You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/spfx/use-aad-tutorial.md
+7-5Lines changed: 7 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ By using SharePoint Framework v.1.4.1 or later, you can leverage a set of out of
16
16
Reading this tutorial you will learn - through a step by step approach - how to create a SharePoint Framework solution that consumes the Microsoft Graph, with a custom set of permission scopes.
17
17
18
18
> [!NOTE]
19
-
> To better undestand the overall architecture of this capability, you can read the article [Connect to AAD-secured APIs in SharePoint Framework solutions](./use-aadhttpclient.md).
19
+
> To better undestand the overall architecture of this capability, you can read the article [Connect to AAD-secured APIs in SharePoint Framework solutions](use-aadhttpclient.md).
20
20
21
21
## <aname="SolutionOverview"></a>Overview of the solution
22
22
Before digging into the detailed steps of developing the solution, let's have a quick overview of what you are going to build.
@@ -444,7 +444,7 @@ The *resource* can be the name or the ObjectId (in AAD) of the resource for whic
444
444
The *scope* can be the name of the permission scope, or the unique ID of that permission scope. The former can be retrieved reading the documentation of the target API, while the latter can be retrieved reading the manifest file of the target API.
445
445
446
446
> [!NOTE]
447
-
> For the Microsoft Graph you can find all the available permission scopes in the [Microsoft Graph permissions reference](https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference) document. By default, the service principal has no explicit permissions granted to access the Microsoft Graph. If you would however request an access token for the Microsoft Graph, you would get a token with the `user_impersonation` permission scope, that can be used for reading information about the users (i.e. `User.Read.All`). Additional permission scopes can be requested by developers and granted by tenant administrators. For more information see the guidance [article on using the AadHttpClient](./use-aadhttpclient.md).
447
+
> For the Microsoft Graph you can find all the available permission scopes in the [Microsoft Graph permissions reference](https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference) document. By default, the service principal has no explicit permissions granted to access the Microsoft Graph. If you would however request an access token for the Microsoft Graph, you would get a token with the `user_impersonation` permission scope, that can be used for reading information about the users (i.e. `User.Read.All`). Additional permission scopes can be requested by developers and granted by tenant administrators. For more information see the guidance [article on using the AadHttpClient](use-aadhttpclient.md).
448
448
449
449
450
450
In order to search for users and to retrieve their *displayName*, *mail*, and *userPrincipalName* the *User.ReadBasic.All* permission will suffice.
@@ -648,6 +648,8 @@ The first request you will make, you will see a pop-up window popping out and th
648
648
649
649
And that's it! Enjoy this capability building real-life enterprise-level solutions that levarage AAD-secured REST API.
650
650
651
-
## <a name="SeeAlso"></a>See also
652
-
* [Connect to AAD-secured APIs in SharePoint Framework solutions](./use-aadhttpclient)
653
-
* [Use the MSGraphClient to connect to Microsoft Graph](./use-msgraph)
651
+
<a name="SeeAlso"></a>
652
+
653
+
## See also
654
+
* [Connect to Azure AD-secured APIs in SharePoint Framework solutions](use-aadhttpclient.md)
655
+
* [Use the MSGraphClient to connect to Microsoft Graph](use-msgraph.md)
0 commit comments