Skip to content

Latest commit

 

History

History
29 lines (27 loc) · 2.01 KB

active-directory-protocols-getting-started.md

File metadata and controls

29 lines (27 loc) · 2.01 KB
title description services documentationcenter author manager editor ms.service ms.workload ms.tgt_pltfrm ms.devlang ms.topic ms.date ms.author
Azure AD .NET Protocol Overview | Microsoft Docs
How to use HTTP messages to authorize access to web applications and web APIs in your tenant using Azure AD.
active-directory
.net
priyamohanram
mbaldwin
active-directory
identity
na
dotnet
article
01/21/2016
priyamo

Register your application with your AD tenant

First, you will need to register your application with your Azure Active Directory (Azure AD) tenant. This will give you an Application ID for your application, as well as enable it to receive tokens.

  • Sign in to the Azure Portal.
  • Choose your Azure AD tenant by clicking on your account in the top right corner of the page.
  • In the left hand navigation pane, click on Azure Active Directory.
  • Click on App Registrations and click on Add.
  • Follow the prompts and create a new application. It doesn't matter if it is a web application or a native application for this tutorial, but if you'd like specific examples for web applications or native applications, check out our quickstarts.
    • For Web Applications, provide the Sign-On URL which is the base URL of your app, where users can sign in e.g http://localhost:12345.
">https://contoso.onmicrosoft.com/my-first-aad-app`-->
  • For Native Applications, provide a Redirect URI, which Azure AD will use to return token responses. Enter a value specific to your application, .e.g http://MyFirstAADApp
  • Once you've completed registration, Azure AD will assign your application a unique client identifier, the Application ID. You will need this value in the next sections, so copy it from the application page.