Skip to content

Commit 510c107

Browse files
author
Jill Grant
authored
Merge pull request #278230 from craigshoemaker/aca/entra
[Container Apps] Update: Active Directory to Entra rebranding
2 parents 54e9fd4 + 0a5bdf1 commit 510c107

File tree

3 files changed

+9
-4
lines changed

3 files changed

+9
-4
lines changed

articles/container-apps/.openpublishing.redirection.container-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,11 @@
5454
"source_path_from_root": "/articles/container-apps/spring-cloud-config-server.md",
5555
"redirect_url": "/azure/container-apps/java-config-server",
5656
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/container-apps/authentication-azure-active-directory.md",
60+
"redirect_url": "/azure/container-apps/authentication-entra",
61+
"redirect_document_id": false
5762
}
5863
]
5964
}

articles/container-apps/authentication-azure-active-directory.md renamed to articles/container-apps/authentication-entra.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -106,8 +106,8 @@ In the prior section, you registered your container app to authenticate users. I
106106

107107
You can register native clients to request access your container app's APIs on behalf of a signed in user.
108108

109-
1. In the [Azure portal], select **Active Directory** > **App registrations** > **New registration**.
110-
1. In the **Register an application** page, enter a **Name** for your app registration.
109+
1. In the [Azure portal], select **Microsoft Entra ID** > **Add** > **App registrations**.
110+
1. In the *Register an application* page, enter a **Name** for your app registration.
111111
1. In **Redirect URI**, select **Public client (mobile & desktop)** and type the URL `<app-url>/.auth/login/aad/callback`. For example, `https://<hostname>.azurecontainerapps.io/.auth/login/aad/callback`.
112112

113113
> [!NOTE]
@@ -124,7 +124,7 @@ In this section, you configured a native client application that can request acc
124124

125125
Your application can acquire a token to call a Web API hosted in your container app on behalf of itself (not on behalf of a user). This scenario is useful for non-interactive daemon applications that perform tasks without a logged in user. It uses the standard OAuth 2.0 [client credentials](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md) grant.
126126

127-
1. In the [Azure portal], select **Active Directory** > **App registrations** > **New registration**.
127+
1. In the [Azure portal], select **Microsoft Entra ID** > **Add** > **App registrations**.
128128
1. In the **Register an application** page, enter a **Name** for your daemon app registration.
129129
1. For a daemon application, you don't need a Redirect URI so you can keep that empty.
130130
1. Select **Create**.

articles/container-apps/microservices-dapr-azure-resource-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The template deploys:
8383
- a Dapr component for the blob storage account
8484
- the node, Dapr-enabled container app with a user-assigned managed identity: [hello-k8s-node](https://hub.docker.com/r/dapriosamples/hello-k8s-node)
8585
- the python, Dapr-enabled container app: [hello-k8s-python](https://hub.docker.com/r/dapriosamples/hello-k8s-python)
86-
- an Active Directory role assignment for the node app used by the Dapr component to establish a connection to blob storage
86+
- a Microsoft Entra ID role assignment for the node app used by the Dapr component to establish a connection to blob storage
8787

8888
Navigate to the _acadapr-templates_ directory and run the following command:
8989

0 commit comments

Comments
 (0)