Skip to content

Commit 8e2b1af

Browse files
authored
Move deployment section to a separate file and combining deployment g… (#157)
* Move deployment section to a separate file and combining deployment guide from https://github.com/microsoft/Multi-Agent-Custom-Automation-Engine-Solution-Accelerator * update * resolved comments and update resource section
1 parent a9743e7 commit 8e2b1af

18 files changed

+397
-270
lines changed

README.md

Lines changed: 12 additions & 270 deletions
Large diffs are not rendered by default.
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
# Set Up Authentication in Azure App Service
2+
3+
This document provides step-by-step instructions to configure Azure App Registrations for a front-end application.
4+
5+
## Prerequisites
6+
7+
- Access to **Microsoft Entra ID**
8+
- Necessary permissions to create and manage **App Registrations**
9+
10+
## Step 1: Add Authentication in Azure App Service configuration
11+
12+
1. Click on `Authentication` from left menu.
13+
14+
![Authentication](./images/azure-app-service-auth-setup/AppAuthentication.png)
15+
16+
2. Click on `+ Add identity provider` to see a list of identity providers.
17+
18+
![Authentication Identity](./images/azure-app-service-auth-setup/AppAuthenticationIdentity.png)
19+
20+
3. Click on `Identity Provider` dropdown to see a list of identity providers.
21+
22+
![Add Provider](./images/azure-app-service-auth-setup/AppAuthIdentityProvider.png)
23+
24+
4. Select the first option `Microsoft Entra Id` from the drop-down list and select `client secret expiration` under App registration.
25+
> NOTE: If `Create new app registration` is disabled, then go to [Create new app registration](create_new_app_registration.md) and come back to this step to complete the app authentication.
26+
27+
![Add Provider](./images/azure-app-service-auth-setup/AppAuthIdentityProviderAdd.png)
28+
29+
5. Accept the default values and click on `Add` button to go back to the previous page with the idenity provider added.
30+
31+
![Add Provider](./images/azure-app-service-auth-setup/AppAuthIdentityProviderAdded.png)
32+
33+
6. You have successfully added app authentication, and now required to log in to access the application.

docs/azure_account_setup.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
## Azure account setup
2+
3+
1. Sign up for a [free Azure account](https://azure.microsoft.com/free/) and create an Azure Subscription.
4+
2. Check that you have the necessary permissions:
5+
* Your Azure account must have `Microsoft.Authorization/roleAssignments/write` permissions, such as [Role Based Access Control Administrator](https://learn.microsoft.com/azure/role-based-access-control/built-in-roles#role-based-access-control-administrator-preview), [User Access Administrator](https://learn.microsoft.com/azure/role-based-access-control/built-in-roles#user-access-administrator), or [Owner](https://learn.microsoft.com/azure/role-based-access-control/built-in-roles#owner).
6+
* Your Azure account also needs `Microsoft.Resources/deployments/write` permissions on the subscription level.
7+
8+
You can view the permissions for your account and subscription by following the steps below:
9+
- Navigate to the [Azure Portal](https://portal.azure.com/) and click on `Subscriptions` under 'Navigation'
10+
- Select the subscription you are using for this accelerator from the list.
11+
- If cannot find the subscription, make sure no filters are selected.
12+
- Select `Access control (IAM)` and you can see the roles that are assigned to your account for this subscription.
13+
- If you want to see more information about the roles, you can go to the `Role assignments`
14+
tab and search by your account name and then click the role you want to view more information about.
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Creating a new App Registration
2+
3+
1. Click on `Home` and select `Microsoft Entra ID`.
4+
5+
![Microsoft Entra ID](images/azure-app-service-auth-setup/MicrosoftEntraID.png)
6+
7+
2. Click on `App registrations`.
8+
9+
![App registrations](images/azure-app-service-auth-setup/Appregistrations.png)
10+
11+
3. Click on `+ New registration`.
12+
13+
![New Registrations](images/azure-app-service-auth-setup/NewRegistration.png)
14+
15+
4. Provide the `Name`, select supported account types as `Accounts in this organizational directory only(Contoso only - Single tenant)`, select platform as `Web`, enter/select the `URL` and register.
16+
17+
![Add Details](images/azure-app-service-auth-setup/AddDetails.png)
18+
19+
5. After application is created successfully, then click on `Add a Redirect URL`.
20+
21+
![Redirect URL](images/azure-app-service-auth-setup/AddRedirectURL.png)
22+
23+
6. Click on `+ Add a platform`.
24+
25+
![+ Add platform](images/azure-app-service-auth-setup/AddPlatform.png)
26+
27+
7. Click on `Web`.
28+
29+
![Web](images/azure-app-service-auth-setup/Web.png)
30+
31+
8. Enter the `web app URL` (Provide the app service name in place of XXXX) and Save. Then go back to [Set Up Authentication in Azure App Service](azure_app_service_auth_setup.md) Step 1 page and follow from _Point 4_ choose `Pick an existing app registration in this directory` from the Add an Identity Provider page and provide the newly registered App Name.
32+
33+
E.g. <<https://<< appservicename >>.azurewebsites.net/.auth/login/aad/callback>>
34+
35+
![Add Details](images/azure-app-service-auth-setup/WebAppURL.png)

0 commit comments

Comments
 (0)