320,6 +320,6 @@ For more information, visit the following links:
- [Customizing Token cache serialization](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/token-cache-serialization)
- To learn more about security in aspnetcore,
- - [Introduction to Identity on ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity?view=aspnetcore-2.1&tabs=visual-studio%2Caspnetcore2x)
- - [AuthenticationBuilder](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder?view=aspnetcore-2.0)
- - [Azure Active Directory with ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/azure-active-directory/?view=aspnetcore-2.1)
+ - [Introduction to Identity on ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/identity/)
+ - [AuthenticationBuilder](https://learn.microsoft.com/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder)
+ - [Azure Active Directory with ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/azure-active-directory/)
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md b/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
index 0fd7a1de9..ef13eb83d 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
@@ -22,11 +22,11 @@ This sample is essentially a guide for developers who want to secure their Web A
### Scenario
-This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
+This sample has a web api and a client web app, both built using the asp.net core platform. The client app signs in users using the [OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc) flow and in this process obtains (and caches) an [access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens) for the web api. The client app has a ToDo list that the web app users can work with. This ToDo list is maintained in an in-memory list on the Web API. The client app calls the webApi for all operations on the ToDo list.
### Overview
-This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
+This sample presents a Web API running on ASP.NET Core, protected by [Azure AD OAuth Bearer](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols) Authentication. The client application uses [MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library to obtain a JWT access token through using the [OAuth 2.0](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) protocol flow.
The client web application essentially takes the following steps to sign-in the user and obtain a bearer token for the Web API:
@@ -148,7 +148,7 @@ As a first step you'll need to:
- `https://localhost:44321/signin-oidc`
- In the **Advanced settings** section set **Logout URL** to `https://localhost:44321/signout-oidc`
- In the **Advanced settings** | **Implicit grant** section, check **ID tokens** as this sample requires
- the [Implicit grant flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
+ the [Implicit grant flow](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-implicit-grant-flow) to be enabled to
sign-in the user, and call an API.
1. Select **Save**.
1. From the **Certificates & secrets** page, in the **Client secrets** section, choose **New client secret**:
@@ -443,15 +443,15 @@ This project has adopted the [Microsoft Open Source Code of Conduct](https://ope
For more information, visit the following links:
- Articles about the Microsoft identity platform are at [http://aka.ms/aaddevv2](http://aka.ms/aaddevv2), with a focus on:
- - [Azure AD OAuth Bearer protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols)
- - [The OAuth 2.0 protocol in Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow)
- - [Access token](https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens)
- - [The OpenID Connect protocol](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc)
+ - [Azure AD OAuth Bearer protocol](https://learn.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols)
+ - [The OAuth 2.0 protocol in Azure AD](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow)
+ - [Access token](https://learn.microsoft.com/azure/active-directory/develop/access-tokens)
+ - [The OpenID Connect protocol](https://learn.microsoft.com/azure/active-directory/develop/v2-protocols-oidc)
- To lean more about the application registration, visit:
- - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app)
- - [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
- - [Quickstart: Configure an application to expose web APIs (Preview)](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
+ - [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+ - [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+ - [Quickstart: Configure an application to expose web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-expose-web-apis)
- To learn more about the code, visit:
- [Conceptual documentation for MSAL.NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki#conceptual-documentation) and in particular:
@@ -459,6 +459,6 @@ For more information, visit the following links:
- [Customizing Token cache serialization](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/token-cache-serialization)
- To learn more about security in aspnetcore,
- - [Introduction to Identity on ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity?view=aspnetcore-2.1&tabs=visual-studio%2Caspnetcore2x)
- - [AuthenticationBuilder](https://docs.microsoft.com/en-us/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder?view=aspnetcore-2.0)
- - [Azure Active Directory with ASP.NET Core](https://docs.microsoft.com/en-us/aspnet/core/security/authentication/azure-active-directory/?view=aspnetcore-2.1)
+ - [Introduction to Identity on ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/identity/)
+ - [AuthenticationBuilder](https://learn.microsoft.com/dotnet/api/microsoft.aspnetcore.authentication.authenticationbuilder)
+ - [Azure Active Directory with ASP.NET Core](https://learn.microsoft.com/aspnet/core/security/authentication/azure-active-directory/)
diff --git a/tests/DevApps/blazorserver-calls-api/README-Incremental.md b/tests/DevApps/blazorserver-calls-api/README-Incremental.md
index 96ea9756a..1240bbe95 100644
--- a/tests/DevApps/blazorserver-calls-api/README-Incremental.md
+++ b/tests/DevApps/blazorserver-calls-api/README-Incremental.md
@@ -66,10 +66,10 @@ cd ms-identity-blazor-server\WebApp-your-API\MyOrg
1. In the app's registration screen, find and note the **Application (client) ID**. You use this value in your app's configuration file(s) later in your code.
