Skip to content

Commit 53fe739

Browse files
Merge pull request #153915 from johnpapa/swa-config-file
changing file name to new name
2 parents a8ed780 + b5d36ae commit 53fe739

File tree

6 files changed

+328
-329
lines changed

6 files changed

+328
-329
lines changed

articles/static-web-apps/authentication-authorization.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn to use different authorization providers to secure your stati
44
services: static-web-apps
55
author: craigshoemaker
66
ms.service: static-web-apps
7-
ms.topic: conceptual
8-
ms.date: 05/08/2020
7+
ms.topic: conceptual
8+
ms.date: 04/09/2021
99
ms.author: cshoe
1010
---
1111

@@ -19,26 +19,26 @@ Azure Static Web Apps streamlines the authentication experience by managing auth
1919
- Google<sup>1</sup>
2020
- Twitter
2121

22-
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _routes.json_ file.
22+
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _staticwebapp.config.json_ file.
2323

2424
All authentication providers are enabled by default. To restrict an authentication provider, [block access](#block-an-authorization-provider) with a custom route rule.
2525

2626
The topics of authentication and authorization significantly overlap with routing concepts. Make sure to read the [routing guide](routes.md) along with this article.
2727

2828
## Roles
2929

30-
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
30+
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
3131

3232
- **anonymous**: All users automatically belong to the _anonymous_ role.
3333
- **authenticated**: All users who are logged in belong to the _authenticated_ role.
3434

35-
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _routes.json_ file.
35+
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _staticwebapp.config.json_ file.
3636

3737
## Role management
3838

3939
### Add a user to a role
4040

41-
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _routes.json_ file.
41+
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _staticwebapp.config.json_ file.
4242

4343
<a name="invitations" id="invitations"></a>
4444

@@ -48,25 +48,25 @@ Invitations are specific to individual authorization-providers, so consider the
4848

4949
<a name="provider-user-details" id="provider-user-details"></a>
5050

51-
| Authorization provider | Exposes a user's |
52-
| ---------------------- | ----------------- |
53-
| Azure Active Directory | email address |
54-
| Facebook | email address |
55-
| GitHub | username |
56-
| Google<sup>1</sup> | email address |
57-
| Twitter | username |
51+
| Authorization provider | Exposes a user's |
52+
| ---------------------- | ---------------- |
53+
| Azure Active Directory | email address |
54+
| Facebook | email address |
55+
| GitHub | username |
56+
| Google<sup>1</sup> | email address |
57+
| Twitter | username |
5858

5959
1. Navigate to a Static Web Apps resource in the [Azure portal](https://portal.azure.com).
6060
1. Under _Settings_, click on **Role Management**.
6161
1. Click on the **Invite** button.
6262
1. Select an _Authorization provider_ from the list of options.
6363
1. Add either the username or email address of the recipient in the _Invitee details_ box.
64-
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
64+
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
6565
1. Select the domain of your static site from the _Domain_ drop-down.
66-
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
66+
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
6767
1. Add a comma-separated list of role names in the _Role_ box.
6868
1. Enter the maximum number of hours you want the invitation to remain valid.
69-
- The maximum possible limit is 168 hours, which is 7 days.
69+
- The maximum possible limit is 168 hours, which is 7 days.
7070
1. Click the **Generate** button.
7171
1. Copy the link from the _Invite link_ box.
7272
1. Email the invitation link to the person you're granting access to your app.

0 commit comments

Comments
 (0)