Skip to content

Commit 4647ca9

Browse files
authored
Merge pull request #110124 from SnehaAgrawal-MSFT/patch-14
(AzureCXP)MicrosoftDocs/azure-docs/issues/51420
2 parents 8129e55 + 221c1d2 commit 4647ca9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Perform the following steps:
7373
1. After the app registration is created, copy the **Application (client) ID** and the **Directory (tenant) ID** for later.
7474
1. Select **Authentication**. Under **Implicit grant**, enable **ID tokens** to allow OpenID Connect user sign-ins from App Service.
7575
1. (Optional) Select **Branding**. In **Home page URL**, enter the URL of your App Service app and select **Save**.
76-
1. Select **Expose an API** > **Set**. Paste in the URL of your App Service app and select **Save**.
76+
1. Select **Expose an API** > **Set**. For single-tenant app, paste in the URL of your App Service app and select **Save** and for multi-tenant app, paste in the URL which is based on one of tenant verified domains and then select **Save**.
7777

7878
> [!NOTE]
7979
> This value is the **Application ID URI** of the app registration. If your web app requires access to an API in the cloud, you need the **Application ID URI** of the web app when you configure the cloud App Service resource. You can use this, for example, if you want the cloud service to explicitly grant access to the web app.

0 commit comments

Comments
 (0)