You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/register-public-azure-ad-client-app.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,8 @@ In this article, you'll learn how to register a public application in Azure Acti
16
16
17
17
Client application registrations are Azure Active Directory representations of applications that can authenticate and ask for API permissions on behalf of a user. Public clients are applications such as mobile applications and single page JavaScript applications that can't keep secrets confidential. The procedure is similar to [registering a confidential client](register-confidential-azure-ad-client-app.md), but since public clients can't be trusted to hold an application secret, there's no need to add one.
18
18
19
+
The quickstart provides general information about how to [register an application with the Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/quickstart-register-app).
20
+
19
21
## App registrations in Azure portal
20
22
21
23
1. In the [Azure portal](https://portal.azure.com), on the left navigation panel, click **Azure Active Directory**.
@@ -34,6 +36,18 @@ Client application registrations are Azure Active Directory representations of a
34
36
35
37

36
38
39
+
40
+
To configure your [desktop](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration), [mobile](https://docs.microsoft.com/azure/active-directory/develop/scenario-mobile-app-registration) or [single-page](https://docs.microsoft.com/azure/active-directory/develop/scenario-spa-app-registration) application as public application:
41
+
42
+
1. In the [Azure portal](https://portal.azure.com), in **App registrations**, select your app, and then select **Authentication**.
43
+
44
+
2. Select **Advanced settings** > **Default client type**. For **Treat application as a public client**, select **Yes**.
45
+
46
+
3. For a single-page application, select **Access tokens** and **ID tokens** to enable implicit flow.
47
+
48
+
- If your application signs in users, select **ID tokens**.
49
+
- If your application also needs to call a protected web API, select **Access tokens**.
50
+
37
51
## API permissions
38
52
39
53
Similarly to the [confidential client application](register-confidential-azure-ad-client-app.md), you'll need to select which API permissions this application should be able to request on behalf of users:
0 commit comments