Skip to content

Commit 4d4f4ea

Browse files
authored
Merge pull request #113752 from mike-urnun-msft/patch-133
(Azure CXP) fixes buggy steps
2 parents 47d2c19 + d382666 commit 4d4f4ea

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/api-management/api-management-howto-protect-backend-with-aad.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Every client application that calls the API needs to be registered as an applica
7575
- In the **Name** section, enter a meaningful application name that will be displayed to users of the app, such as *client-app*.
7676
- In the **Supported account types** section, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant)**.
7777

78-
1. In the **Redirect URI** section, select `Web` and enter the URL `https://contoso5.portal.azure-api.net/signin`.
78+
1. In the **Redirect URI** section, select `Web` and leave the URL field empty for now.
7979

8080
1. Select **Register** to create the application.
8181

@@ -145,9 +145,9 @@ In this example, the Developer Console is the client-app. The following steps de
145145

146146
1. Select **Create**.
147147

148-
1. Go back to your client-app and select **Authentication**.
148+
1. Go back to your client-app registration in Azure Active Directory and select **Authentication**.
149149

150-
1. Under **Redirect URIs**, select the type as **Web**, paste the **redirect_url** under **Redirect URI**, and then save.
150+
1. Under **Platform configurations** click on **Add a platform**, and select the type as **Web**, paste the **redirect_url** under **Redirect URI**, and then click on **Configure** button to save.
151151

152152
Now that you have configured an OAuth 2.0 authorization server, the Developer Console can obtain access tokens from Azure AD.
153153

0 commit comments

Comments
 (0)