Skip to content

Commit 3580c3e

Browse files
author
Ryan Wike
committed
tech review updates
1 parent 528d096 commit 3580c3e

File tree

5 files changed

+24
-18
lines changed

5 files changed

+24
-18
lines changed

articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -37,31 +37,31 @@ You need these names throughout this tutorial.
3737

3838
## 3. Configure authentication and authorization
3939

40-
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra ID as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
40+
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
4141

42-
# [Workforce tenant](#tab/workforce-tenant)
42+
# [Workforce configuration](#tab/workforce-configuration)
4343

4444
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
4545

4646
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
4747

4848
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
4949

50-
1. On your app's left menu, select **Authentication**, and then click **Add identity provider**.
50+
1. On your app's left menu, select **Authentication**, and then select **Add identity provider**.
5151

5252
1. In the **Add an identity provider** page, for example select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
5353

54-
1. For **Tenant type**, select **Workforce configuration** for work and school accounts or Microsoft accounts.
54+
1. For **Tenant type**, select **Workforce configuration (current tenant)** for employees and business guests.
5555

56-
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra ID.
56+
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
5757

5858
1. Add a **Name** for the app registration, a public facing display name.
5959

6060
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
6161

6262
1. In the **App Service authentication settings** section, leave **Authentication** set to **Require authentication** and **Unauthenticated requests** set to **HTTP 302 Found redirect: recommended for websites**.
6363

64-
1. At the bottom of the **Add an identity provider** page, click **Add** to enable authentication for your web app.
64+
1. At the bottom of the **Add an identity provider** page, select **Add** to enable authentication for your web app.
6565

6666
:::image type="content" alt-text="Screenshot that shows configuring authentication." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication.png":::
6767

@@ -71,23 +71,23 @@ Now that you have a web app running on App Service, enable authentication and au
7171
> To allow accounts from other tenants, change the 'Issuer URL' to 'https://login.microsoftonline.com/common/v2.0' by editing your 'Identity Provider' from the 'Authentication' blade.
7272
>
7373
74-
# [Customer tenant](#tab/customer-tenant)
74+
# [External configuration](#tab/external-configuration)
7575

7676
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
7777

7878
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
7979

8080
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
8181

82-
1. On your app's left menu, select **Authentication**, and then click **Add identity provider**.
82+
1. On your app's left menu, select **Authentication**, and then select **Add identity provider**.
8383

8484
1. In the **Add an identity provider** page, for example select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
8585

8686
1. For **Tenant type**, select **External configuration** for external users.
8787

8888
1. Select **Create new app registration** to create a new app registration and select the [external tenant](/entra/external-id/customers/quickstart-tenant-setup) you want to use.
8989

90-
1. Click **Configure** to configure external authentication.
90+
1. Select **Configure** to configure external authentication.
9191

9292
:::image type="content" alt-text="Screenshot that shows the Add an identity provider page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external.png":::
9393

@@ -97,13 +97,19 @@ Now that you have a web app running on App Service, enable authentication and au
9797

9898
1. For this quickstart, select **Email and password** which allows new users to sign up and sign in using an email address as the sign-in name and a password as their first factor credential.
9999

100-
1. Click **Create** to create the user flow.
100+
1. Select **Create** to create the user flow.
101101

102-
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/create-new-user-flow.png":::
102+
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-user-flow.png":::
103103

104-
1. Click **Review and Configure** to skip branding.
104+
1. Select **Next** to customize branding.
105105

106-
1. Click **Configure** in the review step to confirm External ID (CIAM) tenant update.
106+
1. Add your company logo, select a background color, and select a sign-in layout.
107+
108+
:::image type="content" alt-text="Screenshot that shows the customize branding tab." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-branding.png":::
109+
110+
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
111+
112+
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
107113

108114
1. The browser opens **Add an identity provider**.
109115

@@ -118,9 +124,9 @@ Now that you have a web app running on App Service, enable authentication and au
118124
- **HTTP 302 Found redirect: recommended for websites** for **Unauthenticated requests**
119125
- **Token store** box
120126

121-
1. At the bottom of the **Add an identity provider** page, click **Add** to enable authentication for your web app.
127+
1. At the bottom of the **Add an identity provider** page, select **Add** to enable authentication for your web app.
122128

123-
:::image type="content" alt-text="Screenshot that shows the Additional checks and authentication settings sections." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external2.png":::
129+
:::image type="content" alt-text="Screenshot that shows the Additional checks and authentication settings sections." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-enable.png":::
124130
---
125131

126132
## 4. Verify limited access to the web app

articles/app-service/includes/tutorial-set-up-app-service-authentication/intro.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,18 @@ In this tutorial, you learn how to:
2222
> [!div class="checklist"]
2323
>
2424
> * Configure authentication for the web app.
25-
> * Limit access to the web app to users in your organization by using Microsoft Entra ID as the identity provider.
25+
> * Limit access to the web app to users in your organization by using Microsoft Entra as the identity provider.
2626
2727
## Automatic authentication provided by App Service
2828

29-
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you are ready for custom authentication and authorization, you build on this architecture.
29+
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you're ready for custom authentication and authorization, you build on this architecture.
3030

3131
App service authentication provides:
3232

3333
* Easily turn on and configure through the Azure portal and app settings.
3434
* No SDKs, specific languages, or changes to application code are required.​
3535
* Several identity providers are supported:
36-
* Microsoft Entra ID
36+
* Microsoft Entra
3737
* Microsoft Account
3838
* Facebook
3939
* Google
105 KB
Loading

0 commit comments

Comments
 (0)