Skip to content

Commit 706a5e7

Browse files
committed
fix ch1-1 port number
1 parent 0faecf1 commit 706a5e7

6 files changed

Lines changed: 8 additions & 15 deletions

File tree

1-Authentication/1-sign-in/App/app.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ const path = require('path');
99

1010
const router = require('./routes/router');
1111

12-
const SERVER_PORT = process.env.PORT || 5000;
12+
const SERVER_PORT = process.env.PORT || 4000;
1313

1414
const app = express();
1515

1-Authentication/1-sign-in/App/utils/identity.js

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,6 @@
44
*/
55

66
const msal = require('@azure/msal-node');
7-
const jwt = require('jsonwebtoken')
8-
const jwksClient = require('jwks-rsa');
9-
const axios = require('axios');
107
const { v4: uuidv4 } = require('uuid');
118

129
const auth = require('../../auth.json');

1-Authentication/1-sign-in/README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
143143
> In the steps below, "ClientID" is the same as "Application ID" or "AppId".
144144
145145
1. Open the `auth.json` file.
146-
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of the `WebApp` application copied from the **Azure Portal**.
146+
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of the application copied from the **Azure Portal**.
147147
1. Find the key `TenantId` and replace the existing value with your Azure AD tenant ID copied from the **Azure Portal**.
148-
1. Find the key `ClientSecret` and replace the existing value with the key you saved during the creation of the `WebApp` application copied from the **Azure Portal**.
148+
1. Find the key `ClientSecret` and replace the existing value with the key you saved during the creation of the application copied from the **Azure Portal**.
149149
1. Find the key `homePageRoute` and replace the existing value with the home page route of your application, e.g. `/home`.
150150
1. Find the key `redirectUri` and replace the existing value with the redirect URI that you have registered on **Azure Portal**, e.g. `http://localhost:4000/redirect`.
151151
1. Find the key `postLogoutRedirectUri` and replace the existing value with the URI of the page that you wish to be redirected after signing-out, e.g `http://localhost:4000/`.
@@ -179,6 +179,8 @@ Were we successful in addressing your learning objective? Consider taking a mome
179179

180180
### Sign-out
181181

182+
### National Clouds
183+
182184
## More information
183185

184186
Configure your application:

1-Authentication/1-sign-in/package.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,11 @@
1212
"license": "MIT",
1313
"dependencies": {
1414
"@azure/msal-node": "^1.0.0-beta.0",
15-
"axios": "^0.21.0",
1615
"body-parser": "^1.19.0",
1716
"bootstrap": "^4.5.3",
1817
"ejs": "^3.0.1",
1918
"express": "^4.17.1",
2019
"express-session": "^1.17.1",
21-
"jsonwebtoken": "^8.5.1",
22-
"jwks-rsa": "^1.8.1",
2320
"uuid": "^8.3.1"
2421
},
2522
"devDependencies": {

1-Authentication/2-sign-in-b2c/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -87,15 +87,15 @@ As a first step you'll need to:
8787
1. Sign in to the [Azure portal](https://portal.azure.com).
8888
1. If your account is present in more than one Azure AD B2C tenant, select your profile at the top right corner in the menu on top of the page, and then **switch directory** to change your portal session to the desired Azure AD B2C tenant.
8989

90-
### Create User Flows and Custom Policies
90+
### Create User Flows
9191

9292
Please refer to: [Tutorial: Create user flows in Azure Active Directory B2C](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows)
9393

9494
### Add External Identity Providers
9595

9696
Please refer to: [Tutorial: Add identity providers to your applications in Azure Active Directory B2C](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-add-identity-providers)
9797

98-
### Register the webApp app (WebAppB2C)
98+
### Register the app
9999

100100
1. Navigate to the [Azure portal](https://portal.azure.com) and select the **Azure AD B2C** service.
101101
1. Select the **App Registrations** blade on the left, then select **New registration**.
@@ -113,7 +113,7 @@ Please refer to: [Tutorial: Add identity providers to your applications in Azure
113113
- The generated key value will be displayed when you select the **Add** button. Copy the generated value for use in the steps later.
114114
- You'll need this key later in your code's configuration files. This key value will not be displayed again, and is not retrievable by any other means, so make sure to note it from the Azure portal before navigating to any other screen or blade.
115115

116-
#### Configure the webApp app (WebAppB2C) to use your app registration
116+
#### Configure the app to use your app registration
117117

118118
Open the project in your IDE (like Visual Studio or Visual Studio Code) to configure the code.
119119

1-Authentication/2-sign-in-b2c/package.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,11 @@
1212
"license": "MIT",
1313
"dependencies": {
1414
"@azure/msal-node": "^1.0.0-beta.0",
15-
"axios": "^0.21.0",
1615
"body-parser": "^1.19.0",
1716
"bootstrap": "^4.5.3",
1817
"ejs": "^3.0.1",
1918
"express": "^4.17.1",
2019
"express-session": "^1.17.1",
21-
"jsonwebtoken": "^8.5.1",
22-
"jwks-rsa": "^1.8.1",
2320
"uuid": "^8.3.1"
2421
},
2522
"devDependencies": {

0 commit comments

Comments
 (0)