You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-customize-sign-in-out.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Customize sign-ins and sign-outs
3
3
description: Use the built-in authentication and authorization in App Service and at the same time customize the sign-in and sign-out behavior.
4
4
ms.topic: article
5
-
ms.date: 03/29/2021
5
+
ms.date: 07/08/2024
6
6
ms.custom: AppServiceIdentity
7
7
author: cephalin
8
8
ms.author: cephalin
@@ -23,7 +23,7 @@ In **Action to take when request is not authenticated**, select **Allow Anonymou
23
23
In the sign-in page, or the navigation bar, or any other location of your app, add a sign-in link to each of the providers you enabled (`/.auth/login/<provider>`). For example:
24
24
25
25
```html
26
-
<ahref="/.auth/login/aad">Log in with the Microsoft Identity Platform</a>
26
+
<ahref="/.auth/login/aad">Log in with Microsoft Entra</a>
27
27
<ahref="/.auth/login/facebook">Log in with Facebook</a>
28
28
<ahref="/.auth/login/google">Log in with Google</a>
29
29
<ahref="/.auth/login/twitter">Log in with Twitter</a>
@@ -89,7 +89,7 @@ Users can initiate a sign-out by sending a `GET` request to the app's `/.auth/lo
89
89
90
90
- Clears authentication cookies from the current session.
91
91
- Deletes the current user's tokens from the token store.
92
-
- For Microsoft Entra ID and Google, performs a server-side sign-out on the identity provider.
92
+
- For Microsoft Entra and Google, performs a server-side sign-out on the identity provider.
93
93
94
94
Here's a simple sign-out link in a webpage:
95
95
@@ -129,7 +129,7 @@ az webapp config appsettings set --name <app_name> --resource-group <group_name>
129
129
130
130
## Setting the sign-in accounts domain hint
131
131
132
-
Both Microsoft Account and Microsoft Entra ID lets you sign in from multiple domains. For example, Microsoft Account allows _outlook.com_, _live.com_, and _hotmail.com_ accounts. Microsoft Entra ID allows any number of custom domains for the sign-in accounts. However, you may want to accelerate your users straight to your own branded Microsoft Entra sign-in page (such as `contoso.com`). To suggest the domain name of the sign-in accounts, follow these steps.
132
+
Both Microsoft Account and Microsoft Entra lets you sign in from multiple domains. For example, Microsoft Account allows _outlook.com_, _live.com_, and _hotmail.com_ accounts. Microsoft Entra allows any number of custom domains for the sign-in accounts. However, you may want to accelerate your users straight to your own branded Microsoft Entra sign-in page (such as `contoso.com`). To suggest the domain name of the sign-in accounts, follow these steps.
133
133
134
134
1. In [https://resources.azure.com](https://resources.azure.com), At the top of the page, select **Read/Write**.
135
135
2. In the left browser, navigate to **subscriptions** > **_\<subscription-name_** > **resourceGroups** > **_\<resource-group-name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app-name>_** > **config** > **authsettingsV2**.
@@ -188,7 +188,7 @@ For any Windows app, you can define authorization behavior of the IIS web server
188
188
189
189
The identity provider may provide certain turn-key authorization. For example:
190
190
191
-
- For [Azure App Service](configure-authentication-provider-aad.md), you can [manage enterprise-level access](../active-directory/manage-apps/what-is-access-management.md) directly in Microsoft Entra ID. For instructions, see [How to remove a user's access to an application](../active-directory/manage-apps/methods-for-removing-user-access.md).
191
+
- You can [manage enterprise-level access](../active-directory/manage-apps/what-is-access-management.md) directly in Microsoft Entra. For instructions, see [How to remove a user's access to an application](../active-directory/manage-apps/methods-for-removing-user-access.md).
192
192
- For [Google](configure-authentication-provider-google.md), Google API projects that belong to an [organization](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy#organizations) can be configured to allow access only to users in your organization (see [Google's **Setting up OAuth 2.0** support page](https://support.google.com/cloud/answer/6158849?hl=en)).
0 commit comments