Skip to content

Commit e40ca37

Browse files
committed
fix https instruction
1 parent 706a5e7 commit e40ca37

2 files changed

Lines changed: 10 additions & 10 deletions

File tree

1-Authentication/1-sign-in/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ As a first step you'll need to:
125125
1. In the **Register an application page** that appears, enter your application's registration information:
126126
- In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `WebApp`.
127127
- Under **Supported account types**, select **Accounts in this organizational directory only**.
128-
- In the **Redirect URI (optional)** section, select **Web** in the combo-box and enter the following redirect URI: `https://localhost:4000/redirect`.
128+
- In the **Redirect URI (optional)** section, select **Web** in the combo-box and enter the following redirect URI: `http://localhost:4000/redirect`.
129129
1. Select **Register** to create the application.
130130
1. In the app's registration screen, find and note the **Application (client) ID**. You use this value in your app's configuration file(s) later in your code.
131131
1. Select **Save** to save your changes.

1-Authentication/2-sign-in-b2c/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Please refer to: [Tutorial: Add identity providers to your applications in Azure
102102
1. In the **Register an application page** that appears, enter your application's registration information:
103103
- In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `WebAppB2C`.
104104
- Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**.
105-
- In the **Redirect URI (optional)** section, select **Web** in the combo-box and enter the following redirect URI: `https://localhost:4000/redirect`.
105+
- In the **Redirect URI (optional)** section, select **Web** in the combo-box and enter the following redirect URI: `http://localhost:4000/redirect`.
106106
1. Select **Register** to create the application.
107107
1. In the app's registration screen, find and note the **Application (client) ID**. You use this value in your app's configuration file(s) later in your code.
108108
1. Select **Save** to save your changes.
@@ -120,15 +120,15 @@ Open the project in your IDE (like Visual Studio or Visual Studio Code) to confi
120120
> In the steps below, "ClientID" is the same as "Application ID" or "AppId".
121121
122122
1. Open the `auth.json` file.
123-
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of the `WebAppB2C` application copied from the Azure portal.
124-
1. Find the key `TenantId` and replace the existing value with your Azure AD tenant ID.
125-
1. Find the key `ClientSecret` and replace the existing value with the key you saved during the creation of the `WebAppB2C` app, in the Azure portal.
123+
1. Find the key `ClientId` and replace the existing value with the application ID (clientId) of the application copied from the **Azure Portal**.
124+
1. Find the key `TenantId` and replace the existing value with your Azure AD tenant ID copied from the **Azure Portal**.
125+
1. Find the key `ClientSecret` and replace the existing value with the key you saved during the creation of the application, on the **Azure Portal**.
126126
1. Find the key `homePageRoute` and replace the existing value with the home page route of your application, e.g. `/home`.
127127
1. Find the key `redirectUri` and replace the existing value with the redirect URI that you have registered on **Azure Portal**, e.g. `http://localhost:4000/redirect`.
128128
1. Find the key `postLogoutRedirectUri` and replace the existing value with the URI of the page that you wish to be redirected after signing-out, e.g `http://localhost:4000/`.
129-
1. Find the key `policies.names` and replace it with the names (IDs) of your policies/user-flows e.g. `b2c_1_susi`.
130-
1. Find the key `policies.authorities` abd replace it with the authority strings of your policies/user-flows e.g. `https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_susi`.
131-
1. Find the key `policies.authorityDomain` abd replace it with the domain of your authority e.g. `fabrikamb2c.b2clogin.com`.
129+
1. Find the key `policies.names` and replace it with the names (IDs) of your policies/user-flows, e.g. `b2c_1_susi`.
130+
1. Find the key `policies.authorities` abd replace it with the authority strings of your policies/user-flows, e.g. `https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_susi`.
131+
1. Find the key `policies.authorityDomain` abd replace it with the domain of your authority, e.g. `fabrikamb2c.b2clogin.com`.
132132

133133
## Running the sample
134134

@@ -157,10 +157,10 @@ Were we successful in addressing your learning objective? Consider taking a mome
157157

158158
### ID Token validation
159159

160-
### User flows
161-
162160
### Sign-out
163161

162+
### User flows
163+
164164
## More information
165165

166166
Configure your application:

0 commit comments

Comments
 (0)