1. Select **Save** to save your changes.
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can declare the parameters to expose this app as an Api for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for.
-The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this Api. To declare an resource URI, follow the following steps:
+The first thing that we need to do is to declare the unique [resource](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this Api. To declare an resource URI, follow the following steps:
- Select `Set` next to the **Application ID URI** to generate a URI that is unique for this app.
- For this sample, accept the proposed Application ID URI (api://{clientId}) by selecting **Save**.
-1. All Apis have to publish a minimum of one [scope](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
+1. All Apis have to publish a minimum of one [scope](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
- Select **Add a scope** button open the **Add a scope** screen and Enter the values as indicated below:
- For **Scope name**, use `access_as_user`.
- Select **Admins and users** options for **Who can consent?**
@@ -161,7 +161,7 @@ dotnet dev-certs https --clean
dotnet dev-certs https --trust
```
-Learn more about [HTTPS in .NET Core](https://docs.microsoft.com/aspnet/core/security/enforcing-ssl).
+Learn more about [HTTPS in .NET Core](https://learn.microsoft.com/aspnet/core/security/enforcing-ssl).
#### Step 3. Run the applications
@@ -272,12 +272,12 @@ Refer to the [Azure deployment guide](../../Deploy-to-Azure/README.md) to deploy
## More information
-- [Microsoft identity platform (Azure Active Directory for developers)](https://docs.microsoft.com/azure/active-directory/develop/)
-- [Overview of Microsoft Authentication Library (MSAL)](https://docs.microsoft.com/azure/active-directory/develop/msal-overview)
-- [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/azure/active-directory/develop/quickstart-register-app)
-- [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+- [Microsoft identity platform (Azure Active Directory for developers)](https://learn.microsoft.com/azure/active-directory/develop/)
+- [Overview of Microsoft Authentication Library (MSAL)](https://learn.microsoft.com/azure/active-directory/develop/msal-overview)
+- [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+- [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
-For more information about how OAuth 2.0 protocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios).
+For more information about how OAuth 2.0 protocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://learn.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios).
## Community Help and Support
diff --git a/tests/DevApps/blazorserver-calls-api/README.md b/tests/DevApps/blazorserver-calls-api/README.md
index dcef9a6a3..1959fff28 100644
--- a/tests/DevApps/blazorserver-calls-api/README.md
+++ b/tests/DevApps/blazorserver-calls-api/README.md
@@ -46,7 +46,7 @@ This sample demonstrates an ASP.NET Core Blazor Server application calling an AS
## Prerequisites
- [Visual Studio](https://visualstudio.microsoft.com/downloads/)
-- An **Azure AD** tenant. For more information see: [How to get an Azure AD tenant](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
+- An **Azure AD** tenant. For more information see: [How to get an Azure AD tenant](https://learn.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
- A user account in your **Azure AD** tenant. This sample will not work with a **personal Microsoft account**. Therefore, if you signed in to the [Azure portal](https://portal.azure.com) with a personal account and have never created a user account in your directory before, you need to do that now.
## Setup
@@ -114,10 +114,10 @@ As a first step you'll need to:
1. In the app's registration screen, find and note the **Application (client) ID**. You use this value in your app's configuration file(s) later in your code.
1. Select **Save** to save your changes.
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can declare the parameters to expose this app as an Api for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for.
-The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this Api. To declare an resource URI, follow the following steps:
+The first thing that we need to do is to declare the unique [resource](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this Api. To declare an resource URI, follow the following steps:
- Select `Set` next to the **Application ID URI** to generate a URI that is unique for this app.
- For this sample, accept the proposed Application ID URI (api://{clientId}) by selecting **Save**.
-1. All Apis have to publish a minimum of one [scope](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
+1. All Apis have to publish a minimum of one [scope](https://learn.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow#request-an-authorization-code) for the client's to obtain an access token successfully. To publish a scope, follow the following steps:
- Select **Add a scope** button open the **Add a scope** screen and Enter the values as indicated below:
- For **Scope name**, use `access_as_user`.
