Skip to content

Commit 8bb0184

Browse files
committed
fixin warnings and suggestions
1 parent 709e036 commit 8bb0184

File tree

10 files changed

+31
-32
lines changed

10 files changed

+31
-32
lines changed

msal-javascript-conceptual/node/brokering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Acquiring Device Bound Tokens"
3-
description: Learn how to acquire tokens from the native token broker.
3+
description: Learn how to acquire device bound tokens from the native token broker.
44
author: EmLauber
55
manager: CelesteDG
66
ms.author: emilylauber

msal-javascript-conceptual/node/certificate-credentials.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ See the MSAL sample: [auth-code-with-certs](https://github.com/AzureAD/microsoft
4242

4343
### Registering certificates
4444

45-
If you do not have a certificate, you can create a self-signed certificate [using PowerShell](https://learn.microsoft.com/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps) or using [Azure KeyVault](https://azure.microsoft.com/products/key-vault#layout-container-uida0cf).
45+
If you do not have a certificate, you can create a self-signed certificate [using PowerShell](/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps) or using [Azure KeyVault](https://azure.microsoft.com/products/key-vault#layout-container-uida0cf).
4646

4747
You need to upload your certificate to **Microsoft Entra ID**.
4848

@@ -51,7 +51,7 @@ You need to upload your certificate to **Microsoft Entra ID**.
5151
3. Click on **Upload** certificate and select the certificate file to upload (e.g. *example.crt*).
5252
4. Click **Add**. Once the certificate is uploaded, the *thumbprint*, *start date*, and *expiration* values are displayed.
5353

54-
For more information, see: [Register your certificate with Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials#register-your-certificate-with-microsoft-identity-platform)
54+
For more information, see: [Register your certificate with Microsoft identity platform](/entra/identity-platform/certificate-credentials#register-your-certificate-with-microsoft-identity-platform)
5555

5656
### Initializing MSAL Node with certificates
5757

@@ -166,7 +166,7 @@ function convertPFX(pfx, passphrase = null) {
166166
167167
### (Optional) Creating an HTTPS server
168168
169-
The OAuth 2.0 protocol recommends using an HTTPS connection whenever possible. Most cloud services like Azure App Service will provide HTTPS connection by default via proxy. If for testing purposes you would like to setup your own HTTPS server, see the [Node.js HTTPS guide](https://nodejs.org/knowledge/HTTP/servers/how-to-create-a-HTTPS-server/).
169+
The OAuth 2.0 protocol recommends using an HTTPS connection whenever possible. Most cloud services like Azure App Service will provide HTTPS connection by default via proxy. If for testing purposes you would like to setup your own HTTPS server, see the [Node.js HTTPS guide](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in).
170170
171171
You'll also need to add your self-signed certificates to the *credential manager* / *key chain* of your **OS** to bypass the browser's security policy. You may still see a warning in your browser afterwards (e.g. Chrome).
172172
@@ -228,4 +228,4 @@ const cca = new msal.ConfidentialClientApplication(config);
228228
229229
* [Microsoft identity platform application authentication certificate credentials](/entra/identity-platform/certificate-credentials)
230230
* [Create a self-signed public certificate to authenticate your application](/entra/identity-platform/howto-create-self-signed-certificate)
231-
* [Various SSL/TLS Certificate File Types/Extensions](https://docs.microsoft.com/archive/blogs/kaushal/various-ssltls-certificate-file-typesextensions)
231+
* [Various SSL/TLS Certificate File Types/Extensions](/archive/blogs/kaushal/various-ssltls-certificate-file-typesextensions)

msal-javascript-conceptual/node/configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,14 +82,14 @@ const msalInstance = new PublicClientApplication(msalConfig);
8282

