Skip to content

Commit 904fba9

Browse files
authored
Merge pull request #1 from Azure-Samples/nc-patch-1
Minor edits
2 parents 53e166e + ffa3876 commit 904fba9

File tree

3 files changed

+18
-18
lines changed

3 files changed

+18
-18
lines changed

1-Call-MsGraph-WithSecret/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ products:
77
- azure-active-directory
88
- dotnet-core
99
- office-ms-graph
10-
description: "Python daemon console app using MSAL.Pyton to get an access token and call Microsoft Graph (client secret variation)."
10+
description: "Python daemon console app using MSAL Python to get an access token and call Microsoft Graph (client secret variation)."
1111
---
1212

1313
# A simple Python daemon console application calling Microsoft Graph with its own identity (client secret variation)
@@ -18,7 +18,7 @@ description: "Python daemon console app using MSAL.Pyton to get an access token
1818

1919
This sample application shows how to use the [Microsoft identity platform endpoint](http://aka.ms/aadv2) to access the data of Microsoft business customers in a long-running, non-interactive process. It uses the [OAuth 2 client credentials grant](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow) to acquire an access token, which can be used to call the [Microsoft Graph](https://graph.microsoft.io) and access organizational data
2020

21-
The app is Python Console application. It gets the list of users in an Azure AD tenant by using `Microsoft Authentication Library (MSAL) for .NET` to acquire a token.
21+
The app is Python Console application. It gets the list of users in an Azure AD tenant by using `Microsoft Authentication Library (MSAL) for Python` to acquire a token.
2222

2323
## Scenario
2424

@@ -235,17 +235,17 @@ Content: {
235235

236236
## Variation: daemon application using client credentials with certificates
237237

238-
See [..\2-Call-MsGraph-WithCertificate](..\2-Call-MsGraph-WithCertificate)
238+
See [../2-Call-MsGraph-WithCertificate](../2-Call-MsGraph-WithCertificate)
239239

240240
## Community Help and Support
241241

242242
Use [Stack Overflow](http://stackoverflow.com/questions/tagged/msal) to get support from the community.
243243
Ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before.
244-
Make sure that your questions or comments are tagged with [`msal` `dotnet`].
244+
Make sure that your questions or comments are tagged with [`msal` `python`].
245245

246246
If you find a bug in the sample, please raise the issue on [GitHub Issues](../../issues).
247247

248-
If you find a bug in msal.Net, please raise the issue on [MSAL.NET GitHub Issues](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues).
248+
If you find a bug in Msal Python, please raise the issue on [MSAL Python GitHub Issues](https://github.com/AzureAD/microsoft-authentication-library-for-python/issues).
249249

250250
To provide a recommendation, visit the following [User Voice page](https://feedback.azure.com/forums/169401-azure-active-directory).
251251

2-Call-MsGraph-WithCertificate/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ products:
77
- azure-active-directory
88
- dotnet-core
99
- office-ms-graph
10-
description: "Python daemon console app using MSAL.Pyton to get an access token and call Microsoft Graph (client secret variation)."
10+
description: "Python daemon console app using MSAL Python to get an access token and call Microsoft Graph (client secret variation)."
1111
---
1212

1313
# A simple Python daemon console application calling Microsoft Graph with its own identity (client certificate variation)
@@ -16,9 +16,9 @@ description: "Python daemon console app using MSAL.Pyton to get an access token
1616

1717
### Overview
1818

19-
This sample application shows how to use the [Microsoft identity platform endpoint](http://aka.ms/aadv2) to access the data of Microsoft business customers in a long-running, non-interactive process. It uses the [OAuth 2 client credentials grant](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow) to acquire an access token, which can be used to call the [Microsoft Graph](https://graph.microsoft.io) and access organizational data
19+
This sample application shows how to use the [Microsoft identity platform endpoint](http://aka.ms/aadv2) to access the data of Microsoft business customers in a long-running, non-interactive process. It uses the [OAuth 2 client credentials grant](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow) to acquire an access token, which can be used to call the [Microsoft Graph](https://graph.microsoft.io) and access organizational data.
2020