- Select **Admins and users** options for **Who can consent?**
@@ -224,7 +224,7 @@ dotnet dev-certs https --clean
dotnet dev-certs https --trust
```
-Learn more about [HTTPS in .NET Core](https://docs.microsoft.com/aspnet/core/security/enforcing-ssl).
+Learn more about [HTTPS in .NET Core](https://learn.microsoft.com/aspnet/core/security/enforcing-ssl).
#### Step 3. Run the applications
@@ -364,12 +364,12 @@ Refer to the [Azure deployment guide](../../Deploy-to-Azure/README.md) to deploy
## More information
-- [Microsoft identity platform (Azure Active Directory for developers)](https://docs.microsoft.com/azure/active-directory/develop/)
-- [Overview of Microsoft Authentication Library (MSAL)](https://docs.microsoft.com/azure/active-directory/develop/msal-overview)
-- [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://docs.microsoft.com/azure/active-directory/develop/quickstart-register-app)
-- [Quickstart: Configure a client application to access web APIs (Preview)](https://docs.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
+- [Microsoft identity platform (Azure Active Directory for developers)](https://learn.microsoft.com/azure/active-directory/develop/)
+- [Overview of Microsoft Authentication Library (MSAL)](https://learn.microsoft.com/azure/active-directory/develop/msal-overview)
+- [Quickstart: Register an application with the Microsoft identity platform (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-register-app)
+- [Quickstart: Configure a client application to access web APIs (Preview)](https://learn.microsoft.com/azure/active-directory/develop/quickstart-configure-app-access-web-apis)
-For more information about how OAuth 2.0 protocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios).
+For more information about how OAuth 2.0 protocols work in this scenario and other scenarios, see [Authentication Scenarios for Azure AD](https://learn.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios).
## Community Help and Support
diff --git a/tests/DevApps/blazorserver2-b2c-callswebapi/Shared/MainLayout.razor b/tests/DevApps/blazorserver2-b2c-callswebapi/Shared/MainLayout.razor
index f8701e031..7217a9447 100644
--- a/tests/DevApps/blazorserver2-b2c-callswebapi/Shared/MainLayout.razor
+++ b/tests/DevApps/blazorserver2-b2c-callswebapi/Shared/MainLayout.razor
@@ -7,7 +7,7 @@
diff --git a/tests/DevApps/blazorwasm-b2c/Shared/MainLayout.razor b/tests/DevApps/blazorwasm-b2c/Shared/MainLayout.razor
index f8701e031..7217a9447 100644
--- a/tests/DevApps/blazorwasm-b2c/Shared/MainLayout.razor
+++ b/tests/DevApps/blazorwasm-b2c/Shared/MainLayout.razor
@@ -7,7 +7,7 @@
diff --git a/tests/DevApps/ciam/myWebApp/Pages/Index.cshtml b/tests/DevApps/ciam/myWebApp/Pages/Index.cshtml
index fd0fa2093..7ddbda7ab 100644
--- a/tests/DevApps/ciam/myWebApp/Pages/Index.cshtml
+++ b/tests/DevApps/ciam/myWebApp/Pages/Index.cshtml
@@ -6,7 +6,7 @@
Welcome
- Learn about building Web apps with ASP.NET Core.
+ Learn about building Web apps with ASP.NET Core.
Api result
diff --git a/tests/DevApps/ciam/myWebApp/Pages/Shared/_Layout.cshtml.css b/tests/DevApps/ciam/myWebApp/Pages/Shared/_Layout.cshtml.css
index a72cbeaf3..c187c02e0 100644
--- a/tests/DevApps/ciam/myWebApp/Pages/Shared/_Layout.cshtml.css
+++ b/tests/DevApps/ciam/myWebApp/Pages/Shared/_Layout.cshtml.css
@@ -1,4 +1,4 @@
-/* Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+/* Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
for details on configuring this project to bundle and minify static web assets. */
a.navbar-brand {
diff --git a/tests/DevApps/ciam/myWebApp/wwwroot/js/site.js b/tests/DevApps/ciam/myWebApp/wwwroot/js/site.js
index ac49c1864..093765735 100644
--- a/tests/DevApps/ciam/myWebApp/wwwroot/js/site.js
+++ b/tests/DevApps/ciam/myWebApp/wwwroot/js/site.js
@@ -1,4 +1,4 @@
-// Please see documentation at https://docs.microsoft.com/aspnet/core/client-side/bundling-and-minification
+// Please see documentation at https://learn.microsoft.com/aspnet/core/client-side/bundling-and-minification
// for details on configuring this project to bundle and minify static web assets.
