diff --git a/sdk/identity/identity/samples-dev/clientSecretCredential.ts b/sdk/identity/identity/samples-dev/clientSecretCredential.ts index c86ac797a96c..8ffa60c45488 100644 --- a/sdk/identity/identity/samples-dev/clientSecretCredential.ts +++ b/sdk/identity/identity/samples-dev/clientSecretCredential.ts @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Authenticates with a client and a App Registration's secret. + * @summary Authenticates with a client and a app registration's secret. */ import { ClientSecretCredential } from "@azure/identity"; @@ -14,8 +14,8 @@ require("dotenv").config(); export async function main(): Promise { const credential = new ClientSecretCredential( process.env.AZURE_TENANT_ID!, // The tenant ID in Azure Active Directory - process.env.AZURE_CLIENT_ID!, // The App Registration client ID in the AAD tenant - process.env.AZURE_CLIENT_SECRET! // The App Registration secret for the registered application + process.env.AZURE_CLIENT_ID!, // The app registration client ID in the AAD tenant + process.env.AZURE_CLIENT_SECRET! // The app registration secret for the registered application ); const keyVaultUrl = `https://key-vault-name.vault.azure.net`; diff --git a/sdk/identity/identity/samples/v2/javascript/README.md b/sdk/identity/identity/samples/v2/javascript/README.md index 61175d312094..a8c1d7082aa9 100644 --- a/sdk/identity/identity/samples/v2/javascript/README.md +++ b/sdk/identity/identity/samples/v2/javascript/README.md @@ -12,11 +12,11 @@ urlFragment: identity-javascript These sample programs show how to use the JavaScript client libraries for Azure Identity in some common scenarios. -| **File Name** | **Description** | -| --------------------------------------------------- | ----------------------------------------------------------------------------------------------- | -| [clientSecretCredential.js][clientsecretcredential] | Authenticates with a client and a App Registration's secret. | -| [defaultAzureCredential.js][defaultazurecredential] | Tries several authentications. The simplest way to use `@azure/identity`. | -| [environmentCredential.js][environmentcredential] | Authenticates with a client and a App Registration's secret sent through environment variables. | +| **File Name** | **Description** | +| --------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | +| [clientSecretCredential.js][clientsecretcredential] | Authenticates with a client and a app registration's secret. | +| [defaultAzureCredential.js][defaultazurecredential] | Tries several authentication methods using a single credential. The simplest way to use `@azure/identity`. | +| [environmentCredential.js][environmentcredential] | Authenticates as an app registration automatically using environment variables. | ## Prerequisites diff --git a/sdk/identity/identity/samples/v2/javascript/clientSecretCredential.js b/sdk/identity/identity/samples/v2/javascript/clientSecretCredential.js index f6abad495d62..a693d294a746 100644 --- a/sdk/identity/identity/samples/v2/javascript/clientSecretCredential.js +++ b/sdk/identity/identity/samples/v2/javascript/clientSecretCredential.js @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Authenticates with a client and a App Registration's secret. + * @summary Authenticates with a client and a app registration's secret. */ const { ClientSecretCredential } = require("@azure/identity"); @@ -14,8 +14,8 @@ require("dotenv").config(); async function main() { const credential = new ClientSecretCredential( process.env.AZURE_TENANT_ID, // The tenant ID in Azure Active Directory - process.env.AZURE_CLIENT_ID, // The App Registration client ID in the AAD tenant - process.env.AZURE_CLIENT_SECRET // The App Registration secret for the registered application + process.env.AZURE_CLIENT_ID, // The app registration client ID in the AAD tenant + process.env.AZURE_CLIENT_SECRET // The app registration secret for the registered application ); const keyVaultUrl = `https://key-vault-name.vault.azure.net`; diff --git a/sdk/identity/identity/samples/v2/javascript/defaultAzureCredential.js b/sdk/identity/identity/samples/v2/javascript/defaultAzureCredential.js index b53f7a788899..649a9d4d76ff 100644 --- a/sdk/identity/identity/samples/v2/javascript/defaultAzureCredential.js +++ b/sdk/identity/identity/samples/v2/javascript/defaultAzureCredential.js @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Tries several authentications. The simplest way to use `@azure/identity`. + * @summary Tries several authentication methods using a single credential. The simplest way to use `@azure/identity`. */ const { DefaultAzureCredential } = require("@azure/identity"); diff --git a/sdk/identity/identity/samples/v2/javascript/environmentCredential.js