You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/custom-extension-get-started.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Get started with custom claims providers (preview)
3
3
titleSuffix: Microsoft identity platform
4
-
description: Learn how to develop and register an Azure Active Directory custom extensions REST API. The custom extension allows you to source claims from a data store that is external to Azure Active Directory.
4
+
description: Learn how to develop and register an Azure Active Directory custom authentication extensions REST API. The custom authentication extension allows you to source claims from a data store that is external to Azure Active Directory.
5
5
services: active-directory
6
6
author: yoelhor
7
7
manager: CelesteDG
@@ -58,7 +58,7 @@ In this step, you create an HTTP trigger function API in the Azure portal. The f
58
58
59
59
### 1.1 Create an HTTP trigger function
60
60
61
-
After the Azure Function app is created, create an HTTP trigger function. The HTTP trigger lets you invoke a function with an HTTP request. This HTTP trigger will be referenced and called by your Azure AD custom extension.
61
+
After the Azure Function app is created, create an HTTP trigger function. The HTTP trigger lets you invoke a function with an HTTP request. This HTTP trigger will be referenced and called by your Azure AD custom authentication extension.
62
62
63
63
1. Within your **Function App**, from the menu select **Functions**.
64
64
1. From the top menu, select **+ Create**.
@@ -151,9 +151,9 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
1. Signintothe [MicrosoftGraphExplorer](https://aka.ms/ge) using an account whose home tenant is the tenant you wish to manage your custom extension in.
194
+
1. Signintothe [MicrosoftGraphExplorer](https://aka.ms/ge) using an account whose home tenant is the tenant you wish to manage your custom authentication extension in.
@@ -304,17 +304,17 @@ Record the ID value of the created custom claims provider object. The ID is need
304
304
305
305
### 2.2 Grant admin consent
306
306
307
-
Afteryourcustomextensioniscreated, you'll be taken to the **Overview** tab of the new custom extension.
307
+
Afteryourcustomauthenticationextensioniscreated, you'll be taken to the **Overview** tab of the new custom authentication extension.
308
308
309
-
Fromthe**Overview**page, selectthe**Grantpermission**buttontogiveadminconsenttotheregisteredapp, whichallowsthecustomextensiontoauthenticatetoyourAPI. Thecustomextensionuses `client_credentials` toauthenticatetotheAzureFunctionAppusingthe `ReceivecustomauthenticationextensionHTTPrequests` permission.
309
+
Fromthe**Overview**page, selectthe**Grantpermission**buttontogiveadminconsenttotheregisteredapp, whichallowsthecustomauthenticationextensiontoauthenticatetoyourAPI. Thecustomauthenticationextensionuses `client_credentials` toauthenticatetotheAzureFunctionAppusingthe `ReceivecustomauthenticationextensionHTTPrequests` permission.
310
310
311
311
Thefollowingscreenshotshowshowtograntpermissions.
312
312
313
313
:::imagetype="content"border="false"source="./media/custom-extension-get-started/custom-extensions-overview.png"alt-text="Screenshot that shows how grant admin consent."lightbox="media/custom-extension-get-started/custom-extensions-overview.png":::
314
314
315
315
## Step 3. Configure an OpenID Connect app to receive enriched tokens
316
316
317
-
Togetatokenandtestthecustomextension, youcanusethe<https://jwt.ms> app. It's a Microsoft-owned web application that displays the decoded contents of a token (the contents of the token never leave your browser).
317
+
Togetatokenandtestthecustomauthenticationextension, youcanusethe<https://jwt.ms> app. It's a Microsoft-owned web application that displays the decoded contents of a token (the contents of the token never leave your browser).
1. Signintothe [MicrosoftGraphExplorer](https://aka.ms/ge) using an account whose home tenant is the tenant you wish to manage your custom extension in.
407
+
1. Signintothe [MicrosoftGraphExplorer](https://aka.ms/ge) using an account whose home tenant is the tenant you wish to manage your custom authentication extension in.
0 commit comments