Skip to content

Commit

Permalink
Merge pull request #5370 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish to live, Tuesday 4 AM PST, 10/1
  • Loading branch information
ttorble authored Oct 1, 2024
2 parents dbe0de0 + 41e8387 commit 5a22c68
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -100,13 +100,13 @@ To obtain the sample application, you can either clone it from GitHub or downloa
```bash
...
info: Microsoft.Hosting.Lifetime[14]
Now listening on: https://localhost:{port}
Now listening on: http://localhost:{port}
...
```

Record the port number in the `https://localhost:{port}` URL.
Record the port number in the `http://localhost:{port}` URL.

1. To verify the endpoint is protected, use the following cURL command in Bash to send an unauthenticated HTTP GET request in Bash:
1. To verify the endpoint is protected, update the base URL in the following cURL command to match the one you received in the previous step, and then run the command:

```bash
curl -X GET https://localhost:5001/weatherforecast -ki
Expand All @@ -123,7 +123,9 @@ To obtain the sample application, you can either clone it from GitHub or downloa
content-length: 0
```

## Related content
## Next steps

- [How-to: Call an ASP.NET Core web API with cURL](howto-call-a-web-api-with-curl.md)
- Learn more by building this Web API from scratch with the following series - [Tutorial: Register a web API with the Microsoft identity platform](./web-app-tutorial-01-register-application.md)
Proceed to the next article to learn how to call the protected web API using cURL.

> [!div class="nextstepaction"]
> [How-to: Call an ASP.NET Core web API with cURL](howto-call-a-web-api-with-curl.md)
3 changes: 2 additions & 1 deletion docs/identity/authentication/concept-fido2-compatibility.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: Web browser and native app support for FIDO2 passwordless authentic
ms.service: entra-id
ms.subservice: authentication
ms.topic: conceptual
ms.date: 07/19/2024
ms.date: 09/30/2024

author: justinha
ms.author: justinha
Expand Down Expand Up @@ -48,6 +48,7 @@ The following table lists Microsoft application support for passkey (FIDO2) with
| Application | macOS | iOS | Android |
|----------------|----------|----------|----------|
| [Remote Desktop](/azure/virtual-desktop/compare-remote-desktop-clients) | ✅ | ✅ | ❌ |
| [Windows App](/windows-app/compare-platforms-features) | ✅ | ✅ | ❌ |

### Third-party application support without authentication broker

Expand Down

0 comments on commit 5a22c68

Please sign in to comment.