Skip to content

Commit 36cc0d1

Browse files
committed
adding redirect
1 parent 9abbab3 commit 36cc0d1

File tree

4 files changed

+12
-13
lines changed

4 files changed

+12
-13
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
{
22
"redirections": [
3-
{
3+
{
4+
"source_path": "powerapps-docs/developer/data-platform/walkthrough-registering-configuring-simplespa-application-adal-js.md",
5+
"redirect_url": "quick-start-register-configure-simplespa-application-msal-js",
6+
"redirect_document_id": false
7+
},
8+
{
49
"source_path": "powerapps-docs/developer/data-platform/webapi/samples/cdswebapiservice.md",
510
"redirect_url": "webapiservice",
611
"redirect_document_id": false

powerapps-docs/developer/data-platform/authenticate-oauth.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,6 @@ For specific steps to do this, see [Walkthrough: Register an app with Azure Acti
6161

6262
If your app will use Server-to-Server (S2S) authentication, this step is not required. That configuration requires a specific system user and the operations will be performed by that user account rather than any user that must be authenticated.
6363

64-
### Enable Implicit Flow
65-
66-
If you are configuring an app for a Single Page Application (SPA) you must edit the Manifest to set the `oauth2AllowImplicitFlow` value to `true`. More information: [Walkthrough: Registering and configuring a SPA application with adal.js](walkthrough-registering-configuring-simplespa-application-adal-js.md)
67-
6864
### Use Client Secrets & Certificates
6965

7066
For server to server scenarios there will not be an interactive user account to authenticate. In these cases, you need to provide some means to confirm that the application is trusted. This is done using client secrets or certificates.

powerapps-docs/developer/data-platform/quick-start-register-configure-simplespa-application-msal-js.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Walkthrough: Registering and configuring a SimpleSPA application with msal.js (Microsoft Dataverse) | Microsoft Docs"
2+
title: "Quickstart: Register and configure a SPA application for Dataverse using msal.js (Microsoft Dataverse) | Microsoft Docs"
33
description: "Describes the process of registering and configuring the simplest Single-Page Application (SPA) to access data in Microsoft Dataverse using msal.js and Cross-origin Resource Sharing (CORS)."
44
ms.date: 09/09/2022
55
ms.topic: quickstart
@@ -372,7 +372,7 @@ The configured permissions should look like this when you are done:
372372
> The key difference is the scopes used when getting the access token. You must set the scope to the value of the Dataverse Url + `/.default` or `/user_impersonation`.
373373
>
374374
> ```javascript
375-
> // Retrieves top 10 account records from Dataverse
375+
> // Retrieves top 10 account records from Dataverse
376376
> function getAccounts(callback) {
377377
> // Gets the access token
378378
> getTokenPopup({

powerapps-docs/developer/data-platform/walkthrough-register-app-azure-active-directory.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -80,14 +80,12 @@ This completes the registration of your application in Azure Active Directory.
8080

8181
## Additional configuration options
8282

83-
If your application will be a Single Page Application (SPA) that depends on CORS you must configure the app registration to support the implicit flow.
84-
More information: [Tutorial: Registering and configuring a SPA application with adal.js](walkthrough-registering-configuring-simplespa-application-adal-js.md)
85-
8683
If your application will support server-to-server connections, see [Use Multi-Tenant Server-to-server authentication](use-multi-tenant-server-server-authentication.md)
8784

88-
### See also
89-
[Application registration in Azure Active Directory](/azure/active-directory/develop/active-directory-integrating-applications)
90-
[Authenticate Users with Dataverse Web Services](authentication.md)
85+
### See also
86+
87+
[Application registration in Azure Active Directory](/azure/active-directory/develop/active-directory-integrating-applications)<br />
88+
[Authenticate Users with Dataverse Web Services](authentication.md)
9189

9290

9391
[!INCLUDE[footer-include](../../includes/footer-banner.md)]

0 commit comments

Comments
 (0)