Skip to content

Commit 520c583

Browse files
committed
Acrolinx_Checks
1 parent 9418055 commit 520c583

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
3232
To follow the steps in this article, you must have:
3333
* An Azure (StorageV2) General Purpose V2 Storage Account to host the frontend JS Single Page App
3434
* An Azure API Management instance
35-
* An empty Azure Function app (running the V2 .Net Core runtime, on a Windows Consumption Plan) to host the called API
35+
* An empty Azure Function app (running the V2 .NET Core runtime, on a Windows Consumption Plan) to host the called API
3636
* An Azure AD B2C tenant, linked to a subscription
3737

3838
Although in practice you would use resources in the same region in production workloads, for this how-to article the region of deployment isn't important.
@@ -86,7 +86,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
8686
1. Under 'User Attributes and claims', click 'Show More...' then choose the claim options that you want your users to enter and have returned in the token. Check at least 'Display Name' and 'Email Address' to collect and return, and click 'OK', then click 'Create'.
8787
1. Select the policy that you created in the list, then click the 'Run user flow' button.
8888
1. This action will open the run user flow blade, select the frontend application, then record the address of the b2clogin.com domain that's shown under the dropdown for 'Select domain'.
89-
1. Click on the link at the top to open the 'well-known openid configuration endpoint', and record the authorization_endpoint and token_endpoint values as well of the value of the link itself as the well known openid configuration endpoint.
89+
1. Click on the link at the top to open the 'well-known openid configuration endpoint', and record the authorization_endpoint and token_endpoint values as well of the value of the link itself as the well-known openid configuration endpoint.
9090

9191
> [!NOTE]
9292
> B2C Policies allow you to expose the Azure AD B2C login endpoints to be able to capture different data components and sign in users in different ways.
@@ -239,7 +239,7 @@ You'll need to add CIDR formatted blocks of addresses to the IP restrictions pan
239239
</cors>
240240
</inbound>
241241
```
242-
1. Edit the openid-config url to match your well known Azure AD B2C endpoint for the sign up or sign in policy.
242+
1. Edit the openid-config url to match your well-known Azure AD B2C endpoint for the sign up or sign in policy.
243243
1. Edit the claim value to match the valid application ID, also known as a client ID for the backend API application and save.
244244
1. Select the api operation below the "All APIs"
245245

0 commit comments

Comments
 (0)