// Write your JavaScript code.
diff --git a/tools/app-provisioning-tool/README.md b/tools/app-provisioning-tool/README.md
index ca9d8b473..6f7d31c81 100644
--- a/tools/app-provisioning-tool/README.md
+++ b/tools/app-provisioning-tool/README.md
@@ -55,9 +55,9 @@ dotnet tool uninstall --global msidentity-app-sync
## Pre-requisites to using the tool
Have an AAD or B2C tenant (or both).
-- If you want to add an AAD registration, you are usually already signed-in in Visual Studio in a tenant. If needed you can create your own tenant by following this quickstart [Setup a tenant](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant). But be sure to sign-out and sign-in from Visual Studio or Azure CLI so that this tenant is known in the shared token cache.
+- If you want to add an AAD registration, you are usually already signed-in in Visual Studio in a tenant. If needed you can create your own tenant by following this quickstart [Setup a tenant](https://learn.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant). But be sure to sign-out and sign-in from Visual Studio or Azure CLI so that this tenant is known in the shared token cache.
-- If you want to add an AAD B2C registration you'll need a B2C tenant, and explicity pass it to the `--tenant-id` option of the tool. As well as the sign-up/sign-in policy `--susi-policy-id`. To create a B2C tenant, see [Create a B2C tenant](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant).
+- If you want to add an AAD B2C registration you'll need a B2C tenant, and explicity pass it to the `--tenant-id` option of the tool. As well as the sign-up/sign-in policy `--susi-policy-id`. To create a B2C tenant, see [Create a B2C tenant](https://learn.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant).
## Using the tool
diff --git a/tools/app-provisioning-tool/app-provisioning-lib/MicrosoftIdentityPlatformApplication/MicrosoftIdentityPlatformApplicationManager.cs b/tools/app-provisioning-tool/app-provisioning-lib/MicrosoftIdentityPlatformApplication/MicrosoftIdentityPlatformApplicationManager.cs
index a69ff3e97..3ea23f6ce 100644
--- a/tools/app-provisioning-tool/app-provisioning-lib/MicrosoftIdentityPlatformApplication/MicrosoftIdentityPlatformApplicationManager.cs
+++ b/tools/app-provisioning-tool/app-provisioning-lib/MicrosoftIdentityPlatformApplication/MicrosoftIdentityPlatformApplicationManager.cs
@@ -338,7 +338,7 @@ private static async Task AddAdminConsentToApiPermissions(
ServicePrincipal servicePrincipal,
IEnumerable>? scopesPerResource)
{
- // Changed: https://learn.microsoft.com/en-us/graph/permissions-grant-via-msgraph?tabs=csharp&pivots=grant-application-permissions#step-2-grant-an-app-role-to-a-client-service-principal
+ // Changed: https://learn.microsoft.com/graph/permissions-grant-via-msgraph?tabs=csharp&pivots=grant-application-permissions#step-2-grant-an-app-role-to-a-client-service-principal
// Consent to the scopes
if (scopesPerResource != null)
diff --git a/tools/app-provisioning-tool/vs2019-16.9-how-to-use.md b/tools/app-provisioning-tool/vs2019-16.9-how-to-use.md
index d8d3fb9f6..3023586c7 100644
--- a/tools/app-provisioning-tool/vs2019-16.9-how-to-use.md
+++ b/tools/app-provisioning-tool/vs2019-16.9-how-to-use.md
@@ -41,9 +41,9 @@ You can also install it as an external tool in Visual Studio. For details see ht
Next, you need to sign into your Azure subscription. You can sign in with any of the following tools.
