Skip to content

Commit 2442103

Browse files
Merge pull request #288297 from Akhilesh-microsoft/ACA/authentication_openid
[ACA: authentication-openid]: Verified the article, reviewed the content, and fixed all editorial issues. Updated the latest content and ms.date w.r.t freshness pass.
2 parents 0cda281 + 625612f commit 2442103

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/container-apps/authentication-openid.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,33 +5,33 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 04/20/2022
8+
ms.date: 10/14/2024
99
ms.author: cshoe
1010
---
1111

1212
# Enable authentication and authorization in Azure Container Apps with a Custom OpenID Connect provider
1313

14-
This article shows you how to configure Azure Container Apps to use a custom authentication provider that adheres to the [OpenID Connect specification](https://openid.net/connect/). OpenID Connect (OIDC) is an industry standard used by many identity providers (IDPs). You don't need to understand the details of the specification in order to configure your app to use an adherent IDP.
14+
This article shows you how to configure Azure Container Apps to use a custom authentication provider that adheres to the [OpenID Connect specification](https://openid.net/connect/). OpenID Connect (OIDC) is an industry standard widely adopted by many identity providers (IDPs). You don't need to understand the details of the specification in order to configure your app to use an adherent IDP.
1515

1616
You can configure your app to use one or more OIDC providers. Each must be given a unique alphanumeric name in the configuration, and only one can serve as the default redirect target.
1717

1818
## <a name="openid-register"> </a>Register your application with the identity provider
1919

20-
Your provider will require you to register the details of your application with it. One of these steps involves specifying a redirect URI. This redirect URI will be of the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete these steps.
20+
Your provider requires you to register the details of your application with it. One of these steps involves specifying a redirect URI. This redirect URI is of the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete these steps.
2121

2222
> [!NOTE]
2323
> Some providers may require additional steps for their configuration and how to use the values they provide. For example, Apple provides a private key which is not itself used as the OIDC client secret, and you instead must use it craft a JWT which is treated as the secret you provide in your app config (see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens))
2424
>
2525
26-
You'll need to collect a **client ID** and **client secret** for your application.
26+
You need to collect a **client ID** and **client secret** for your application.
2727

2828
> [!IMPORTANT]
29-
> The client secret is an important security credential. Do not share this secret with anyone or distribute it within a client application.
29+
> The client secret is a critical security credential. Do not share this secret with anyone or distribute it within a client application.
3030
>
3131
32-
Additionally, you'll need the OpenID Connect metadata for the provider. This information is often exposed via a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's Issuer URL suffixed with `/.well-known/openid-configuration`. Gather this configuration URL.
32+
Additionally, you need the OpenID Connect metadata for the provider. This information is often exposed via a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's Issuer URL suffixed with `/.well-known/openid-configuration`. Make sure to gather this configuration URL.
3333

34-
If you're unable to use a configuration metadata document, you'll need to gather the following values separately:
34+
If you're unable to use a configuration metadata document, you need to gather the following values separately:
3535

3636
- The issuer URL (sometimes shown as `issuer`)
3737
- The [OAuth 2.0 Authorization endpoint](https://tools.ietf.org/html/rfc6749#section-3.1) (sometimes shown as `authorization_endpoint`)
@@ -52,7 +52,7 @@ If you're unable to use a configuration metadata document, you'll need to gather
5252

5353
1. Provide the earlier collected **Client ID** and **Client Secret** in the appropriate fields.
5454

55-
1. Specify an application setting name for your client secret. Your client secret will be stored as a [secret](manage-secrets.md) in your container app.
55+
1. Specify an application setting name for your client secret. Your client secret is stored as a [secret](manage-secrets.md) in your container app.
5656

5757
1. Press the **Add** button to finish setting up the identity provider.
5858

0 commit comments

Comments
 (0)