You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/static-web-apps/authentication-authorization.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: Learn to use different authorization providers to secure your stati
4
4
services: static-web-apps
5
5
author: craigshoemaker
6
6
ms.service: static-web-apps
7
-
ms.topic: conceptual
8
-
ms.date: 05/08/2020
7
+
ms.topic: conceptual
8
+
ms.date: 04/09/2021
9
9
ms.author: cshoe
10
10
---
11
11
@@ -19,26 +19,26 @@ Azure Static Web Apps streamlines the authentication experience by managing auth
19
19
- Google<sup>1</sup>
20
20
- Twitter
21
21
22
-
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _routes.json_ file.
22
+
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _staticwebapp.config.json_ file.
23
23
24
24
All authentication providers are enabled by default. To restrict an authentication provider, [block access](#block-an-authorization-provider) with a custom route rule.
25
25
26
26
The topics of authentication and authorization significantly overlap with routing concepts. Make sure to read the [routing guide](routes.md) along with this article.
27
27
28
28
## Roles
29
29
30
-
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
30
+
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
31
31
32
32
-**anonymous**: All users automatically belong to the _anonymous_ role.
33
33
-**authenticated**: All users who are logged in belong to the _authenticated_ role.
34
34
35
-
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _routes.json_ file.
35
+
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _staticwebapp.config.json_ file.
36
36
37
37
## Role management
38
38
39
39
### Add a user to a role
40
40
41
-
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _routes.json_ file.
41
+
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _staticwebapp.config.json_ file.
42
42
43
43
<aname="invitations"id="invitations"></a>
44
44
@@ -48,25 +48,25 @@ Invitations are specific to individual authorization-providers, so consider the
1. Navigate to a Static Web Apps resource in the [Azure portal](https://portal.azure.com).
60
60
1. Under _Settings_, click on **Role Management**.
61
61
1. Click on the **Invite** button.
62
62
1. Select an _Authorization provider_ from the list of options.
63
63
1. Add either the username or email address of the recipient in the _Invitee details_ box.
64
-
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
64
+
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
65
65
1. Select the domain of your static site from the _Domain_ drop-down.
66
-
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
66
+
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
67
67
1. Add a comma-separated list of role names in the _Role_ box.
68
68
1. Enter the maximum number of hours you want the invitation to remain valid.
69
-
- The maximum possible limit is 168 hours, which is 7 days.
69
+
- The maximum possible limit is 168 hours, which is 7 days.
70
70
1. Click the **Generate** button.
71
71
1. Copy the link from the _Invite link_ box.
72
72
1. Email the invitation link to the person you're granting access to your app.
0 commit comments