►
Description
In this video Paolo Pialorsi (PiaSys.com) is demonstrating how to securely call Azure AD secured WebAPI from your SharePoint Framework solution by using provided automation. This model provides you flexibility to surface any business data in the SharePoint Online or to provide input from the SharePoint Online or Microsoft Teams towards your systems.
Presenter - Paolo Pialorsi (PiaSys.com) @paolopia
See more details on securely calling Azure AD secured APIs from the official SharePoint documentation - https://docs.microsoft.com/en-us/sharepoint/dev/spfx/use-aadhttpclient
More details on the SharePoint developer community from http://aka.ms/sppnp.
A
You
want
me
wanted
by
my
name:
is
paolo
calor,
yes,
networks,
mr
consultant
of
assisi,
dot.com
in
this
video
google
talk
about
calling
custom
web
price
from
share
point
framework,
specific
melts
them
demo.
Ove
nation
function
for
change,
used,
invoke
bayern
poi
framework
lines
to
the
web,
but
this
is
the
functional
kong
closed.
A
Here
we
are
back
line
web
part
guide,
symbol,
col
de
joux
function.
Button
here
is
that
in
click
the
we
will
give
you
back
di
list
of
customs
define
in
ten
belly.
Together,
we
di
identity,
the
calling
user
gualazzi
audiweb
ports
exemplarily.
So
we
have
power
play
with
the
e
di
security
al
web
art
bc.
Severe
common
baseline
follows
power,
sharp
ring
framework,
a
wave
indie,
all
enit
method
of
what
we
use
of
you
and
texts.
A
Types
klein
factory
object,
o
bale
hubble
on
di
context
of
spring
framework,
northug
eden
in
strass,
o
back
client
for
consume
in
tep
ai,
based
on
this
specific
in
rai,
decided
di
junichi,
ue,
rai,
o
di
app
register
in
national
director,
and
that
I
want
consume
from
share
with
di
framework
raidue.
In
that
you
get
back.
Henin
stan
sovena
object
of
type
piedi,
esistiti,
p
client.
You
can
use
to
consumer
dei.
A
Target
price
wants
ed
in
di
sample
web
pards,
providing
ob
gek
to
die
properties
o
di
via
component
by
hughes,
render
by
wight
ending
by.
We
are
component
ai,
simply
randall.
My
word
part
providing
col
age
of
function,
javascript
function
di
alcool
to
my
target
price,
su
bases,
che
le
indies
function,
ai,
simply,
giusti
e
di
e
steve
klein
object,
dell'aiget,
fronti,
blind
port
and
ai
giusti
che
method,
piece
of
__
]
and
provide
not
only
the
year
but
also
defacement,
post
vesti
methods
for
the
target
binary
ai
provider.
A
You
are
all
audi
tagger
function,
il
pool
b,
already
state
configuration
property
of
my
world
part
audi
station
human
e
di
resiti,
p
klein
configuration
and
he
will
provide
e
request
options.
Object.
Di
social
will
be
made
by
eset
settings,
including
mai
scenario.
E
set
of
custom
existed
headers
spb
one
a
year,
the
crane
that
we
asset
in
application;
jason
response
software,
basic
alintec,
layering,
sulle,
toghe
de
pia
e
del
sud,
che
beck
e
jason
risposi
vai.
Making
this
that
reconstructed,
ea
di
outcomes
of
client
object,
il
get
back
e,
nei,
stripy,
clank
response.
A
We
can
be
seen
e
se
ci
sono
jazz
band
baidu,
in
that
we
can
have
access
to
die
claims
describing
di
current
user
identity
islands
of
collecti
on
of
customs,
that
we
get
back
from
dep
to
the
speeches
of
render
method.
Here
always
the
render
of
customers.
Inedite
list
is
smooth
of
identity,
o
the
user,
trudi
macy's
of
clearing
of
userid
of
lupi
and
gold
award,
prime
them
to
do
that.
We
also
dei
to
declare
indie
settings
power,
blind
side
solutions,
power,
sharp
infamous
solutions
from.
