From our previous post, we saw how we can expose APIs secured with Azure AD through the use of application object. This provides us with a managed identity. Azure functions can be granted two types of identities: A system-assigned identity is tied to your application and is deleted if your app is deleted. An app can only Read
If you want to access a state prop inside of setTimeout, use Thanks to a discussion on Github: https://github.com/facebook/react/issues/14010
Learn how to make your web or client application connect to your APIs that have been secured with Azure Active Directory.
Take advantage of Azure AD to secure you Web APIs. Users with active accounts can seamlessly work with your applications that leverage API secured with Azure AD.
Understand how Azure AD OAuth authorization flows works. There are different types of OAuth flows depending on the kind of application.
Want to understand Application Objects and Service principals? This post will explain the differences between the two and how applications are added to Azure AD.
Learn how to access SharePoint using an application context, also known as app-only.
Wouldn’t it be great if we could just open our browser, log in to our SharePoint site, and use the browser to do our testing?
There are times when you might want to test your application against real data in SharePoint, instead of mock data. Wouldn’t is be great if we could have a proxy to send these requests to, and it will take care of all the authentication stuff for us.