Skip to content
This repository was archived by the owner on Jan 23, 2020. It is now read-only.

Commit a8398ed

Browse files
committed
Update readme.md
1 parent 8f97d3a commit a8398ed

File tree

1 file changed

+6
-11
lines changed

1 file changed

+6
-11
lines changed

README.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,16 @@ For more information about how the protocols work in this scenario and other sce
1616
Getting started is simple! To run this sample you will need:
1717
- Install .NET Core for Windows by following the instructions at [dot.net/core](https://dot.net/core), which will include Visual Studio 2015 Update 3.
1818
- An Internet connection
19-
- An Azure subscription (a free trial is sufficient)
20-
21-
Every Azure subscription has an associated Azure Active Directory tenant. If you don't already have an Azure subscription, you can get a free subscription by signing up at [https://azure.microsoft.com](https://azure.microsoft.com). All of the Azure AD features used by this sample are available free of charge.
19+
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, please see [How to get an Azure AD tenant](https://azure.microsoft.com/en-us/documentation/articles/active-directory-howto-tenant/)
20+
- A user account in your Azure AD tenant. This sample will not work with a Microsoft account, so if you signed in to the Azure portal with a Microsoft account and have never created a user account in your directory before, you need to do that now.
2221

2322
### Step 1: Clone or download this repository
2423

2524
From your shell or command line:
2625

2726
`git clone https://github.com/Azure-Samples/active-directory-dotnet-webapp-webapi-openidconnect-aspnetcore.git`
2827

29-
### Step 2: Create a user account in your Azure Active Directory tenant
30-
31-
If you already have a user account in your Azure Active Directory tenant, you can skip to the next step. This sample will not work with a Microsoft account, so if you signed in to the Azure portal with a Microsoft account and have never created a user account in your directory before, you need to do that now. If you create an account and want to use it to sign-in to the Azure portal, don't forget to add the user account as a co-administrator of your Azure subscription.
32-
33-
### Step 3: Register the sample with your Azure Active Directory tenant
28+
### Step 2: Register the sample with your Azure Active Directory tenant
3429

3530
There are two projects in this sample. Each needs to be separately registered in your Azure AD tenant.
3631

@@ -57,7 +52,7 @@ There are two projects in this sample. Each needs to be separately registered i
5752
9. From the Settings menu, choose **Keys** and add a key - select a key duration of either 1 year or 2 years. When you save this page, the key value will be displayed, copy and save the value in a safe location - you will need this key later to configure the project in Visual Studio - this key value will not be displayed again, nor retrievable by any other means, so please record it as soon as it is visible from the Azure Portal.
5853
10. Configure Permissions for your application - in the Settings menu, choose the 'Required permissions' section, click on **Add**, then **Select an API**, and type 'TodoListService' in the textbox. Then, click on **Select Permissions** and select 'Access TodoListService'.
5954

60-
### Step 4: Configure the sample to use your Azure AD tenant
55+
### Step 3: Configure the sample to use your Azure AD tenant
6156

6257
#### Configure the TodoListService project
6358

@@ -76,7 +71,7 @@ There are two projects in this sample. Each needs to be separately registered i
7671
6. If you changed the base URL of the TodoListWebApp sample, find the `PostLogoutRedirectUri` property and replace the value with the new base URL of the sample.
7772
8. Find the `TodoListResourceId` property and replace the value with the App ID URI registered for the TodoListService, for example `https://<your_tenant_name>/TodoListService`.
7873

79-
### Step 5: Trust the IIS Express SSL certificate
74+
### Step 4: Trust the IIS Express SSL certificate
8075

8176
Since the web API is SSL protected, the client of the API (the web app) will refuse the SSL connection to the web API unless it trusts the API's SSL certificate. Use the following steps in Windows Powershell to trust the IIS Express SSL certificate. You only need to do this once. If you fail to do this step, calls to the TodoListService will always throw an unhandled exception where the inner exception message is:
8277

@@ -112,7 +107,7 @@ You can verify the certificate is in the Trusted Root store by running this comm
112107

113108
`PS C:\windows\system32> dir Cert:\LocalMachine\Root`
114109

115-
### Step 6: Run the sample
110+
### Step 5: Run the sample
116111

117112
Clean the solution, rebuild the solution, and run it. You might want to go into the solution properties and set both projects as startup projects, with the service project starting first.
118113

0 commit comments

Comments
 (0)