You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 3, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+49-9Lines changed: 49 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -32,17 +32,57 @@ To use the Microsoft Graph ASP.NET Webhooks sample, you need the following:
32
32
- A public HTTPS endpoint to receive and send HTTP requests. You can host this on Microsoft Azure or another service, or you can [use ngrok](#set-up-the-ngrok-proxy-optional) or a similar tool while testing.
33
33
34
34
### Register the app
35
+
In this exercise, you will create a new Azure AD web application registration using the Azure Active Directory admin center.
35
36
36
-
This app uses the Azure AD v2 endpoint, so you'll register it in the [Application Registration Portal](https://apps.dev.microsoft.com).
37
+
1. Determine your ASP.NET app's URL. In Visual Studio's Solution Explorer, select the **GraphWebhooks** project. In the **Properties** window, find the value of **SSL URL**. Copy this value.
37
38
38
-
1. Sign in to the portal with either your Microsoft account, or your work or school account.
39
-
1. Choose **Add an app**.
40
-
1. Enter a friendly name for the application and choose **Create application**.
41
-
1. Locate the **Application Secrets** section and choose **Generate New Password**. Copy the password now and save it to a safe place. Once you've copied the password, click **Ok**.
42
-
1. Locate the **Platforms** section, and choose **Add Platform**. Choose **Web**, then enter `https://localhost:44300` under **Redirect URIs**.
43
-
1. Choose **Save** at the bottom of the page.
39
+

40
+
41
+
1. Open a browser and navigate to the [Azure Active Directory admin center](https://aad.portal.azure.com). Login using a **Work or School Account**.
42
+
43
+
1. Select **Azure Active Directory** in the left-hand navigation, then select **App registrations (Preview)** under **Manage**.
44
+
45
+

46
+
47
+
1. Select **New registration**. On the **Register an application** page, set the values as follows.
48
+
49
+
- Set a preferred **Name** e.g. `GraphWebhooks Sample`.
50
+
- Set **Supported account types** to **Accounts in any organizational directory**.
51
+
- Under **Redirect URI**, set the first drop-down to `Web` and set the value to the ASP.NET app SSL URL you copied in step 1.
52
+
53
+

54
+
55
+
1. Choose **Register**. On the **GraphWebhooks Sample** page, copy the value of the **Application (client) ID** and save it, you will need it in the next step.
56
+
57
+

58
+
59
+
1. Select **Authentication** under **Manage**. Locate the **Implicit grant** section and enable **ID tokens**. Choose **Save**.
60
+
61
+

62
+
63
+
1. Select **Certificates & secrets** under **Manage**. Select the **New client secret** button. Enter a value in **Description** and select one of the options for **Expires** and choose **Add**.
64
+
65
+

66
+
67
+
1. Copy the client secret value before you leave this page. You will need it in the next step.
68
+
69
+
> [!IMPORTANT]
70
+
> This client secret is never shown again, so make sure you copy it now.
71
+
72
+

73
+
74
+
1. From the **Manage** page, select **API permissions** > **Add a permission**.
75
+
76
+

0 commit comments