You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md
+21-15Lines changed: 21 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,31 +37,31 @@ You need these names throughout this tutorial.
37
37
38
38
## 3. Configure authentication and authorization
39
39
40
-
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra ID as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
40
+
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
45
45
46
46
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
47
47
48
48
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
49
49
50
-
1. On your app's left menu, select **Authentication**, and then click**Add identity provider**.
50
+
1. On your app's left menu, select **Authentication**, and then select**Add identity provider**.
51
51
52
52
1. In the **Add an identity provider** page, for example select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
53
53
54
-
1. For **Tenant type**, select **Workforce configuration** for work and school accounts or Microsoft accounts.
54
+
1. For **Tenant type**, select **Workforce configuration (current tenant)** for employees and business guests.
55
55
56
-
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra ID.
56
+
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
57
57
58
58
1. Add a **Name** for the app registration, a public facing display name.
59
59
60
60
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
61
61
62
62
1. In the **App Service authentication settings** section, leave **Authentication** set to **Require authentication** and **Unauthenticated requests** set to **HTTP 302 Found redirect: recommended for websites**.
63
63
64
-
1. At the bottom of the **Add an identity provider** page, click**Add** to enable authentication for your web app.
64
+
1. At the bottom of the **Add an identity provider** page, select**Add** to enable authentication for your web app.
65
65
66
66
:::image type="content" alt-text="Screenshot that shows configuring authentication." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication.png":::
67
67
@@ -71,23 +71,23 @@ Now that you have a web app running on App Service, enable authentication and au
71
71
> To allow accounts from other tenants, change the 'Issuer URL' to 'https://login.microsoftonline.com/common/v2.0' by editing your 'Identity Provider' from the 'Authentication' blade.
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
77
77
78
78
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
79
79
80
80
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
81
81
82
-
1. On your app's left menu, select **Authentication**, and then click**Add identity provider**.
82
+
1. On your app's left menu, select **Authentication**, and then select**Add identity provider**.
83
83
84
84
1. In the **Add an identity provider** page, for example select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
85
85
86
86
1. For **Tenant type**, select **External configuration** for external users.
87
87
88
88
1. Select **Create new app registration** to create a new app registration and select the [external tenant](/entra/external-id/customers/quickstart-tenant-setup) you want to use.
89
89
90
-
1.Click**Configure** to configure external authentication.
90
+
1.Select**Configure** to configure external authentication.
91
91
92
92
:::image type="content" alt-text="Screenshot that shows the Add an identity provider page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external.png":::
93
93
@@ -97,13 +97,19 @@ Now that you have a web app running on App Service, enable authentication and au
97
97
98
98
1. For this quickstart, select **Email and password** which allows new users to sign up and sign in using an email address as the sign-in name and a password as their first factor credential.
99
99
100
-
1.Click**Create** to create the user flow.
100
+
1.Select**Create** to create the user flow.
101
101
102
-
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/create-new-user-flow.png":::
102
+
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-user-flow.png":::
103
103
104
-
1.Click**Review and Configure** to skip branding.
104
+
1.Select**Next** to customize branding.
105
105
106
-
1. Click **Configure** in the review step to confirm External ID (CIAM) tenant update.
106
+
1. Add your company logo, select a background color, and select a sign-in layout.
107
+
108
+
:::image type="content" alt-text="Screenshot that shows the customize branding tab." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-branding.png":::
109
+
110
+
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
111
+
112
+
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
107
113
108
114
1. The browser opens **Add an identity provider**.
109
115
@@ -118,9 +124,9 @@ Now that you have a web app running on App Service, enable authentication and au
118
124
-**HTTP 302 Found redirect: recommended for websites** for **Unauthenticated requests**
119
125
-**Token store** box
120
126
121
-
1. At the bottom of the **Add an identity provider** page, click**Add** to enable authentication for your web app.
127
+
1. At the bottom of the **Add an identity provider** page, select**Add** to enable authentication for your web app.
122
128
123
-
:::image type="content" alt-text="Screenshot that shows the Additional checks and authentication settings sections." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external2.png":::
129
+
:::image type="content" alt-text="Screenshot that shows the Additional checks and authentication settings sections." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-enable.png":::
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/intro.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,18 +22,18 @@ In this tutorial, you learn how to:
22
22
> [!div class="checklist"]
23
23
>
24
24
> * Configure authentication for the web app.
25
-
> * Limit access to the web app to users in your organization by using Microsoft Entra ID as the identity provider.
25
+
> * Limit access to the web app to users in your organization by using Microsoft Entra as the identity provider.
26
26
27
27
## Automatic authentication provided by App Service
28
28
29
-
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you are ready for custom authentication and authorization, you build on this architecture.
29
+
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you're ready for custom authentication and authorization, you build on this architecture.
30
30
31
31
App service authentication provides:
32
32
33
33
* Easily turn on and configure through the Azure portal and app settings.
34
34
* No SDKs, specific languages, or changes to application code are required.
0 commit comments