b/sdk/identity/identity/samples/v2/javascript/environmentCredential.js index 2d12d6f3307b..9de22c42f74a 100644 --- a/sdk/identity/identity/samples/v2/javascript/environmentCredential.js +++ b/sdk/identity/identity/samples/v2/javascript/environmentCredential.js @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Authenticates with a client and a App Registration's secret sent through environment variables. + * @summary Authenticates as an app registration automatically using environment variables. */ const { EnvironmentCredential } = require("@azure/identity"); diff --git a/sdk/identity/identity/samples/v2/typescript/README.md b/sdk/identity/identity/samples/v2/typescript/README.md index c435487092db..e1a7ae035d59 100644 --- a/sdk/identity/identity/samples/v2/typescript/README.md +++ b/sdk/identity/identity/samples/v2/typescript/README.md @@ -12,11 +12,11 @@ urlFragment: identity-typescript These sample programs show how to use the TypeScript client libraries for Azure Identity in some common scenarios. -| **File Name** | **Description** | -| --------------------------------------------------- | ----------------------------------------------------------------------------------------------- | -| [clientSecretCredential.ts][clientsecretcredential] | Authenticates with a client and a App Registration's secret. | -| [defaultAzureCredential.ts][defaultazurecredential] | Tries several authentications. The simplest way to use `@azure/identity`. | -| [environmentCredential.ts][environmentcredential] | Authenticates with a client and a App Registration's secret sent through environment variables. | +| **File Name** | **Description** | +| --------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | +| [clientSecretCredential.ts][clientsecretcredential] | Authenticates with a client and a app registration's secret. | +| [defaultAzureCredential.ts][defaultazurecredential] | Tries several authentication methods using a single credential. The simplest way to use `@azure/identity`. | +| [environmentCredential.ts][environmentcredential] | Authenticates as an app registration automatically using environment variables. | ## Prerequisites diff --git a/sdk/identity/identity/samples/v2/typescript/src/clientSecretCredential.ts b/sdk/identity/identity/samples/v2/typescript/src/clientSecretCredential.ts index c86ac797a96c..8ffa60c45488 100644 --- a/sdk/identity/identity/samples/v2/typescript/src/clientSecretCredential.ts +++ b/sdk/identity/identity/samples/v2/typescript/src/clientSecretCredential.ts @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Authenticates with a client and a App Registration's secret. + * @summary Authenticates with a client and a app registration's secret. */ import { ClientSecretCredential } from "@azure/identity"; @@ -14,8 +14,8 @@ require("dotenv").config(); export async function main(): Promise { const credential = new ClientSecretCredential( process.env.AZURE_TENANT_ID!, // The tenant ID in Azure Active Directory - process.env.AZURE_CLIENT_ID!, // The App Registration client ID in the AAD tenant - process.env.AZURE_CLIENT_SECRET! // The App Registration secret for the registered application + process.env.AZURE_CLIENT_ID!, // The app registration client ID in the AAD tenant + process.env.AZURE_CLIENT_SECRET! // The app registration secret for the registered application ); const keyVaultUrl = `https://key-vault-name.vault.azure.net`; diff --git a/sdk/identity/identity/samples/v2/typescript/src/defaultAzureCredential.ts b/sdk/identity/identity/samples/v2/typescript/src/defaultAzureCredential.ts index 35ea5f80ae2d..f6aba5199af2 100644 --- a/sdk/identity/identity/samples/v2/typescript/src/defaultAzureCredential.ts +++ b/sdk/identity/identity/samples/v2/typescript/src/defaultAzureCredential.ts @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Tries several authentications. The simplest way to use `@azure/identity`. + * @summary Tries several authentication methods using a single credential. The simplest way to use `@azure/identity`. */ import { DefaultAzureCredential } from "@azure/identity"; diff --git a/sdk/identity/identity/samples/v2/typescript/src/environmentCredential.ts b/sdk/identity/identity/samples/v2/typescript/src/environmentCredential.ts index 59ddaba14c04..4c65691c285a 100644 --- a/sdk/identity/identity/samples/v2/typescript/src/environmentCredential.ts +++ b/sdk/identity/identity/samples/v2/typescript/src/environmentCredential.ts @@ -2,7 +2,7 @@ // Licensed under the MIT license. /** - * @summary Authenticates with a client and a App Registration's secret sent through environment variables. + * @summary Authenticates as an app registration automatically using environment variables. */ import { EnvironmentCredential } from "@azure/identity";