You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -34,7 +34,7 @@ From your client code (such as a mobile app or in-browser JavaScript), send an H
34
34
35
35
## Refresh auth tokens
36
36
37
-
When your provider's access token (not the [session token](#extend-session-token-expiration-grace-period)) expires, you need to reauthenticate the user before you use that token again. You can avoid token expiration by making a `GET` call to the `/.auth/refresh` endpoint of your application. When called, App Service automatically refreshes the access tokens in the [token store](overview-authentication-authorization.md#token-store) for the authenticated user. Subsequent requests for tokens by your app code get the refreshed tokens. However, for token refresh to work, the token store must contain [refresh tokens](https://auth0.com/learn/refresh-tokens/) for your provider. The way to get refresh tokens are documented by each provider, but the following list is a brief summary:
37
+
When your provider's access token (not the [session token](#extend-session-token-expiration-grace-period)) expires, you need to reauthenticate the user before you use that token again. You can avoid token expiration by making a `GET` call to the `/.auth/refresh` endpoint of your application. When called, App Service automatically refreshes the access tokens in the [token store](overview-authentication-authorization.md#token-store) for the authenticated user. Subsequent requests for tokens by your app code get the refreshed tokens. However, for token refresh to work, the token store must contain [refresh tokens](/entra/identity-platform/refresh-tokens) for your provider. The way to get refresh tokens are documented by each provider, but the following list is a brief summary:
38
38
39
39
-**Google**: Append an `access_type=offline` query string parameter to your `/.auth/login/google` API call. For more information, see [Google Refresh Tokens](https://developers.google.com/identity/protocols/OpenIDConnect#refresh-tokens).
40
40
-**Facebook**: Doesn't provide refresh tokens. Long-lived tokens expire in 60 days (see [Facebook Expiration and Extension of Access Tokens](https://developers.facebook.com/docs/facebook-login/access-tokens/expiration-and-extension)).
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-user-identities.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ For all language frameworks, App Service makes the claims in the incoming token
23
23
|`X-MS-CLIENT-PRINCIPAL-NAME`| A human-readable name for the caller set by the identity provider, e.g. Email Address, User Principal Name. |
24
24
|`X-MS-CLIENT-PRINCIPAL-IDP`| The name of the identity provider used by App Service Authentication. |
25
25
26
-
Provider tokens are also exposed through similar headers. For example, the Microsoft Identity Provider also sets `X-MS-TOKEN-AAD-ACCESS-TOKEN` and `X-MS-TOKEN-AAD-ID-TOKEN` as appropriate.
26
+
Provider tokens are also exposed through similar headers. For example, Microsoft Entra also sets `X-MS-TOKEN-AAD-ACCESS-TOKEN` and `X-MS-TOKEN-AAD-ID-TOKEN` as appropriate.
27
27
28
28
> [!NOTE]
29
29
> Different language frameworks may present these headers to the app code in different formats, such as lowercase or title case.
Copy file name to clipboardExpand all lines: articles/app-service/includes/scenario-secure-app-clean-up-resources.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.subservice: web-apps
15
15
#Customer intent: As an application developer, I want to learn how to access Azure Storage for an app using managed identities.
16
16
---
17
17
18
-
If you completed all the steps in this multipart tutorial, you created an app service, app service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
18
+
If you completed all the steps in this multipart tutorial, you created an App Service, App Service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. If you chose external configuration, you may have created a new external tenant. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
19
19
20
20
In this tutorial, you learn how to:
21
21
@@ -25,7 +25,7 @@ In this tutorial, you learn how to:
25
25
26
26
### Delete the resource group
27
27
28
-
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your app service and app service plan.
28
+
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your App Service and App Service plan.
29
29
30
30
Select **Delete resource group** to delete the resource group and all the resources.
31
31
@@ -40,3 +40,13 @@ In the [Microsoft Entra admin center](https://entra.microsoft.com), select **App
40
40
41
41
In the app registration overview, select **Delete**.
42
42
:::image type="content" alt-text="Screenshot that shows deleting the app registration." source="../media/scenario-secure-app-clean-up-resources/delete-app-registration.png":::
43
+
44
+
### Delete the external tenant
45
+
46
+
If you created a new external tenant, you can [delete it](/entra/external-id/customers/how-to-delete-external-tenant-portal). In to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Manage tenants**.
47
+
48
+
Select the tenant you want to delete, and then select **Delete**.
49
+
50
+
You might need to complete required actions before you can delete the tenant. For example, you might need to delete all user flows and app registrations in the tenant.
51
+
52
+
If you're ready to delete the tenant, select **Delete**.
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md
+28-13Lines changed: 28 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
7
7
8
8
ms.service: app-service
9
9
ms.topic: include
10
-
ms.date: 03/12/2024
10
+
ms.date: 05/16/2024
11
11
ms.author: ryanwi
12
12
ms.reviewer: stsoneff
13
13
ms.custom: azureday1
@@ -55,11 +55,20 @@ Now that you have a web app running on App Service, enable authentication and au
55
55
56
56
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
57
57
58
-
1.Add a **Name** for the app registration, a public facing display name.
