Skip to content

Commit ca6c614

Browse files
author
derisen
committed
review changes
1 parent d5b8846 commit ca6c614

22 files changed

Lines changed: 123 additions & 104 deletions

File tree

1-Authentication/1-sign-in/App/routes/router.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@ const express = require('express');
22

33
const mainController = require('../controllers/mainController');
44

5-
const MsalExpressMiddleware = require('../../../../MsalNodeCommons/MsalExpressMiddleware');
5+
const MsalNodeCommons = require('../../../../MsalNodeCommons/MsalNodeCommons');
66
const auth = require('../../auth.json');
77
const cache = require('../utils/cachePlugin');
88

9-
const msal = new MsalExpressMiddleware(auth, cache);
9+
const msal = new MsalNodeCommons(auth, cache);
1010

1111
// initialize router
1212
const router = express.Router();

1-Authentication/1-sign-in/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ description: "This sample demonstrates a Node.js & Express Web App authenticatin
2828

2929
## Overview
3030

31-
This sample demonstrates a Node.js & Express web application that authenticates users against Azure AD, with the help of [Microsoft Authentication Library for Node.js](https://aka.ms/msalnode) (MSAL Node). In doing so, it also illustrates various authentication concepts, such as [OpenID scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [ID Token validation](https://docs.microsoft.com/azure/active-directory/develop/id-tokens#validating-an-id_token) and more.
31+
This sample demonstrates a Node.js & Express web application that authenticates users against Azure AD, with the help of [Microsoft Authentication Library for Node.js [PREVIEW]](https://aka.ms/msalnode) (MSAL Node [PREVIEW]). In doing so, it also illustrates various authentication concepts, such as [OpenID scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [ID Tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens), [ID Token validation](https://docs.microsoft.com/azure/active-directory/develop/id-tokens#validating-an-id_token) and more.
3232

3333
## Scenario
3434

1-Authentication/2-sign-in-b2c/App/routes/router.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@ const express = require('express');
22

33
const mainController = require('../controllers/mainController');
44

5-
const MsalExpressMiddleware = require('../../../../MsalNodeCommons/MsalExpressMiddleware');
5+
const MsalNodeCommons = require('../../../../MsalNodeCommons/MsalNodeCommons');
66
const auth = require('../../auth.json');
77
const cache = require('../utils/cachePlugin');
88

9-
const msal = new MsalExpressMiddleware(auth, cache);
9+
const msal = new MsalNodeCommons(auth, cache);
1010

1111
// initialize router
1212
const router = express.Router();

1-Authentication/2-sign-in-b2c/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ description: "This sample demonstrates a Node.js Express Web App application tha
2727

2828
## Overview
2929

30-
This sample demonstrates a Node.js & Express web application that authenticates users against Azure AD, with the help of [Microsoft Authentication Library for Node.js](https://aka.ms/msalnode) (MSAL Node). In doing so, it also illustrates various authentication concepts, such as [OpenID scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [ID Tokens](https://docs.microsoft.com/azure/active-directory-b2c/openid-connect), [ID Token validation](https://docs.microsoft.com/azure/active-directory-b2c/openid-connect#validate-the-id-token), [user-flows](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-overview) and more.
30+
This sample demonstrates a Node.js & Express web application that authenticates users against Azure AD, with the help of [Microsoft Authentication Library for Node.js [PREVIEW]](https://aka.ms/msalnode) (MSAL Node [PREVIEW]). In doing so, it also illustrates various authentication concepts, such as [OpenID scopes](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#openid-connect-scopes), [ID Tokens](https://docs.microsoft.com/azure/active-directory-b2c/openid-connect), [ID Token validation](https://docs.microsoft.com/azure/active-directory-b2c/openid-connect#validate-the-id-token), [user-flows](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-overview) and more.
3131

3232
## Scenario
3333

2-Authorization-I/1-call-graph/App/routes/router.js

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,13 @@ const express = require('express');
22

33
const mainController = require('../controllers/mainController');
44

5-
const MsalExpressMiddleware = require('../../../../MsalNodeCommons/MsalExpressMiddleware');
6-
const auth = require('../../auth.json');
5+
6+
const config = require('../../auth.json');
77
const cache = require('../utils/cachePlugin');
88

9-
const msal = new MsalExpressMiddleware(auth, cache);
9+
const MsalNodeCommons = require('MsalNodeCommons/MsalNodeCommons');
10+
11+
const msal = new MsalNodeCommons(config, cache);
1012

1113
// initialize router
1214
const router = express.Router();

2-Authorization-I/1-call-graph/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ description: "This sample demonstrates a Node.js Express Web App application tha
2828