A
A
Instead,
network
readers,
ai
by
user
andres,
coni
people
shaun
permission
de
claire,
which
is
the
formation
that
will
be
required
to
pin
gable
swing
folk
to
use.
It
is
up
rese
back
end
and
pvc
again
exactly
what
ride
and
claire
in
di
pec
solutions
file
in
un
crime
being
able
to
use
mai
target
pia
and
drum
machine,
and
then
the
framework
solutions,
wall,
hover,
ai
knicks
and
cure
by
age
of
function,
dead
aid
and
find
writing
using
and
certi
directory
end.
A
The
virgins
and
isaac
lea
gue
that
a
registration,
the
rise
of
new
york,
that,
if
you
go
to
die,
function
up
e
nation,
new
kangoo,
andar
di
autentiche,
shaun
configuration
and
here
with
our
function,
configure
for
use
in
autentiche,
shaun,
spessidirect
hughes
di
x
factor,
authentication,
Amicis
configure
like
we
can
see
by
clicking
on
this
item.
We
can
see
that
we
are
client,
ai
di
peaches,
exactly
the
climb,
heidi
o
di
application
register.
A
Together
we
die
schnuren
which
will
identify
e
c'era,
chi,
drake,
trifora
work
market
and,
of
course,
william
klein
si
suicide
di
in
this
video
are.
We
are
di
audience
for
war
and
peace.
Witches
pressed
by
unique
juraj
identifier
hour
application,
fine
art
director
on
one
side
on
di
sharepoint
framework
said
we
de
claire
di
permission
by
twinair
way
creates
en
instance,
hordijk
light
jet
providing
by
yuri
cure
aiab
target
function
north
and
target
a.
A
Why
go
down
how
much
consume
e
lewis
in
peius
of
and
of
etp,
maybe
torger
to
put
them
quest
o
of
age
of
function.
Side
cui
re
gista
by
acer
function
for
page
to
close
these
authentic
shaun
and
authors
session,
almost
ad
andretta
wii
package
and
solutions
widow
by
cal,
pando
el
ghad,
because
solutions
we
will
get
back
and
nesti
p.chigi
file.
Think
by
doing
to
di
app
catalog
of
our
tenan
since
simp
il
plug
and
drogue
di
tespi
che
di
file,
o
power
solutions
and
by
shopping
file
in
di
app
catalog.
A
We
will
be
prompt.
We
did
you
wait
to
deploy
dissolution
onto
the
target
tenant
and
I
will
be
able
to
site
di
application.
Is
requited
and
specific
set
of
permissions.
Mc
kinsey
right
here
of
wight
joints
ploy
of
guests.
That
gip
is
that,
john
to
my
target
and
nantes
aichen
possible
e
mail
of
solution.
You
can't
from
baseball
and
vitis
configure,
so
why
solutions,
jason
fire
and
we
can't
say
that
this
application
requires
the
following
permissions
to
peer
reviewed,
va
in
administrator
for
di
spf
ex
novo
function.
A
United
usea
spend
people
shaun
permission
cisda
one
eye
the
cloud,
so
why
only
exiting
jason,
f,
ile
juan
fernandez
in
the
senate
ben
hicker
go
to
be
a
dream
portal
sharepoint
online
at
the
eyewear
guide,
open
and
new
tab
will
go
to
by
admin,
bring
never
sharepoint
online
man
ed
under
ok,
gori,
android
and
more
management
section
in
by
advanced
group
section
weekend:
isili.
Yes,
ok
that
will
face.
A
We
can
easily
silea
cui
averli,
stop
pending
approvals,
now
hotel
in
fabric
plut
permissions
ed
il
week
and
find
we
will
be
able
to
fail
sooner
or
later
di
per
mission
for
our
eyes.
Pf
ex
line
of
business
function
for
user
name
people
shaun
wickens,
like
this
item
at
the
weekend,
approved
porvi
gect
di
permission,
request,
baidu,
wind,
ed,
elena
ben
due
brand
del
pro
mission
to
our
sharepoint
primor
solutions
and
action
to
the
home
shopping
framework.