58
+
1.Enter a display **Name** for your application. Users of your application might see the display name when they use the app, for example during sign-in.
59
59
60
60
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
61
61
62
-
1. In the **App Service authentication settings** section, leave **Authentication** set to **Require authentication** and **Unauthenticated requests** set to **HTTP 302 Found redirect: recommended for websites**.
62
+
1. In the **Additional checks** section, select:
63
+
64
+
-**Allow requests only from this application itself** for **Client application requirement**
65
+
-**Allow requests from any identity** for **Identity requirement**
66
+
-**Allow requests only from the issuer tenant** for **Tenant requirement**
67
+
68
+
1. In the **App Service authentication settings** section, set:
69
+
-**Require authentication** for **Authentication**
70
+
-**HTTP 302 Found redirect: recommended for websites** for **Unauthenticated requests**
71
+
-**Token store** box
63
72
64
73
1. At the bottom of the **Add an identity provider** page, select **Add** to enable authentication for your web app.
65
74
@@ -85,11 +94,17 @@ Now that you have a web app running on App Service, enable authentication and au
85
94
86
95
1. For **Tenant type**, select **External configuration** for external users.
87
96
88
-
1. Select **Create new app registration** to create a new app registration and select the [customer (external) tenant](/entra/external-id/customers/quickstart-tenant-setup) you want to use.
97
+
1. Select **Create new app registration** to create a new app registration.
89
98
90
-
1. Select **Configure** to configure external authentication.
99
+
1. Select an existing tenant to use from the drop-down, or select **Create new** to create a new [external tenant](/entra/external-id/customers/quickstart-tenant-setup).
100
+
101
+
:::image type="content" alt-text="Screenshot that shows the Select a tenent dropdown." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-select.png":::
91
102
92
-
:::image type="content" alt-text="Screenshot that shows the Add an identity provider page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external.png":::
103
+
1. (Optional) In the **Create a tenant** page, add the *Tenant Name** and **Domain Name**. Select a **Location** and select **Review and create** and then **Create**.
104
+
105
+
:::image type="content" alt-text="Screenshot the Create a tenant page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-create-tenant.png":::
106
+
107
+
1. Select **Configure** to configure external authentication.
93
108
94
109
1. The browser opens **Configure customer authentication**. In **Setup sign-in**, select **Create new** to create a sign-in experience for your external users.
95
110
@@ -105,15 +120,15 @@ Now that you have a web app running on App Service, enable authentication and au
105
120
106
121
1. Add your company logo, select a background color, and select a sign-in layout.
107
122
108
-
:::image type="content" alt-text="Screenshot that shows the customize branding tab." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-branding.png":::
123
+
:::image type="content" alt-text="Screenshot that shows the customized branding tab." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-branding.png":::
109
124
110
-
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
125
+
1. Select **Next**. If the tenant you selected already has a branding configuration you will need to confirm that you want to override it.
111
126
112
-
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
127
+
1. Select **Configure** in the **Review** tab to confirm external tenant update.
113
128
114
-
1. The browser opens **Add an identity provider**.
129
+
1. The browser returns to the **Add an identity provider** page.
115
130
116
-
1. In the **App Service authentication settings** section, select:
131
+
1. In the **Additional checks** section, select:
117
132
118
133
-**Allow requests only from this application itself** for **Client application requirement**
119
134
-**Allow requests from any identity** for **Identity requirement**
@@ -131,9 +146,9 @@ Now that you have a web app running on App Service, enable authentication and au
131
146
132
147
## 4. Verify limited access to the web app
133
148
134
-
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or customer (external) tenant. The app registration has the same display name as your web app.
149
+
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or external tenant. The app registration has the display name you created in a previous step.
135
150
136
-
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If necessary, use the **Settings** icon in the top menu to switch to the customer (external) tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
151
+
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If you chose external configuration, use the **Settings** icon in the top menu to switch to the external tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
137
152
138
153
1. Browse to **Identity** > **Applications** > **App registrations** and select **Applications** > **App registrations** from the menu.
Copy file name to clipboardExpand all lines: articles/app-service/overview-authentication-authorization.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ App Service uses [federated identity](https://en.wikipedia.org/wiki/Federated_id
31
31
32
32
| Provider | Sign-in endpoint | How-To guidance |
33
33
| - | - | - |
34
-
|[Microsoft identity platform](../active-directory/fundamentals/active-directory-whatis.md)|`/.auth/login/aad`|[App Service Microsoft identity platform login](configure-authentication-provider-aad.md)|
34
+
|[Microsoft Entra](/entra/index)|`/.auth/login/aad`|[App Service Microsoft Entra platform login](configure-authentication-provider-aad.md)|
35
35
|[Facebook](https://developers.facebook.com/docs/facebook-login)|`/.auth/login/facebook`|[App Service Facebook login](configure-authentication-provider-facebook.md)|
36
36
|[Google](https://developers.google.com/identity/choose-auth)|`/.auth/login/google`|[App Service Google login](configure-authentication-provider-google.md)|
37
37
|[Twitter](https://developer.twitter.com/en/docs/basics/authentication)|`/.auth/login/twitter`|[App Service Twitter login](configure-authentication-provider-twitter.md)|
0 commit comments