Skip to content

Commit 36ef017

Browse files
authored
fix indentation
1 parent 0d3b89a commit 36ef017

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/api-management/api-management-howto-aad.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -49,10 +49,10 @@ This article shows you how to enable access to the developer portal for users fr
4949
12. Under **Manage**, select **App registrations**.
5050
13. Select **New registration**. On the **Register an application** page, set the values as follows:
5151

52-
* Set **Name** to a meaningful name. e.g., *developer-portal*
53-
* Set **Supported account types** to **Accounts in this organizational directory only**.
54-
* Set **Redirect URI** to the value you got from step 9.
55-
* Choose **Register**.
52+
* Set **Name** to a meaningful name. e.g., *developer-portal*
53+
* Set **Supported account types** to **Accounts in this organizational directory only**.
54+
* Set **Redirect URI** to the value you got from step 9.
55+
* Choose **Register**.
5656

5757
14. After the application is registered, copy the **Application (client) ID** from the **Overview** page.
5858
15. Go back to your API Management instance. In the **Add identity provider** window, paste the **Application (client) ID** value into the **Client ID** box.
@@ -67,11 +67,11 @@ This article shows you how to enable access to the developer portal for users fr
6767
6868
19. The **Add identity provider** window also contains the **Allowed Tenants** text box. There, specify the domains of the Azure AD instances to which you want to grant access to the APIs of the API Management service instance. You can separate multiple domains with newlines, spaces, or commas.
6969

70-
> [!NOTE]
71-
> You can specify multiple domains in the **Allowed Tenants** section. Before any user can sign in from a different domain than the original domain where the application was registered, a global administrator of the different domain must grant permission for the application to access directory data. To grant permission, the global administrator should:
72-
> a. Go to `https://<URL of your developer portal>/aadadminconsent` (for example, https://contoso.portal.azure-api.net/aadadminconsent).
73-
> b. Type in the domain name of the Azure AD tenant that they want to give access to.
74-
> c. Select **Submit**.
70+
> [!NOTE]
71+
> You can specify multiple domains in the **Allowed Tenants** section. Before any user can sign in from a different domain than the original domain where the application was registered, a global administrator of the different domain must grant permission for the application to access directory data. To grant permission, the global administrator should:
72+
> a. Go to `https://<URL of your developer portal>/aadadminconsent` (for example, https://contoso.portal.azure-api.net/aadadminconsent).
73+
> b. Type in the domain name of the Azure AD tenant that they want to give access to.
74+
> c. Select **Submit**.
7575
7676
20. After you specify the desired configuration, select **Add**.
7777

@@ -92,7 +92,7 @@ Now you can add external Azure AD groups from the **Groups** tab of your API Man
9292

9393
1. Select the **Groups** tab.
9494
2. Select the **Add AAD group** button.
95-
!["Add AAD group" button](./media/api-management-howto-aad/api-management-with-aad008.png)
95+
!["Add AAD group" button](./media/api-management-howto-aad/api-management-with-aad008.png)
9696
3. Select the group that you want to add.
9797
4. Press the **Select** button.
9898

0 commit comments

Comments
 (0)