Skip to content

Commit 053d6d4

Browse files
committed
minor fixes
1 parent eda0f1e commit 053d6d4

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You can configure App Service authentication to use an existing app registration
5252
- You want to use an app registration from a different Azure AD tenant than the one your app is in.
5353
- The option to create a new registration is not available for government clouds.
5454

55-
### <a name="register"> </a>Step 1: Create an app registration in Azure AD for your App Service app
55+
#### <a name="register"> </a>Step 1: Create an app registration in Azure AD for your App Service app
5656

5757
During creation of the app registration, collect the following information which you will need later when you configure the authentication in the App Service app:
5858

@@ -88,7 +88,7 @@ To register the app, perform the following steps:
8888
1. In the **Value** field, copy the client secret value. It won't be shown again once you navigate away from this page.
8989
1. (Optional) To add multiple **Reply URLs**, select **Authentication**.
9090

91-
### <a name="secrets"> </a>Enable Azure Active Directory in your App Service app
91+
#### <a name="secrets"> </a>Step 2: Enable Azure Active Directory in your App Service app
9292

9393
1. Sign in to the [Azure portal] and navigate to your app.
9494
1. From the left navigation, select **Authentication** > **Add identity provider** > **Microsoft**.
@@ -113,7 +113,7 @@ To register the app, perform the following steps:
113113

114114
You're now ready to use the Microsoft identity platform for authentication in your app. The provider will be listed on the **Authentication** screen. From there, you can edit or delete this provider configuration.
115115

116-
## Add authorization policy
116+
## Add customized authorization policy
117117

118118
The created app registration authenticates incoming requests for your Azure AD tenant. By default, it also lets anyone within the tenant to access the application, which is fine for many applications. However, some applications need to restrict access further by making authorization decisions. Your application code is often the best place to handle custom authorization logic. However, for common scenarios, the Microsoft identity platform provides built-in checks that you can use to limit access.
119119

0 commit comments

Comments
 (0)