Skip to content

Commit 280527f

Browse files
authored
Added references to Azure functions samples
Added references to Azure functions token validation examples in dotnet, python and nodejs.
1 parent 89920ff commit 280527f

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,10 @@ The JwtBearer middleware, like the OpenID Connect middleware in web apps, is dir
137137

138138
There can also be special validations. For example, it's possible to validate that signing keys (when embedded in a token) are trusted and that the token isn't being replayed. Finally, some protocols require specific validations.
139139

140+
## Token validation in Azure Functions
141+
142+
It is also possible to validate incoming access tokens in Azure functions. You can find examples of validating tokens in Azure functions in [Dotnet](https://github.com/Azure-Samples/ms-identity-dotnet-webapi-azurefunctions), [NodeJS](https://github.com/Azure-Samples/ms-identity-nodejs-webapi-azurefunctions), or [Python](https://github.com/Azure-Samples/ms-identity-python-webapi-azurefunctions)
143+
140144
### Validators
141145

142146
The validation steps are captured in validators, which are all in the [Microsoft IdentityModel Extensions for .NET](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet) open-source library, in one source file: [Microsoft.IdentityModel.Tokens/Validators.cs](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/blob/master/src/Microsoft.IdentityModel.Tokens/Validators.cs).

0 commit comments

Comments
 (0)