You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
32
32
To follow the steps in this article, you must have:
33
33
* An Azure (StorageV2) General Purpose V2 Storage Account to host the frontend JS Single Page App
34
34
* An Azure API Management instance
35
-
* An empty Azure Function app (running the V2 .Net Core runtime, on a Windows Consumption Plan) to host the called API
35
+
* An empty Azure Function app (running the V2 .NET Core runtime, on a Windows Consumption Plan) to host the called API
36
36
* An Azure AD B2C tenant, linked to a subscription
37
37
38
38
Although in practice you would use resources in the same region in production workloads, for this how-to article the region of deployment isn't important.
@@ -86,7 +86,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
86
86
1. Under 'User Attributes and claims', click 'Show More...' then choose the claim options that you want your users to enter and have returned in the token. Check at least 'Display Name' and 'Email Address' to collect and return, and click 'OK', then click 'Create'.
87
87
1. Select the policy that you created in the list, then click the 'Run user flow' button.
88
88
1. This action will open the run user flow blade, select the frontend application, then record the address of the b2clogin.com domain that's shown under the dropdown for 'Select domain'.
89
-
1. Click on the link at the top to open the 'well-known openid configuration endpoint', and record the authorization_endpoint and token_endpoint values as well of the value of the link itself as the wellknown openid configuration endpoint.
89
+
1. Click on the link at the top to open the 'well-known openid configuration endpoint', and record the authorization_endpoint and token_endpoint values as well of the value of the link itself as the well-known openid configuration endpoint.
90
90
91
91
> [!NOTE]
92
92
> B2C Policies allow you to expose the Azure AD B2C login endpoints to be able to capture different data components and sign in users in different ways.
@@ -239,7 +239,7 @@ You'll need to add CIDR formatted blocks of addresses to the IP restrictions pan
239
239
</cors>
240
240
</inbound>
241
241
```
242
-
1. Edit the openid-config url to match your wellknown Azure AD B2C endpoint for the sign up or sign in policy.
242
+
1. Edit the openid-config url to match your well-known Azure AD B2C endpoint for the sign up or sign in policy.
243
243
1. Edit the claim value to match the valid application ID, also known as a client ID for the backend API application and save.
0 commit comments