2929
## Overview
3030

31-
This sample demonstrates a Node.js & Express web application that authenticates users against [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis) (Azure AD) and obtains [Access Tokens](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) to call [Microsoft Graph API](https://docs.microsoft.com/graph/overview) (Graph API) and [Azure Resource Manager API](https://docs.microsoft.com/azure/azure-resource-manager/management/overview) (ARM API), with the help of [Microsoft Authentication Library for Node.js](https://aka.ms/msalnode) (MSAL Node). In doing so, it also illustrates various authorization concepts, such as [OAuth 2.0 Authorization Code Grant](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow), [Dynamic Scopes and Incremental Consent](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent), **working with multiple resources** and more.
31+
This sample demonstrates a Node.js & Express web application that authenticates users against [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis) (Azure AD) and obtains [Access Tokens](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) to call [Microsoft Graph API](https://docs.microsoft.com/graph/overview) (Graph API) and [Azure Resource Manager API](https://docs.microsoft.com/azure/azure-resource-manager/management/overview) (ARM API), with the help of [Microsoft Authentication Library for Node.js [PREVIEW]](https://aka.ms/msalnode) (MSAL Node [PREVIEW]). In doing so, it also illustrates various authorization concepts, such as [OAuth 2.0 Authorization Code Grant](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow), [Dynamic Scopes and Incremental Consent](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent), **working with multiple resources** and more.
3232

