@@ -127,7 +127,7 @@ If your web app or API app is already deployed, you can turn on authentication a
127
127
128
128
1 . For ** App registration type** , select ** Create new app registration** .
129
129
130
- 1 . For ** Name*** , provide a name for your application identity.
130
+ 1 . For ** Name** , provide a name for your application identity.
131
131
132
132
1 . For ** Supported account types** , select the account types appropriate for your scenario.
133
133
@@ -220,7 +220,6 @@ The previous template already has this authorization section set up, but if you
220
220
| ` clientId ` | Yes | The GUID for the client requesting access, which is the client ID from the application identity for your logic app |
221
221
| ` secret ` | Yes | The secret or password from the application identity for the client that's requesting the access token |
222
222
| ` type ` | Yes | The authentication type. For ActiveDirectoryOAuth authentication, the value is ` ActiveDirectoryOAuth ` . |
223
- ||||
224
223
225
224
For example:
226
225
@@ -269,7 +268,6 @@ In the **Authorization** section, include the following properties:
269
268
| ` type ` | Yes | The authentication type. For TLS/SSL client certificates, the value must be ` ClientCertificate ` . |
270
269
| ` password ` | No | The password for accessing the client certificate (PFX file) |
271
270
| ` pfx ` | Yes | The base64-encoded contents of the client certificate (PFX file) |
272
- ||||
273
271
274
272
<a name =" basic " ></a >
275
273
@@ -292,7 +290,6 @@ In the **Authorization** section, include the following properties:
292
290
| ` type ` | Yes | The authentication type that you want to use. For basic authentication, the value must be ` Basic ` . |
293
291
| ` username ` | Yes | The username that you want to use for authentication |
294
292
| ` password ` | Yes | The password that you want to use for authentication |
295
- ||||
296
293
297
294
<a name =" azure-ad-code " ></a >
298
295
0 commit comments