Skip to content

Commit 5113e2b

Browse files
authored
Merge pull request #114576 from msmbaldwin/avk-qs
Updated app registration
2 parents 8952bdd + c552f3e commit 5113e2b

File tree

4 files changed

+22
-10
lines changed

4 files changed

+22
-10
lines changed
Binary file not shown.
156 KB
Loading
78.7 KB
Loading

articles/key-vault/secrets/key-rotation-log-monitoring.md

Lines changed: 22 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -81,23 +81,35 @@ First, you must register your application with Azure Active Directory. Then tell
8181
> [!NOTE]
8282
> Your application must be created on the same Azure Active Directory tenant as your key vault.
8383
84-
1. Open **Azure Active Directory**.
85-
2. Select **App registrations**.
86-
3. Select **New application registration** to add an application to Azure Active Directory.
84+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
85+
1. If your account gives you access to more than one tenant, select your account in the upper right corner. Set your portal session to the Azure AD tenant that you want.
86+
1. Search for and select **Azure Active Directory**. Under **Manage**, select **App registrations**.
87+
1. Select **New registration**.
88+
1. In **Register an application**, enter a meaningful application name to display to users.
89+
1. Specify who can use the application, as follows:
8790

88-
![Open applications in Azure Active Directory](../media/keyvault-keyrotation/azure-ad-application.png)
91+
| Supported account types | Description |
92+
|-------------------------|-------------|
93+
| **Accounts in this organizational directory only** | Select this option if you're building a line-of-business (LOB) application. This option isn't available if you're not registering the application in a directory.<br><br>This option maps to Azure AD only single-tenant.<br><br>This option is the default unless you're registering the app outside of a directory. In cases where the app is registered outside of a directory, the default is Azure AD multi-tenant and personal Microsoft accounts. |
94+
| **Accounts in any organizational directory** | Select this option if you would like to target all business and educational customers.<br><br>This option maps to an Azure AD only multi-tenant.<br><br>If you registered the app as Azure AD only single-tenant, you can update it to be Azure AD multi-tenant and back to single-tenant through the **Authentication** page. |
95+
| **Accounts in any organizational directory and personal Microsoft accounts** | Select this option to target the widest set of customers.<br><br>This option maps to Azure AD multi-tenant and personal Microsoft accounts.<br><br>If you registered the app as Azure AD multi-tenant and personal Microsoft accounts, you can't change this setting in the UI. Instead, you must use the application manifest editor to change the supported account types. |
8996

90-
4. Under **Create**, leave the application type as **Web app / API** and give your application a name. Give your application a **Sign-on URL**. This URL can be anything you want for this demo.
97+
1. Under **Redirect URI (optional)**, select the type of app you're building: **Web** or **Public client (mobile & desktop)**. Then enter the redirect URI, or reply URL, for your application.
9198

92-
![Create application registration](../media/keyvault-keyrotation/create-app.png)
99+
* For web applications, provide the base URL of your app. For example, `https://localhost:31544` might be the URL for a web app running on your local machine. Users would use this URL to sign in to a web client application.
100+
* For public client applications, provide the URI used by Azure AD to return token responses. Enter a value specific to your application, such as `myapp://auth`.
93101

94-
5. After the application is added to Azure Active Directory, the application page opens. Select **Settings**, and then select **Properties**. Copy the **Application ID** value. You'll need it in later steps.
102+
1. When finished, select **Register**.
95103

96-
Next, generate a key for your application so it can interact with Azure Active Directory. To create a key, select **Keys** under **Settings**. Make note of the newly generated key for your Azure Active Directory application. You'll need it in a later step. The key won't be available after you leave this section.
104+
![Shows the screen to register a new application in the Azure portal](../media/new-app-registration.png)
97105

98-
![Azure Active Directory app keys](../media/keyvault-keyrotation/create-key.png)
106+
Azure AD assigns a unique application, or client, ID to your app. The portal opens your application's **Overview** page. Note the **Application (client) ID** value.
99107

100-
Before you establish any calls from your application into the key vault, you must tell the key vault about your application and its permissions. The following command uses the vault name and the application ID from your Azure Active Directory app to grant the application **Get** access to your key vault.
108+
To add capabilities to your application, you can select other configuration options including branding, certificates and secrets, API permissions, and more.
109+
110+
![Example of a newly registered app overview page](../media//new-app-overview-page-expanded.png)
111+
112+
Before you establish any calls from your application into the key vault, you must tell the key vault about your application and its permissions. The following command uses the vault name and the **Application (client) ID** from your Azure Active Directory app to grant the application **Get** access to your key vault.
101113

102114
```powershell
103115
Set-AzKeyVaultAccessPolicy -VaultName <vaultName> -ServicePrincipalName <clientIDfromAzureAD> -PermissionsToSecrets Get

0 commit comments

Comments
 (0)