Skip to content

Commit 8480db0

Browse files
authored
Fixed broken links from build report
1 parent 1f014c6 commit 8480db0

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

docs/spfx/use-aad-tutorial.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ By using SharePoint Framework v.1.4.1 or later, you can leverage a set of out of
1616
Reading this tutorial you will learn - through a step by step approach - how to create a SharePoint Framework solution that consumes the Microsoft Graph, with a custom set of permission scopes.
1717

1818
> [!NOTE]
19-
> To better undestand the overall architecture of this capability, you can read the article [Connect to AAD-secured APIs in SharePoint Framework solutions](./use-aadhttpclient.md).
19+
> To better undestand the overall architecture of this capability, you can read the article [Connect to AAD-secured APIs in SharePoint Framework solutions](use-aadhttpclient.md).
2020
2121
## <a name="SolutionOverview"></a>Overview of the solution
2222
Before digging into the detailed steps of developing the solution, let's have a quick overview of what you are going to build.
@@ -444,7 +444,7 @@ The *resource* can be the name or the ObjectId (in AAD) of the resource for whic
444444
The *scope* can be the name of the permission scope, or the unique ID of that permission scope. The former can be retrieved reading the documentation of the target API, while the latter can be retrieved reading the manifest file of the target API.
445445
446446
> [!NOTE]
447-
> For the Microsoft Graph you can find all the available permission scopes in the [Microsoft Graph permissions reference](https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference) document. By default, the service principal has no explicit permissions granted to access the Microsoft Graph. If you would however request an access token for the Microsoft Graph, you would get a token with the `user_impersonation` permission scope, that can be used for reading information about the users (i.e. `User.Read.All`). Additional permission scopes can be requested by developers and granted by tenant administrators. For more information see the guidance [article on using the AadHttpClient](./use-aadhttpclient.md).
447+
> For the Microsoft Graph you can find all the available permission scopes in the [Microsoft Graph permissions reference](https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference) document. By default, the service principal has no explicit permissions granted to access the Microsoft Graph. If you would however request an access token for the Microsoft Graph, you would get a token with the `user_impersonation` permission scope, that can be used for reading information about the users (i.e. `User.Read.All`). Additional permission scopes can be requested by developers and granted by tenant administrators. For more information see the guidance [article on using the AadHttpClient](use-aadhttpclient.md).
448448
449449
450450
In order to search for users and to retrieve their *displayName*, *mail*, and *userPrincipalName* the *User.ReadBasic.All* permission will suffice.
@@ -648,6 +648,8 @@ The first request you will make, you will see a pop-up window popping out and th
648648
649649
And that's it! Enjoy this capability building real-life enterprise-level solutions that levarage AAD-secured REST API.
650650
651-
## <a name="SeeAlso"></a>See also
652-
* [Connect to AAD-secured APIs in SharePoint Framework solutions](./use-aadhttpclient)
653-
* [Use the MSGraphClient to connect to Microsoft Graph](./use-msgraph)
651+
<a name="SeeAlso"></a>
652+
653+
## See also
654+
* [Connect to Azure AD-secured APIs in SharePoint Framework solutions](use-aadhttpclient.md)
655+
* [Use the MSGraphClient to connect to Microsoft Graph](use-msgraph.md)

0 commit comments

Comments
 (0)