You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-basic-auth-disable.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,15 +45,15 @@ For other deployment methods that use basic authentication, such as Visual Studi
45
45
46
46
### [Azure CLI](#tab/cli)
47
47
48
-
Run the following Azure CLI commands, replacing the placeholders with your resource group name and app name.
48
+
Run the following Azure CLI commands in the Bash environment of Azure Cloud Shell by selecting **Open Cloud Shell** at the upper right of the code block.
49
49
50
-
To disable FTP basic authentication access, run the following command. You must have owner-level access to the app.
50
+
To disable FTP basic authentication access, run the following command, replacing the placeholders with your app's resource group and name. You must have owner-level access to the app.
To disable basic authentication access for the Web Deploy port and Git deploy `https://\<app-name>.scm.azurewebsites.net`, run the following command.
56
+
To disable basic authentication access for the Web Deploy port and Git deploy `https://\<app-name>.scm.azurewebsites.net`, run the following command. Replace the placeholders with your app's resource group and name.
| Azure CLI| In Azure CLI 2.48.1 or higher, the following commands fall back to Microsoft Entra authentication:<br/>[`az webapp up`](/cli/azure/webapp#az-webapp-up).<br/>[`az webapp deploy`](/cli/azure/webapp#az-webapp-deploy).<br/>[`az webapp log deployment show`](/cli/azure/webapp/log/deployment#az-webapp-log-deployment-show).<br/>[`az webapp log deployment list`](/cli/azure/webapp/log/deployment#az-webapp-log-deployment-list).<br/>[`az webapp log download`](/cli/azure/webapp/log#az-webapp-log-download).<br/>[`az webapp log tail`](/cli/azure/webapp/log#az-webapp-log-tail).<br/>[`az webapp browse`](/cli/azure/webapp#az-webapp-browse).<br/>[`az webapp create-remote-connection`](/cli/azure/webapp#az-webapp-create-remote-connection).<br/>[`az webapp ssh`](/cli/azure/webapp#az-webapp-ssh).<br/>[`az functionapp deploy`](/cli/azure/functionapp#az-functionapp-deploy).<br/>[`az functionapp log deployment list`](/cli/azure/functionapp/log/deployment#az-functionapp-log-deployment-list).<br/>[`az functionapp log deployment show`](/cli/azure/functionapp/log/deployment#az-functionapp-log-deployment-show).<br/>[`az functionapp deployment source config-zip`](/cli/azure/functionapp/deployment/source#az-functionapp-deployment-source-config-zip).|
80
80
|[Maven plugin](https://github.com/microsoft/azure-maven-plugins) or [Gradle plugin](https://github.com/microsoft/azure-gradle-plugins)| Works. |
81
-
|[GitHub Actions](deploy-continuous-deployment.md?tabs=github)| Existing GitHub Actions workflows that use basic authentication can't authenticate. In the portal **Deployment Center**, disconnect the existing GitHub configuration and create a new GitHub Actions configuration that uses user-assigned identity. <br/> If the existing GitHub Actions deployment is [manually configured](deploy-github-actions.md), try using a service principal or OpenID Connect instead. <br/> For new GitHub Actions workflows, use the **User-assigned identity** option. |
81
+
|[GitHub Actions](deploy-continuous-deployment.md?tabs=github)| Existing GitHub Actions workflows that use basic authentication don't work. Disconnect the existing GitHub configuration and create a new GitHub Actions configuration that uses user-assigned identity. <br/> If the existing GitHub Actions deployment is [manually configured](deploy-github-actions.md), try using a service principal or OpenID Connect instead. <br/> For new GitHub Actions workflows, use the **User-assigned identity** option. |
82
82
|[GitHub with the App Service build service](deploy-continuous-deployment.md?tabs=github)| Doesn't work. |
83
83
| Deployment from the portal [creation wizard](https://portal.azure.com/#create/Microsoft.WebSite)| If you select a **Continuous deployment** source when **Basic authentication** is set to **Disable**, GitHub Actions is configured with the **user-assigned identity** option (OpenID Connect). |
@@ -89,7 +89,7 @@ The following table shows how various deployment methods behave when basic authe
89
89
90
90
### Visual Studio basic authentication disabled warning
91
91
92
-
Visual Studio requires basic authentication to deploy to Azure App Service. If you disable basic authentication, the warning reminds you that your app configuration changed and you can no longer deploy to it. Either you disabled basic authentication on the app yourself, or your organization policy disabled basic authentication for App Service apps.
92
+
Visual Studio requires basic authentication to deploy to Azure App Service. If you disable basic authentication, a Visual Studio warning reminds you that your app configuration changed and you can no longer deploy to your app. Either you disabled basic authentication on the app yourself, or your organization policy disabled basic authentication for App Service apps.
93
93
94
94
## Create a custom role to prevent enabling basic authentication
95
95
@@ -104,12 +104,11 @@ To prevent lower-privileged users from enabling basic authentication for any app
104
104
1. Search and select **Microsoft Web Apps**.
105
105
1. Search for and expand **microsoft.web/sites/basicPublishingCredentialsPolicies**.
106
106
1. Select the box for **Write**, and then select **Add**. This step adds the operation to **NotActions** for the role.
107
-
108
-
:::image type="content" source="media/configure-basic-auth-disable/custom-role-no-basic-auth.png" alt-text="Screenshot that shows excluding Write for basicPublishingCredentialsPolicies.":::
109
-
107
+
1. Select **Exclude permissions** again.
108
+
1. Search for and expand **microsoft.web/sites/slots/basicPublishingCredentialsPolicies**, select the **Write** box, and then select **Add**.
110
109
1. Your **Permissions** tab should look like the following screenshot. Select **Review + create**, and then select **Create**.
111
110
112
-
:::image type="content" source="media/configure-basic-auth-disable/create-role.png" alt-text="Screenshot that shows the creation of a custom role with all basic authentication permissions excluded.":::
111
+
:::image type="content" source="media/configure-basic-auth-disable/custom-role-no-basic-auth.png" alt-text="Screenshot that shows excluding Write for basicPublishingCredentialsPolicies.":::
113
112
114
113
You can now assign this role to your organization's users. For more information, see [Create or update Azure custom roles by using the Azure portal](/azure/role-based-access-control/custom-roles-portal#step-2-choose-how-to-start).
115
114
@@ -123,10 +122,8 @@ az role definition create --role-definition '{
123
122
"IsCustom": true,
124
123
"Description": "Prevents users from enabling basic authentication for all App Service apps or slots.",
0 commit comments