You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"clientId": self.client_app_id, # Client app id used for login
87
-
"authority": self.authority, # Directory to use for login https://learn.microsoft.com/azure/active-directory/develop/msal-client-application-configuration#authority
87
+
"authority": self.authority, # Directory to use for login https://learn.microsoft.com/entra/identity-platform/msal-client-application-configuration#authority
88
88
"redirectUri": "/redirect", # Points to window.location.origin. You must register this URI on Azure Portal/App Registration.
89
89
"postLogoutRedirectUri": "/", # Indicates the page to navigate after logout.
90
90
"navigateToLoginRequestUrl": False, # If "true", will navigate back to the original request location before processing the auth code response.
Copy file name to clipboardExpand all lines: app/frontend/src/authConfig.ts
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ interface AuthSetup {
27
27
msalConfig: {
28
28
auth: {
29
29
clientId: string;// Client app id used for login
30
-
authority: string;// Directory to use for login https://learn.microsoft.com/azure/active-directory/develop/msal-client-application-configuration#authority
30
+
authority: string;// Directory to use for login https://learn.microsoft.com/entra/identity-platform/msal-client-application-configuration#authority
31
31
redirectUri: string;// Points to window.location.origin. You must register this URI on Azure Portal/App Registration.
32
32
postLogoutRedirectUri: string;// Indicates the page to navigate after logout.
33
33
navigateToLoginRequestUrl: boolean;// If "true", will navigate back to the original request location before processing the auth code response.
@@ -42,7 +42,7 @@ interface AuthSetup {
42
42
* Scopes you add here will be prompted for user consent during sign-in.
43
43
* By default, MSAL.js will add OIDC scopes (openid, profile, email) to any login request.
Copy file name to clipboardExpand all lines: docs/deploy_features.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ By default, the deployed Azure web app will have no authentication or access res
123
123
124
124
Alternatively, you can manually require authentication to your Azure Active Directory by following the [Add app authentication](https://learn.microsoft.com/azure/app-service/scenario-secure-app-authentication-app-service) tutorial and set it up against the deployed web app.
125
125
126
-
To then limit access to a specific set of users or groups, you can follow the steps from [Restrict your Azure AD app to a set of users](https://learn.microsoft.com/azure/active-directory/develop/howto-restrict-your-app-to-a-set-of-users) by changing "Assignment Required?" option under the Enterprise Application, and then assigning users/groups access. Users not granted explicit access will receive the error message -AADSTS50105: Your administrator has configured the application <app_name> to block users unless they are specifically granted ('assigned') access to the application.-
126
+
To then limit access to a specific set of users or groups, you can follow the steps from [Restrict your Microsoft Entra app to a set of users](https://learn.microsoft.com/entra/identity-platform/howto-restrict-your-app-to-a-set-of-users) by changing "Assignment Required?" option under the Enterprise Application, and then assigning users/groups access. Users not granted explicit access will receive the error message -AADSTS50105: Your administrator has configured the application <app_name> to block users unless they are specifically granted ('assigned') access to the application.-
127
127
128
128
## Enabling login and document level access control
0 commit comments