Skip to content

Commit fb5f127

Browse files
Resolve build warnings
1 parent c373be0 commit fb5f127

File tree

11 files changed

+16
-14
lines changed

11 files changed

+16
-14
lines changed

msal-javascript-conceptual/browser/iframe-usage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ By default, MSAL prevents full-frame redirects to **Azure AD** authentication en
1919
- Similarly, you'll have to use the [logoutPopup()](./logout.md#logoutpopup) API for sign-outs (:warning: if your app is using a version of msal-browser older than v2.13, make sure to upgrade and replace the `logout()` API, as it will attempt a full-frame redirect to Azure AD).
2020
- When using [popup APIs](./initialization.md#popup-apis), you need to take into account any [sandboxing](https://html.spec.whatwg.org/multipage/origin.html#sandboxing) restrictions imposed by the parent app. In particular, the parent app needs to set the `allow-popups` flag when the iframe is sandboxed.
2121

22-
**Azure AD B2C** offers an [embedded sign-in experience](https://docs.microsoft.com/azure/active-directory-b2c/embedded-login), which allows rendering a custom login UI in an iframe. Since MSAL prevents redirect in iframes by default, you'll need to set the [allowRedirectInIframe](./configuration.md#system-config-options) configuration option to **true** in order to make use of this feature. Note that enabling this option for apps on **Azure AD** is not recommended, due to the above restriction.
22+
**Azure AD B2C** offers an [embedded sign-in experience](/azure/active-directory-b2c/embedded-login), which allows rendering a custom login UI in an iframe. Since MSAL prevents redirect in iframes by default, you'll need to set the [allowRedirectInIframe](./configuration.md#system-config-options) configuration option to **true** in order to make use of this feature. Note that enabling this option for apps on **Azure AD** is not recommended, due to the above restriction.
2323

2424
## Browser restrictions
2525

msal-javascript-conceptual/browser/known-issues-ie-edge-browsers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,9 @@ Note, these workarounds won't solve the issue for InPrivate browsing since both
5858

5959
## Issues due to popup blockers
6060

61-
There are cases when popups are blocked in IE or Microsoft Edge, for example when a second popup occurs during [multi-factor authentication](~/identity/authentication/concept-mfa-howitworks.md). You'll get an alert in the browser to allow for the pop-up window once or always. If you choose to allow, the browser opens the pop-up window automatically and returns a `null` handle for it. As a result, the library doesn't have a handle for the window and there's no way to close the pop-up window. The same issue doesn't happen in Chrome when it prompts you to allow pop-up windows because it doesn't automatically open a pop-up window.
61+
There are cases when popups are blocked in IE or Microsoft Edge, for example when a second popup occurs during [multi-factor authentication](/entra/identity/authentication/concept-mfa-howitworks). You'll get an alert in the browser to allow for the pop-up window once or always. If you choose to allow, the browser opens the pop-up window automatically and returns a `null` handle for it. As a result, the library doesn't have a handle for the window and there's no way to close the pop-up window. The same issue doesn't happen in Chrome when it prompts you to allow pop-up windows because it doesn't automatically open a pop-up window.
6262

6363
As a **workaround**, developers need to allow popups in IE and Microsoft Edge before they start using their app to avoid this issue.
6464

6565
## Next steps
66-
Learn more about [Using MSAL.js in Internet Explorer](msal-js-use-ie-browser.md).
66+
Learn more about [Using MSAL.js in Internet Explorer](use-ie-browser.md).

msal-javascript-conceptual/browser/resources-and-scopes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer: dmwendia, cwerner, owenrichards, kengaderdus
1212

1313
# Resources and scopes
1414

15-
Azure Active Directory v2.0 & Microsoft Identity Platform employs a *scope-centric* model to access resources. Here, a *resource* refers to any application that can be a recipient of an **Access Token** (such as [MS Graph API](https://docs.microsoft.com/graph/overview) or your own web API), and a *scope* (*aka* "permission") refers to any aspect of a resource that an **Access Token** grants rights.
15+
Azure Active Directory v2.0 & Microsoft Identity Platform employs a *scope-centric* model to access resources. Here, a *resource* refers to any application that can be a recipient of an **Access Token** (such as [MS Graph API](/graph/overview) or your own web API), and a *scope* (*aka* "permission") refers to any aspect of a resource that an **Access Token** grants rights.
1616

1717
**Access Token** requests in **MSAL.js** are meant to be *per-resource-per-scope(s)*. This means that an **Access Token** requested for resource **A** with scope `scp1`:
1818

msal-javascript-conceptual/browser/token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The `PublicClientApplication` object exposes an API called `acquireTokenSilent`
4444
4. If the access token is expired but the refresh token is still valid, MSAL will use the given refresh token to retrieve a new set of tokens, and then return a response.
4545
5. If the refresh token is expired, MSAL will attempt to retrieve an access tokens silently using a hidden iframe. This will use the sid or username in the account's claims object to retrieve a hint about the user's session. If this hidden iframe call fails, MSAL will pass on an error from the server as an `InteractionRequiredAuthError`, asking to retrieve an authorization code to retrieve a new set of tokens. You can do this by performing a login or acquireToken API call with the `PublicClientApplication` object. If the session is still active, the server will send a code without any user prompts. Otherwise, the user will be required to enter their credentials.
4646

