You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-aad.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ You can configure App Service authentication to use an existing app registration
52
52
- You want to use an app registration from a different Azure AD tenant than the one your app is in.
53
53
- The option to create a new registration is not available for government clouds.
54
54
55
-
### <aname="register"> </a>Step 1: Create an app registration in Azure AD for your App Service app
55
+
####<aname="register"> </a>Step 1: Create an app registration in Azure AD for your App Service app
56
56
57
57
During creation of the app registration, collect the following information which you will need later when you configure the authentication in the App Service app:
58
58
@@ -88,7 +88,7 @@ To register the app, perform the following steps:
88
88
1. In the **Value** field, copy the client secret value. It won't be shown again once you navigate away from this page.
89
89
1. (Optional) To add multiple **Reply URLs**, select **Authentication**.
90
90
91
-
### <aname="secrets"> </a>Enable Azure Active Directory in your App Service app
91
+
####<aname="secrets"> </a>Step 2: Enable Azure Active Directory in your App Service app
92
92
93
93
1. Sign in to the [Azure portal] and navigate to your app.
94
94
1. From the left navigation, select **Authentication** > **Add identity provider** > **Microsoft**.
@@ -113,7 +113,7 @@ To register the app, perform the following steps:
113
113
114
114
You're now ready to use the Microsoft identity platform for authentication in your app. The provider will be listed on the **Authentication** screen. From there, you can edit or delete this provider configuration.
115
115
116
-
## Add authorization policy
116
+
## Add customized authorization policy
117
117
118
118
The created app registration authenticates incoming requests for your Azure AD tenant. By default, it also lets anyone within the tenant to access the application, which is fine for many applications. However, some applications need to restrict access further by making authorization decisions. Your application code is often the best place to handle custom authorization logic. However, for common scenarios, the Microsoft identity platform provides built-in checks that you can use to limit access.
0 commit comments