-- [Visual Studio 2019](https://docs.microsoft.com/en-us/visualstudio/ide/signing-in-to-visual-studio?view=vs-2019#how-to-sign-in-to-visual-studio)
-- [Azure CLI](https://docs.microsoft.com/en-us/cli/azure/authenticate-azure-cli)
-- [Azure PowerShell](https://docs.microsoft.com/en-us/powershell/azure/authenticate-azureps?view=azps-5.5.0)
+- [Visual Studio 2019](https://learn.microsoft.com/visualstudio/ide/signing-in-to-visual-studio?view=vs-2019#how-to-sign-in-to-visual-studio)
+- [Azure CLI](https://learn.microsoft.com/cli/azure/authenticate-azure-cli)
+- [Azure PowerShell](https://learn.microsoft.com/powershell/azure/authenticate-azureps?view=azps-5.5.0)
Once you sign in with any of these tools, you can start using the identity sync tool. Let's look at how to use the tool to provision a new App Registration and configure the project. To get a list of the available built-in options run: `msidentity-app-sync –help` (or `msidentity-app-sync -h`). The current help output is shown in the image below.
@@ -53,7 +53,7 @@ From the help output, you can see that all the options are optional. You'll typi
- The tool will detect what type of asp.net core app the project represents, the supported project types include; web (webapp and mvc templates), web API, Blazor Server and Blazor WebAssembly (hosted or not).
- The tool will detect which type of auth the project is configured for (Azure AD, Azure AD B2C)
-- A new Azure AD App registration will be created in the [home tenant](https://docs.microsoft.com/azure/active-directory/develop/single-and-multi-tenant-apps#who-can-sign-in-to-your-app) of the signed in user
+- A new Azure AD App registration will be created in the [home tenant](https://learn.microsoft.com/azure/active-directory/develop/single-and-multi-tenant-apps#who-can-sign-in-to-your-app) of the signed in user
- The project will be updated to connect the app with the Azure objects created
If you'd like to use an existing Azure AD (or Azure AD B2C) tenant or existing application, you can use the `–-tenant-id` and `–-client-id` parameters respectively. More on this later. For more info on the tool visit the [microsoft-identity-web](https://github.com/AzureAD/microsoft-identity-web/tree/master/tools/app-provisioning-tool) Github repository. Now that we've gone over the basic usage of the tool, let's go ahead and run it.
@@ -86,7 +86,7 @@ By default, the tool will create a new Azure AD or AzureAD B2C application. To u
If you would like to perform all the steps without using the provisioning tool, there are some quick start guides that you can use. The specific steps will be different based on you project type. Use the links below to get started with that.
-- Web app [Quickstart: Add sign-in with Microsoft to an ASP.NET Core web app - Microsoft identity platform | Microsoft Docs](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-v2-aspnet-core-webapp)
-- Web API [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform - Microsoft identity platform | Microsoft Docs](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-v2-aspnet-core-web-api)
-- Blazor [Tutorial - Create a Blazor Server app that uses the Microsoft identity platform for authentication - Microsoft identity platform | Microsoft Docs](https://docs.microsoft.com/en-us/azure/active-directory/develop/tutorial-blazor-server)
-- Blazor WASM [Tutorial - Sign in users and call a protected API from a Blazor WebAssembly app - Microsoft identity platform | Microsoft Docs](https://docs.microsoft.com/en-us/azure/active-directory/develop/tutorial-blazor-webassembly)
+- Web app [Quickstart: Add sign-in with Microsoft to an ASP.NET Core web app - Microsoft identity platform | Microsoft Docs](https://learn.microsoft.com/azure/active-directory/develop/quickstart-v2-aspnet-core-webapp)
+- Web API [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform - Microsoft identity platform | Microsoft Docs](https://learn.microsoft.com/azure/active-directory/develop/quickstart-v2-aspnet-core-web-api)
+- Blazor [Tutorial - Create a Blazor Server app that uses the Microsoft identity platform for authentication - Microsoft identity platform | Microsoft Docs](https://learn.microsoft.com/azure/active-directory/develop/tutorial-blazor-server)
+- Blazor WASM [Tutorial - Sign in users and call a protected API from a Blazor WebAssembly app - Microsoft identity platform | Microsoft Docs](https://learn.microsoft.com/azure/active-directory/develop/tutorial-blazor-webassembly)
From 00cae5654235f1e70eb50a50044bb9ea5063080d Mon Sep 17 00:00:00 2001
From: guardrex <1622880+guardrex@users.noreply.github.com>
Date: Mon, 21 Oct 2024 15:35:22 -0400
Subject: [PATCH 2/3] Found and updated additional links :eyes:
---
README.md | 2 +-
SECURITY.md | 4 ++--
tests/DevApps/B2CWebAppCallsWebApi/README.md | 2 +-
tests/DevApps/WebAppCallsWebApiCallsGraph/README.md | 2 +-
4 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/README.md b/README.md
index a10d7e7ac..62b3e6002 100644
--- a/README.md
+++ b/README.md
@@ -66,6 +66,6 @@ If you find a security issue with our libraries or services, please report it to
## Trademarks.
-This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow [Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general). Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.
