Skip to content

Commit afca008

Browse files
committed
Updated articles about Bot Powered ACEs in .NET
1 parent bb16844 commit afca008

7 files changed

+206
-31
lines changed

docs/spfx/viva/bot-powered/AuthN-and-AuthZ-in-Bot-Powered-ACEs.md

Lines changed: 199 additions & 24 deletions
Large diffs are not rendered by default.

docs/spfx/viva/bot-powered/Building-Your-First-Bot-Powered-ACE.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Building your first Bot Powered Adaptive Card Extension
33
description: Learn how to build your first Bot Powered Adaptive Card Extension using the Bot Framework for Microsoft .NET.
4-
ms.date: 02/01/2024
4+
ms.date: 10/30/2024
55
ms.localizationpriority: high
66
---
77
# Building your first Bot Powered Adaptive Card Extension
@@ -10,7 +10,7 @@ Bot Powered Adaptive Card Extensions (ACEs) for Microsoft Viva Connections enabl
1010

1111
From a development point of view, a Bot Powered ACE behaves like a regular client-side ACE built with SharePoint Framework (SPFx). As such, you can render Card Views, Quick Views, you can provide properties configurable via a Property Pane, and you can implement specific behaviors to handle actions in the user interface of the ACE. You can learn more about the basics of client-side Adaptive Card Extensions for Microsoft Viva Connections by reading the tutorial ["Build your first SharePoint Adaptive Card Extension."](../get-started/build-first-sharepoint-adaptive-card-extension.md)
1212

13-
In this tutorial, you learn how to build a basic Bot Powered ACE with a step by step approach. You can build Bot Powered ACEs either using C# and .NET or using TypeScript and Node.js.
13+
You can build Bot Powered ACEs either using C# and .NET or using TypeScript and Node.js. In this tutorial, you learn how to build a basic Bot Powered ACE using C# with a step by step approach.
1414

1515
You can learn more about the architecture of the Bot Powered ACEs by reading the article ["Understanding Bot Powered Adaptive Card Extensions."](./Understanding-Bot-Powered-ACEs.md)
1616

@@ -70,7 +70,7 @@ In the automatically scaffolded solution, you find a bunch of autogenerated file
7070

7171
### Registering the Bot in Azure
7272

73-
Before proceeding with the actual implementation of the Bot Powered ACE, you need to register a Bot in Microsoft Azure.
73+
Before proceeding with the actual implementation of the Bot Powered ACE, you need to register a Bot in Microsoft Azure.
7474

7575
Open a web browser and navigate to the [Azure Management Portal](https://portal.azure.com/). From the Azure Management Portal home page, select "Create a resource" and choose to create an "Azure Bot" service.
7676

@@ -85,7 +85,7 @@ Provide a handle for your Bot, which must be compliant with the following rules:
8585

8686
The Bot handle becomes the display name of the Bot. However, you can change the display name later, while the Bot Handle is immutable, once registered.
8787

88-
Choose a target subscription and resource group, as well a data residency policy. From a pricing point of view, while you're developing and testing with Bot Powered ACEs, you can select the "F0 - Free" pricing tier. Once you're ready to release your Bot in production, you can upgrade the pricing tier to "S1 - Standard."
88+
Choose a target subscription and resource group, as well as a data residency policy. From a pricing point of view, while you're developing and testing with Bot Powered ACEs, you can select the "F0 - Free" pricing tier. Once you're ready to release your Bot in production, you can upgrade the pricing tier to "S1 - Standard."
8989

9090
A Microsoft App ID is required to register an Azure Bot. Depending on your solution, you can select a different type of application through the "Type of App" option. You can choose any of the following options:
9191

@@ -136,7 +136,7 @@ Once you configured the URL for your Bot, you need to configure few more setting
136136

137137
#### Microsoft App configuration
138138

139-
You're brought to the "Certificates & secrets" configuration page of the Microsoft App registered in Microsoft Entra ID for your Bot. From within this page, you can configure a new client secret. Copy the value of the new client secret in a safe place, you reuse it later in this tutorial.
139+
You're brought to the "Certificates & secrets" configuration page of the Microsoft App registered in Microsoft Entra ID for your Bot. From within this page, you can configure a new client secret. Copy the value of the new client secret in a safe place, you are going to reuse it later in this tutorial.
140140

141141
Now, select the "Overview" panel and save in a safe place, together with the client secret, the values of the following settings:
142142

@@ -667,7 +667,7 @@ The manifest file should look like the following one:
667667
}
668668
```
669669

670-
In the **manifest.json** file, you should replace `<App-Client-ID>` with the actual Client ID of your Microsoft App. You should also configure the actual URL of your Bot in the `validDomains` section of the manifest. Lastly, you should consider providing real values for the settings in the `developer` section.
670+
In the **manifest.json** file, you should replace `<App-Client-ID>` with the actual Client ID of your Microsoft App. You should also configure the actual URL of your Bot in the `validDomains` section of the manifest. Lastly, you should consider providing real values for the settings in the `developer` section. All of the URLs in the `developer` section need to target addresses under HTTPS.
671671

672672
Notice the `dashboardCards` section that defines the actual settings for your Bot Powered ACEs. In particular, through this section you can configure the `id` of the Microsoft App backing your Azure Bot, the `displayName` and `description` of the ACE, as well as the `icon` as a Fluent UI Icon, the Bot that handles the requests and that must be configured in the `bots` section of the **manifest.json**, and last but not least the `defaultSize` for your ACE in the Viva Connections Dashboard.
673673

@@ -676,7 +676,7 @@ You can consider copying and reusing the images and the **manifest.json** templa
676676
### Run and test the solution
677677

678678
You're now ready to package and deploy your custom solution. You simply need to package the **manifest.json** file and the two images into a .ZIP file, like you would do with any other Microsoft Teams or Microsoft 365 custom application. Name the .ZIP file with whatever name you like, open the App Catalog of your target SharePoint Online tenant, and upload the .ZIP file as a new application package.
679-
The SharePoint Online server-side infrastructure recognizes the manifest structure and prompt you to enable and deploy the solution on the tenant.
679+
The SharePoint Online server-side infrastructure recognizes the manifest structure and prompts you to enable and deploy the solution on the tenant.
680680

681681
![The UI of the new SharePoint AppCatalog prompting to enable the solution and make it tenant-wide available.](./images/App-Catalog-Package-Publishing.png)
682682

Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)