3333
## Scenario
3434

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"Account":{"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef-login.windows.net-cbaf2168-de14-4c72-9d88-f5f05366dbef":{"home_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef","environment":"login.windows.net","realm":"cbaf2168-de14-4c72-9d88-f5f05366dbef","local_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7","username":"admin@msaltestingjs.onmicrosoft.com","authority_type":"MSSTS","name":"Dogan Erisen","client_info":"eyJ1aWQiOiJhMjgzYTYwMS02YWQ0LTQ1MjgtOTc1ZC02YWJiZWZhNWVkZDciLCJ1dGlkIjoiY2JhZjIxNjgtZGUxNC00YzcyLTlkODgtZjVmMDUzNjZkYmVmIn0"}},"IdToken":{"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef-login.windows.net-idtoken-45969834-3083-4671-b33e-e7de11e358a1-cbaf2168-de14-4c72-9d88-f5f05366dbef-":{"home_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef","environment":"login.windows.net","credential_type":"IdToken","client_id":"45969834-3083-4671-b33e-e7de11e358a1","secret":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImtnMkxZczJUMENUaklmajRydDZKSXluZW4zOCJ9.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.BHzc5LMGBiKaLjYmIVfWsp3hNDL4SpgZl_5XN2IhME9luPSMpHL5ZSYczFTZAFX-BjTvgyq55hFzCRYM6yWS-nIrNZ3iuGXsS4UYXqN--5aa4aj3Kzjz4Ym_Hgf0xHiqj_Z1r4znx90okltbKEC5PvF5UWDO4su6SPH_SeYgnHn0f9PYcEJLpn7-QEmEQZ2zSa7Tozf_JElzXKVShd4xhf_HoSxJjHBwdJnI9g617fsCwyKJQ0ke7wGLRdw62V-E7fb_GZHKaYxdPZ2NhfRjFa7pWQXHMVHHKzCOOZFfJC8ucfsOxf7-5-FkRSqSvZnmg7ONwPfvpEgMV4mivWg4Ng","realm":"cbaf2168-de14-4c72-9d88-f5f05366dbef"}},"AccessToken":{"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef-login.windows.net-accesstoken-45969834-3083-4671-b33e-e7de11e358a1-cbaf2168-de14-4c72-9d88-f5f05366dbef-openid profile email user.read":{"home_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef","environment":"login.windows.net","credential_type":"AccessToken","client_id":"45969834-3083-4671-b33e-e7de11e358a1","secret":"eyJ0eXAiOiJKV1QiLCJub25jZSI6Il9vZG1yaDV2T3dyVTJnbFFzVlNLOWVDYW5ia1JIcE5PNW9QMkt5QzhUUGciLCJhbGciOiJSUzI1NiIsIng1dCI6ImtnMkxZczJUMENUaklmajRydDZKSXluZW4zOCIsImtpZCI6ImtnMkxZczJUMENUaklmajRydDZKSXluZW4zOCJ9.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.bUDJH1B-kVxZYAmcjiL76P4LkSMd7nCGeDwugl9N6AbwiBAEds4-vfdP8SAfdIRUspUmjNj7IIQ2UDlRsHHKDa8Y_HkPx_NMvOLxRrB2pgUNJq8JksiYm_JjvtreHkODkCwbUFxO_YyTGZXA91DpISHkHXcuya7NHLwWoHJjBHeobW0U1kliA-qwYKUV0_xyfPXaYzMpQwlUXNmAJAIL1oiW7n6pzDvGzdmQ7eCX43yMiY-5oycS5OuBeN9yoOzkgOjI_aB9uqZNx-QQ_u1eOc_i7FNu2w1KdZPxeja3EOnOr9TpGhRVQ5eOcsbEo4a2Xb8BkSjJ-moVAtu9pXq1KQ","realm":"cbaf2168-de14-4c72-9d88-f5f05366dbef","target":"openid profile email User.Read","cached_at":"1605897704","expires_on":"1605901303","extended_expires_on":"1605904902","token_type":"Bearer"},"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef-login.windows.net-accesstoken-45969834-3083-4671-b33e-e7de11e358a1-cbaf2168-de14-4c72-9d88-f5f05366dbef-https://management.azure.com/user_impersonation":{"home_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef","environment":"login.windows.net","credential_type":"AccessToken","client_id":"45969834-3083-4671-b33e-e7de11e358a1","secret":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImtnMkxZczJUMENUaklmajRydDZKSXluZW4zOCIsImtpZCI6ImtnMkxZczJUMENUaklmajRydDZKSXluZW4zOCJ9.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.P6Kky8KuGJ7C_6drC9JgAq_5Rj6du5pltPPvViTSGnMpSK6KVlbbhZNg9bNxMJouTdUGIqW2IwhsZk32U30JTsfiilQ-X1T5FqM7tDa07jb243F_ClpvenN2fIngqb-V7_9wf14EHPljAYic643Rlu342MvcRdSDRn_vh246E7Qb9Pf9qSkkVBUdb9gjJYujAvePN63yPZwWNMq-Y4hQDPFl3qlsdvUSWnc7RcezgtSWTdtF3ORVS-WjTyflueVxdzFI8ddd5K7AUaRvVc6oR1vCx3Bzklv02rimN6NFJ37IxWRGxO4-9fGznik67O2OTqU33-WjFBpgLc173G3bWg","realm":"cbaf2168-de14-4c72-9d88-f5f05366dbef","target":"https://management.azure.com/user_impersonation","cached_at":"1605895770","expires_on":"1605899369","extended_expires_on":"1605902968","token_type":"Bearer"}},"RefreshToken":{"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef-login.windows.net-refreshtoken-45969834-3083-4671-b33e-e7de11e358a1--":{"home_account_id":"a283a601-6ad4-4528-975d-6abbefa5edd7.cbaf2168-de14-4c72-9d88-f5f05366dbef","environment":"login.windows.net","credential_type":"RefreshToken","client_id":"45969834-3083-4671-b33e-e7de11e358a1","secret":"0.AAAAaCGvyxTeckydiPXwU2bb7zSYlkWDMHFGsz7n3hHjWKFFADg.AgABAAAAAAB2UyzwtQEKR7-rWbgdcBZIAQDs_wIA9P8sgLgIgi7g8X39lFsaZA10MpqjxHiVOMn9APJ3C8IcqipKIHk8KaSLczsVl9cSA7_rwNe5cc7SACBv5QhQIOnUtv4NFtX2F3McMYRlvnZjJ8__xPToywEo_Wyk_RtpyGQCS_ULt_UtwDMvTYNGkzzjZFzi0ne7NrukeyKR98aZA05WwXyWdxoUxvLCaGz9NGBJXdLngcl9QUn1MKfQh2CWrahKPy7xZXrRUpwFljxRVORD_dsdcsMnKz7yyF7S13hjJ5jdSSK8lXDOObHlPnOTciZZJAWMnuzfPToECja_NubU2oh2UdrVFZ0TWioWSWn0v3ReOFzBWHSn268FovCp7iKwaVt-MNkkY1EJbl-KNXyUnxvtitY-K39vrTNMAXjzb1vyRBQmQOu6jiHcPwvy6PaXZkg1x_6Aquif4PSuNURIapqe9Lfx7dObRRuMG2dNIfrutyXLVR3rzI1-52dILCqMqJBRcr3avgn3i8V9t2ZJIXIhaGigWAwradkse70o08c4H2C4cHh40DRDmo_ci3k9VlM8b32EA2cJZpN6azqlo8KsPfbkaLLwXP9fok7beaUiQK9Sl0a4so84qHAkPisXRK10std8qAs8qa7nbqO0C2EDZUJqTluhidChgEms16wsaopWlN0Cq1qduaOcZRakE7r7qiARwWeCG6eDMbycAqBqU7mMe8g4xWcUuMjV0w8E3C034okNF_xH3kTPWXUfBdQf9QdlKzIMB_r3MjVW92vWLaDPIP7-O9ZPzubTnAGEDgUJgq0C_N-Y-jQkiIjC3HG8w8jnszGJEx9-nXf1qlmU-AszkQZrzt_w9EwUs5eQWPY7SFgxpt-vkIyRA67dmszOA4QqN-8KTfvsd9AUS8fUR-red0lhmDTheBabiI8"}},"AppMetadata":{}}

2-Authorization-I/1-call-graph/package.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@
1515
"bootstrap": "^4.5.3",
1616
"ejs": "^3.0.1",
1717
"express": "^4.17.1",
18-
"express-session": "^1.17.1"
18+
"express-session": "^1.17.1",
19+
"MsalNodeCommons": "file:../../MsalNodeCommons"
1920
},
2021
"devDependencies": {
2122
"nodemon": "^2.0.2"

0 commit comments

Comments
 (0)