47-
See [here](./request-response-object.md#silentflowrequest) for more information on what configuration parameters you can set for the `acquireTokenSilent` method.
47+
See [the request and response objects](./request-response-object.md) article for more information on what configuration parameters you can set for the `acquireTokenSilent` method.
4848

4949
### Cache Lookup Policy
5050

msal-javascript-conceptual/browser/v1-migration.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,11 @@ Go to the Azure AD portal for your tenant and review the App Registrations. You
2020

2121
## 2. Add the msal-browser package to your project
2222

23-
See the [installation section of the README](../README.md#installation).
23+
Using npm, use the following:
24+
25+
```javascript
26+
npm install @azure/msal-browser
27+
```
2428

2529
## 3. Update your code
2630

37.1 KB
Loading

msal-javascript-conceptual/node/request.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -246,6 +246,3 @@ Please look at the On Behalf Of flow [sample](https://github.com/AzureAD/microso
246246
* [WebAPI](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/on-behalf-of/web-api/index.js) sample code
247247
* [WebApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/on-behalf-of/web-app/index.js) sample code
248248

249-
## Next Steps
250-
251-
Proceed to understand the public APIs provided by `msal-node` for acquiring tokens [here](../browser/response.md)

msal-javascript-conceptual/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The [`lib`](https://github.com/AzureAD/microsoft-authentication-library-for-js/t
3939

4040
There are a number of different packages meant for different platforms. You can see the relationship between packages and different authentication flows they implement in the package structure below.
4141

42-
![Package Structure](PackageStructure.png)
42+
![Package Structure](./media/PackageStructure.png)
4343

4444
## Samples
4545

msal-javascript-conceptual/react/errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ This error is thrown when an interactive API (`loginPopup`, `loginRedirect`, `ac
7474

7575
In `@azure/msal-react` there are 2 scenarios when this can happen:
7676

77-
1. Your application is calling one of the APIs outside of the context where you do not have access to the `inProgress` state. For more about context see the [FAQ](./faq.md#what-can-i-do-outside-of-msal-react-context)
77+
1. Your application is calling one of the APIs outside of the context where you do not have access to the `inProgress` state. For more about context see the [MSAL React FAQ](./faq.md)
7878
1. Your application is calling one of the APIs without first checking if interaction is already in progress elsewhere.
7979

8080
The following snippet throws the error when another component has already invoked an interactive API that is in progress:

msal-javascript-conceptual/react/faq.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,13 +84,14 @@ This means the following APIs are off-limits outside the context of `MsalProvide
8484
**Note:** If you do choose to use any other `@azure/msal-browser` API outside of the react context you should still use the same `PublicClientApplication` instance you pass into `MsalProvider`.
8585

8686
## How do I implement self-service sign-up?
87-
MSAL React supports self-service sign-up in the auth code flow. Please see our docs [here](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_browser.html#popuprequest) for supported prompt values in the request and their expected outcomes, and [here](http://aka.ms/s3u) for an overview of self-service sign-up and configuration changes that need to be made to your Azure tenant. Please note that that self-service sign-up is not available in B2C and test environments.
87+
88+
MSAL React supports self-service sign-up in the auth code flow. Please see our docs [here](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_browser.html#popuprequest) for supported prompt values in the request and their expected outcomes, and an overview of [self-service sign-up](/entra/external-id/self-service-sign-up-overview) and configuration changes that need to be made to your Azure tenant. Please note that that self-service sign-up is not available in B2C and test environments.
8889

8990
## B2C
9091

9192
### How do I handle the forgot password flow in a react app?
9293

93-
The [new password reset experience](https://docs.microsoft.com/azure/active-directory-b2c/add-password-reset-policy?pivots=b2c-user-flow#self-service-password-reset-recommended) is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience. You don't need a separate policy for password reset anymore.
94+
The [new password reset experience](/azure/active-directory-b2c/add-password-reset-policy?pivots=b2c-user-flow#self-service-password-reset-recommended) is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience. You don't need a separate policy for password reset anymore.
9495

9596
Our recommendation is to move to the new password reset experience since it simplifies the app state and reduces error handling on the user-end. If for some reason you have to use the legacy forgot password flow, you'll have to handle the `AADB2C90118` error response returned from B2C service when a user selects the **Forgot your password?** link, and call login again with your forgot password policy.
9697

0 commit comments

Comments
 (0)