Skip to content

Commit dfc2a7b

Browse files
committed
edits
1 parent bbc6215 commit dfc2a7b

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

articles/javascript/how-to/with-authentication/static-web-app-with-api/introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: "1: Add MSAL to React introduction"
33
titleSuffix: Azure Developer Center
44
description: In this article series, learn to add the Microsoft Identity Provider SDK (MSAL.js) to a React client app, and integrate with an Azure Function API.
55
ms.topic: how-to
6-
ms.date: 07/12/2021
6+
ms.date: 10/19/2021
77
ms.custom: devx-track-js
88
---
99

1010
# How to authenticate users with Microsoft Authentication Library for React
1111

12-
In this article series, learn how to authenticate users with the Microsoft Authentication Library for React (MSAL React) and call an Azure service on behalf of the user.
12+
In this article series, learn how to authenticate users with the Microsoft Authentication Library for React (MSAL React) and call an Azure service **[on behalf of (OBO)](/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)** the user.
1313

1414
If your server-side app doesn't need to call into an Azure service _on behalf of an authenticated user_, then your React client app wouldn't _need_ to pass the user's access to token to the Azure Function app.
1515

articles/javascript/how-to/with-authentication/static-web-app-with-api/register-application-with-identity.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -89,16 +89,17 @@ Add the `access_as_user` [scope](/azure/active-directory/develop/v2-oauth2-auth-
8989
Your application, both the React client and the Azure Function, are authorized to call APIs when they are granted permissions by users/admins as part of the consent process. The list of configured permissions should include all the permissions the application needs.
9090

9191
1. Select the **API permissions** blade. Notice the Microsoft Graph API's scope of **User.Read** is already added for you, by default.
92-
1. Select the **Add a permission**, then select **My APIs**.
93-
1. From the list of Apps, select your App name, `Microsoft Identity Static web app - favorite color`, you entered for this App's registration.
94-
1. In the **Delegated permissions** section, select the **Access Microsoft Identity Static web app - favorite color** in the list.
95-
1. From the Request API permissions panel, select the permission.
92+
1. Select the **Add a permission**, then select **My APIs**. The term, `API`, refers to the Active Directory App, `Microsoft Identity Static web app - favorite color`.
93+
1. From the list of APIs, select your App name, `Microsoft Identity Static web app - favorite color`.
94+
1. In the **Delegated permissions** section, select the **_access_as_user_** permission.
9695
1. Select the **Add permissions** button at the bottom.
9796

9897
The app registration is now configured for both your local React client and your local Azure Function app.
9998

10099
## Configure token version for single tenant app
101100

101+
This step is required for single tenant Active Directory apps.
102+
102103
1. Select the **Manifest** blade.
103104
1. Find the key `accessTokenAcceptedVersion` and replace the existing value (null) with `2`.
104105

0 commit comments

Comments
 (0)