You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: In this article series, learn to add the Microsoft Identity Provider SDK (MSAL.js) to a React client app, and integrate with an Azure Function API.
5
5
ms.topic: how-to
6
-
ms.date: 07/12/2021
6
+
ms.date: 10/19/2021
7
7
ms.custom: devx-track-js
8
8
---
9
9
10
10
# How to authenticate users with Microsoft Authentication Library for React
11
11
12
-
In this article series, learn how to authenticate users with the Microsoft Authentication Library for React (MSAL React) and call an Azure service on behalf of the user.
12
+
In this article series, learn how to authenticate users with the Microsoft Authentication Library for React (MSAL React) and call an Azure service **[on behalf of (OBO)](/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)** the user.
13
13
14
14
If your server-side app doesn't need to call into an Azure service _on behalf of an authenticated user_, then your React client app wouldn't _need_ to pass the user's access to token to the Azure Function app.
Copy file name to clipboardExpand all lines: articles/javascript/how-to/with-authentication/static-web-app-with-api/register-application-with-identity.md
+5-4Lines changed: 5 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -89,16 +89,17 @@ Add the `access_as_user` [scope](/azure/active-directory/develop/v2-oauth2-auth-
89
89
Your application, both the React client and the Azure Function, are authorized to call APIs when they are granted permissions by users/admins as part of the consent process. The list of configured permissions should include all the permissions the application needs.
90
90
91
91
1. Select the **API permissions** blade. Notice the Microsoft Graph API's scope of **User.Read** is already added for you, by default.
92
-
1. Select the **Add a permission**, then select **My APIs**.
93
-
1. From the list of Apps, select your App name, `Microsoft Identity Static web app - favorite color`, you entered for this App's registration.
94
-
1. In the **Delegated permissions** section, select the **Access Microsoft Identity Static web app - favorite color** in the list.
95
-
1. From the Request API permissions panel, select the permission.
92
+
1. Select the **Add a permission**, then select **My APIs**. The term, `API`, refers to the Active Directory App, `Microsoft Identity Static web app - favorite color`.
93
+
1. From the list of APIs, select your App name, `Microsoft Identity Static web app - favorite color`.
94
+
1. In the **Delegated permissions** section, select the **_access_as_user_** permission.
96
95
1. Select the **Add permissions** button at the bottom.
97
96
98
97
The app registration is now configured for both your local React client and your local Azure Function app.
99
98
100
99
## Configure token version for single tenant app
101
100
101
+
This step is required for single tenant Active Directory apps.
102
+
102
103
1. Select the **Manifest** blade.
103
104
1. Find the key `accessTokenAcceptedVersion` and replace the existing value (null) with `2`.
0 commit comments