8383
| Option | Description | Format | Default Value |
8484
| ---------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------- |
85-
| `clientId` | App ID of your application. Can be found in your app registration in the Microsoft Entra admin center[portal registration](../README.md#prerequisites). | UUID/GUID | None. This parameter is required in order for MSAL to perform any actions. |
85+
| `clientId` | App ID of your application. Can be found in your app registration in the Microsoft Entra admin center app registration. | UUID/GUID | None. This parameter is required in order for MSAL to perform any actions. |
8686
| `authority` | URI of the tenant to authenticate and authorize with. Usually takes the form of `https://{uri}/{tenantid}` | String in URI format with tenant - `https://{uri}/{tenantid}` | `https://login.microsoftonline.com/common` |
8787
| `knownAuthorities` | An array of URIs that are known to be valid. Used in B2C scenarios. | Array of strings in URI format | Empty array `[]` |
8888
| `cloudDiscoveryMetadata` | A string containing the cloud discovery response. Used in Microsoft Entra scenarios. See [Performance](../browser/performance.md) for more info | string | Empty string `""` |
8989
| `authorityMetadata` | A string containing the .well-known/openid-configuration endpoint response. See [Performance](../browser/performance.md) for more info | string | Empty string `""` |
9090
| `clientCapabilities` | Array of capabilities to be added to all network requests as part of the `xms_cc` claims request | Array of strings | [] |
9191
| `protocolMode` | Enum representing the protocol mode to use. If `"AAD"`, will function on the Microsoft Entra v2 endpoints; if `"OIDC"`, will function on OIDC-compliant endpoints. | string | `"AAD"` |
92-
| `azureCloudOptions` | A defined set of azure cloud options for developers to default to their specific cloud authorities, for specific clouds supported please refer to the [AzureCloudInstance](aka.ms/msaljs/azure_cloud_instance) | [AzureCloudOptions](/javascript/api/@azure/msal-node/#azurecloudoptions) | [AzureCloudInstance.None](msaljs/azure_cloud_instance) |
92+
| `azureCloudOptions` | A defined set of azure cloud options for developers to default to their specific cloud authorities, for specific clouds supported please refer to the [AzureCloudInstance](https://azuread.github.io/microsoft-authentication-library-for-js/ref/types/_azure_msal_node.AzureCloudInstance.html) | [AzureCloudOptions](/javascript/api/@azure/msal-node/#azurecloudoptions) | [AzureCloudInstance.None](msaljs/azure_cloud_instance) |
9393
| `skipAuthorityMetadataCache` | A flag to choose whether to use the local metadata cache during authority initialization. Metadata cache would be used if no authority metadata is provided in configuration and before a network call for metadata has been made | boolean | `false` |
9494

9595
### Cache Config Options

msal-javascript-conceptual/node/extensions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Authentication Extensions for Node
3-
description: Learn how to effectively cache tokens in MSAL Node, and use client secrets securely,
3+
description: Learn how to use the Microsoft Authentication Extensions for Node to perform cross-platform token cache serialization and persistence.
44
author: EmLauber
55
manager: CelesteDG
66
ms.author: emilylauber

msal-javascript-conceptual/node/faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ If you want to work around this, please note:
8080

8181
### How do I implement self-service sign-up with MSAL Node?
8282

83-
MSAL Node supports self-service sign-up in the auth code flow. Please see our docs [here](/javascript/api/@azure/msal-node/authorizationurlrequest) for supported prompt values in the request and their expected outcomes, and [here](http://aka.ms/s3u) for an overview of self-service sign-up and configuration changes that need to be made to your Azure tenant. Please note that that self-service sign-up is not available in B2C and test environments.
83+
MSAL Node supports self-service sign-up in the auth code flow. Please see our docs [here](/javascript/api/@azure/msal-node/authorizationurlrequest) for supported prompt values in the request and their expected outcomes, and [here](https://aka.ms/s3u) for an overview of self-service sign-up and configuration changes that need to be made to your Azure tenant. Please note that that self-service sign-up is not available in B2C and test environments.
8484

8585
### Why doesn't my app function correctly when it's running behind a proxy?
8686

@@ -94,9 +94,9 @@ Developers can use a custom http(s) agent by providing a `customAgentOptions` ob
9494

9595
### How do I handle the password-reset user-flow?
9696

97-
The [new password reset experience](https://docs.microsoft.com/azure/active-directory-b2c/add-password-reset-policy?pivots=b2c-user-flow#self-service-password-reset-recommended) is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience.
97+
The [new password reset experience](/azure/active-directory-b2c/add-password-reset-policy?pivots=b2c-user-flow#self-service-password-reset-recommended) is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience.
9898

99-
Our recommendation is to move to the new password reset experience since it simplifies the app state and reduces error handling on the user-end. If for some reason you have to use the legacy password-reset user-flow, you'll have to handle the `AADB2C90118` error code returned from B2C service when a user selects the **Forgot your password?** link. To see how this is done, refer to the sample: [MSAL Node B2C web app sample (using auth code)](../../../samples/msal-node-samples/b2c-user-flows/README.md)
99+
Our recommendation is to move to the new password reset experience since it simplifies the app state and reduces error handling on the user-end. If for some reason you have to use the legacy password-reset user-flow, you'll have to handle the `AADB2C90118` error code returned from B2C service when a user selects the **Forgot your password?** link. To see how this is done, refer to the sample: [MSAL Node B2C web app sample (using auth code)](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/b2c-user-flows)
100100

101101
## Compatibility
102102

msal-javascript-conceptual/node/initialize-public-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Initialize the public client application object in MSAL Node
3-
description: Learn how to acquire tokens from the native token broker.
3+
description: Learn how to initialize the PublicClientApplication object in MSAL Node and how to configure the authority.
44
author: EmLauber
55
manager: CelesteDG
66
ms.author: emilylauber

0 commit comments

Comments
 (0)