Skip to content

Commit 40a9582

Browse files
Merge pull request SharePoint#5575 from KoenZomers/patch-25
Fixing broken ACS retirement blogpost link
2 parents d532b2a + 005d3a4 commit 40a9582

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/sp-add-ins/creating-sharepoint-add-ins-that-use-low-trust-authorization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Creating SharePoint Add-ins that use low-trust authorization
33
description: A provider-hosted SharePoint Add-in can get access to resources in the SharePoint tenancy or farm on which the add-in is installed. Primarily intended for add-ins whose remote components are hosted in the cloud.
4-
ms.date: 12/27/2017
4+
ms.date: 04/17/2020
55
ms.prod: sharepoint
66
localization_priority: Priority
77
---
@@ -11,7 +11,7 @@ localization_priority: Priority
1111
Remote components in a SharePoint Add-in (or external application) can gain authorization to SharePoint resources by passing an access token to SharePoint with each HTTP request. The remote components obtain the access token from a Microsoft Azure Access Control Service (ACS) account that is associated with the customer's Office 365 tenancy. Azure ACS acts as the authorization server in an [OAuth 2.0](http://oauth.net/) transaction, called a flow, with SharePoint as the resource server and the remote components as the client. For related protocol specifications, see [Web Authorization Protocol (oauth)](http://datatracker.ietf.org/doc/active/#oauth).
1212

1313
> [!IMPORTANT]
14-
> Azure Access Control (ACS), a service of Azure Active Directory (Azure AD), will be retired on November 7, 2018. This retirement does not impact the SharePoint Add-in model, which uses the `https://accounts.accesscontrol.windows.net` hostname (which is not impacted by this retirement). For more information, see [Impact of Azure Access Control retirement for SharePoint Add-ins](https://dev.office.com/blogs/impact-of-azure-access-control-deprecation-for-sharepoint-add-ins).
14+
> Azure Access Control (ACS), a service of Azure Active Directory (Azure AD), will be retired on November 7, 2018. This retirement does not impact the SharePoint Add-in model, which uses the `https://accounts.accesscontrol.windows.net` hostname (which is not impacted by this retirement). For more information, see [Impact of Azure Access Control retirement for SharePoint Add-ins](https://developer.microsoft.com/office/blogs/impact-of-azure-access-control-deprecation-for-sharepoint-add-ins/).
1515
1616
Provider-hosted SharePoint Add-ins that use the low-trust authorization system can be sold in the Office Store and installed on either Microsoft SharePoint Online or an on-premises SharePoint farm that has been configured to use the customer's Office 365 tenancy to establish trust with Azure ACS. The customer must have an Office 365 tenancy to install SharePoint Add-ins that use the low-trust system. However, it is not necessary for the customer to use the tenancy for any other purpose. For instructions about linking an on-premises farm to an Office 365 tenancy, see [Use an Office 365 SharePoint site to authorize provider-hosted add-ins on an on-premises SharePoint site](use-an-office-365-sharepoint-site-to-authorize-provider-hosted-add-ins-on-an-on.md).
1717

0 commit comments

Comments
 (0)