21-
The app is Python Console application. It gets the list of users in an Azure AD tenant by using `Microsoft Authentication Library (MSAL) for .NET` to acquire a token.
21+
The app is a Python Console application. It gets the list of users in an Azure AD tenant by using `Microsoft Authentication Library (MSAL) for Python` to acquire a token.
2222

2323
## Scenario
2424

@@ -54,10 +54,10 @@ git clone https://github.com/Azure-Samples/ms-identity-python-daemon.git
5454
Go to the `"2-Call-MsGraph-WithCertificat"` folder
5555

5656
```Shell
57-
cd "2-Call-MsGraph-WithCertificate"
57+
cd 2-Call-MsGraph-WithCertificate
5858
```
5959

60-
or download and exact the repository .zip file.
60+
or download and extract the repository .zip file.
6161

6262
> Given that the name of the sample is pretty long, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
6363
@@ -88,7 +88,7 @@ If you want to use this automation:
8888
python confidential_client_certificate_sample.py parameters.json
8989
```
9090

91-
If ou don't want to use this automation, follow the steps below
91+
If you don't want to use this automation, follow the steps below:
9292

9393
#### Choose the Azure AD tenant where you want to create your applications
9494

@@ -251,17 +251,17 @@ Content: {
251251

252252
## Variation: daemon application using client credentials with client secret
253253

254-
For the other variation, see [..\1-Call-MsGraph-WithSecret](..\1-Call-MsGraph-WithSecret)
254+
For the other variation, see [../1-Call-MsGraph-WithSecret](../1-Call-MsGraph-WithSecret)
255255

256256
## Community Help and Support
257257

258258
Use [Stack Overflow](http://stackoverflow.com/questions/tagged/msal) to get support from the community.
259259
Ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before.
260-
Make sure that your questions or comments are tagged with [`msal` `dotnet`].
260+
Make sure that your questions or comments are tagged with [`msal` `python`].
261261

262262
If you find a bug in the sample, please raise the issue on [GitHub Issues](../../issues).
263263

264-
If you find a bug in msal.Net, please raise the issue on [MSAL.NET GitHub Issues](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues).
264+
If you find a bug in Msal Python, please raise the issue on [MSAL Python GitHub Issues](https://github.com/AzureAD/microsoft-authentication-library-for-python/issues).
265265

266266
To provide a recommendation, visit the following [User Voice page](https://feedback.azure.com/forums/169401-azure-active-directory).
267267

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ languages:
55
- powershell
66
products:
77
- azure-active-directory
8-
description: "This sample demonstrates a Python daemon console app calling a Microsoft Graph that is secured using the Microsoft identity platform."
8+
description: "This sample demonstrates a Python daemon console app calling the Microsoft Graph that is secured using the Microsoft identity platform."
99
urlFragment: ms-identity-python-webapp
1010
---
1111

@@ -25,7 +25,7 @@ Taxonomies for products and languages: https://review.docs.microsoft.com/new-hop
2525

2626
You want to write a daemon application that consumes organizational data using Microsoft Graph and using **Microsoft Identity Platform** to acquire tokens.
2727

28-
For details see [Daemon apps scenario](https://docs.microsoft.com/en-us/azure/active-directory/develop/scenario-daemon-overview)
28+
For details see [Daemon apps scenario](https://docs.microsoft.com/en-us/azure/active-directory/develop/scenario-daemon-overview).
2929

3030
### Structure of the repository
3131

@@ -47,15 +47,15 @@ To run this sample, you'll need:
4747
> ```
4848
> - An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [how to get an Azure AD tenant.](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
4949
50-
## Setup and run the sample. Learn key concepts
50+
## Setup and run the sample
5151
5252
Download and extract the repository .zip file or, from your shell or command line:
5353
5454
```Shell
5555
git clone https://github.com/Azure-Samples/ms-identity-python-daemon.git
5656
```
5757
58-
Then, see the readme of each sub-folder to understand how to setup and run the samples, and learn key concepts
58+
Then, see the readme of each sub-folder to understand how to setup and run the samples, and learn key concepts.
5959

6060
## Contributing
6161

0 commit comments

Comments
 (0)