+This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow [Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/legal/intellectualproperty/trademarks). Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.
Copyright (c) Microsoft Corporation. All rights reserved. Licensed under the MIT License (the "License").
diff --git a/SECURITY.md b/SECURITY.md
index 21b7bde15..ad54e011a 100644
--- a/SECURITY.md
+++ b/SECURITY.md
@@ -12,7 +12,7 @@ If you believe you have found a security vulnerability in any Microsoft-owned re
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://msrc.microsoft.com/create-report).
-If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the the [Microsoft Security Response Center PGP Key page](https://www.microsoft.com/en-us/msrc/pgp-key-msrc).
+If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the the [Microsoft Security Response Center PGP Key page](https://www.microsoft.com/msrc/pgp-key-msrc).
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
@@ -36,6 +36,6 @@ We prefer all communications to be in English.
## Policy
-Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).
+Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://www.microsoft.com/msrc/cvd).
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/README.md b/tests/DevApps/B2CWebAppCallsWebApi/README.md
index 2a95905f5..c465b8810 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/README.md
+++ b/tests/DevApps/B2CWebAppCallsWebApi/README.md
@@ -52,7 +52,7 @@ The client web application (TodoListClient) enables a user to:
- Install .NET Core for Windows by following the instructions at [dot.net/core](https://dot.net/core), which will include [Visual Studio 2017](https://aka.ms/vsdownload).
- An Internet connection
-- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/en-us/documentation/articles/active-directory-howto-tenant/)
+- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://learn.microsoft.com/entra/identity-platform/quickstart-create-new-tenant)
- A user account in your Azure AD tenant.
### Step 1: Clone or download this repository
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md b/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
index ef13eb83d..8728e02ef 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/README.md
@@ -52,7 +52,7 @@ The client web application (TodoListClient) enables a user to:
- Install .NET Core for Windows by following the instructions at [dot.net/core](https://dot.net/core), which will include [Visual Studio 2017](https://aka.ms/vsdownload).
- An Internet connection
-- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/en-us/documentation/articles/active-directory-howto-tenant/)
+- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/)
- A user account in your Azure AD tenant.
### Step 1: Clone or download this repository
From cd407c529372ba240b428343527a807db8364b0f Mon Sep 17 00:00:00 2001
From: guardrex <1622880+guardrex@users.noreply.github.com>
Date: Mon, 21 Oct 2024 18:19:59 -0400
Subject: [PATCH 3/3] React to feedback
---
tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs | 2 +-
tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs b/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
index fa38ae502..4c578e96c 100644
--- a/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
+++ b/tests/DevApps/B2CWebAppCallsWebApi/Client/Startup.cs
@@ -34,7 +34,7 @@ public void ConfigureServices(IServiceCollection services)
// This lambda determines whether user consent for non-essential cookies is needed for a given request.
options.CheckConsentNeeded = context => true;
options.MinimumSameSitePolicy = SameSiteMode.Unspecified;
- // Handling SameSite cookie according to https://learn.microsoft.com/aspnet/core/security/samesite
+ // Handles SameSite cookies according to https://learn.microsoft.com/aspnet/core/security/samesite.
options.HandleSameSiteCookieCompatibility();
});
diff --git a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
index 2f36cae6d..213b680a9 100644
--- a/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
+++ b/tests/DevApps/WebAppCallsWebApiCallsGraph/Client/Startup.cs
@@ -37,7 +37,7 @@ public void ConfigureServices(IServiceCollection services)
// This lambda determines whether user consent for non-essential cookies is needed for a given request.
options.CheckConsentNeeded = context => true;
options.MinimumSameSitePolicy = SameSiteMode.Unspecified;
- // Handling SameSite cookie according to https://learn.microsoft.com/aspnet/core/security/samesite
+ // Handles SameSite cookies according to https://learn.microsoft.com/aspnet/core/security/samesite.
options.HandleSameSiteCookieCompatibility();
});