|
1 | 1 | # Set Up Authentication in Azure App Service
|
2 | 2 |
|
| 3 | +This document provides step-by-step instructions to configure Azure App Registrations for a front-end application. |
| 4 | + |
| 5 | +## Prerequisites |
| 6 | + |
| 7 | +- Access to **Microsoft Entra ID** |
| 8 | +- Necessary permissions to create and manage **App Registrations** |
| 9 | + |
3 | 10 | ## Step 1: Add Authentication in Azure App Service configuration
|
4 | 11 |
|
5 | 12 | 1. Click on `Authentication` from left menu.
|
6 | 13 |
|
7 | 14 | 
|
8 | 15 |
|
9 |
| -2. Click on `+ Add Provider` to see a list of identity providers. |
| 16 | +2. Click on `+ Add identity provider` to see a list of identity providers. |
10 | 17 |
|
11 | 18 | 
|
12 | 19 |
|
13 |
| -3. Click on `+ Add Provider` to see a list of identity providers. |
| 20 | +3. Click on `Identity Provider` dropdown to see a list of identity providers. |
14 | 21 |
|
15 | 22 | 
|
16 | 23 |
|
17 |
| -4. Select the first option `Microsoft Entra Id` from the drop-down list. If `Create new app registration` is disabled, go to [Step 1a](#step-1a-creating-a-new-app-registration). |
| 24 | +4. Select the first option `Microsoft Entra Id` from the drop-down list and select `client secret expiration` under App registration. |
| 25 | +> NOTE: If `Create new app registration` is disabled, then go to [Create new app registration](/docs/create_new_app_registration.md) and come back to this step to complete the app authentication. |
18 | 26 |
|
19 | 27 | 
|
20 | 28 |
|
21 | 29 | 5. Accept the default values and click on `Add` button to go back to the previous page with the identify provider added.
|
22 | 30 |
|
23 | 31 | 
|
24 | 32 |
|
25 |
| -### Step 1a: Creating a new App Registration |
26 |
| - |
27 |
| -1. Click on `Home` and select `Microsoft Entra ID`. |
28 |
| - |
29 |
| - |
30 |
| - |
31 |
| -2. Click on `App registrations`. |
32 |
| - |
33 |
| - |
34 |
| - |
35 |
| -3. Click on `+ New registration`. |
36 |
| - |
37 |
| - |
38 |
| - |
39 |
| -4. Provide the `Name`, select supported account types as `Accounts in this organizational directory only(Contoso only - Single tenant)`, select platform as `Web`, enter/select the `URL` and register. |
40 |
| - |
41 |
| - |
42 |
| - |
43 |
| -5. After application is created sucessfully, then click on `Add a Redirect URL`. |
44 |
| - |
45 |
| - |
46 |
| - |
47 |
| -6. Click on `+ Add a platform`. |
48 |
| - |
49 |
| - |
50 |
| - |
51 |
| -7. Click on `Web`. |
52 |
| - |
53 |
| - |
54 |
| - |
55 |
| -8. Enter the `web app URL` (Provide the app service name in place of XXXX) and Save. Then go back to [Step 1](#step-1-add-authentication-in-azure-app-service-configuration) and follow from _Point 4_ choose `Pick an existing app registration in this directory` from the Add an Identity Provider page and provide the newly registered App Name. |
56 |
| -E.g. https://appservicename.azurewebsites.net/.auth/login/aad/callback |
57 |
| - |
58 |
| - |
| 33 | +6. You have successfully added app authentication, and now required to log in to access the application. |
0 commit comments