Skip to content

Commit 5923a3a

Browse files
authored
Merge pull request #126457 from dstamand-msft/feature/easyauth-openid-provider-contribution
Add missing information for the OpenID authentication provider for EasyAuth
2 parents 7b8d224 + c6305ce commit 5923a3a

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

articles/app-service/configure-authentication-provider-openid-connect.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Your provider requires you to register the details of your application with it.
2727
2828
You need to collect a *client ID* and a *client secret* for your application. The client secret is an important security credential. Don't share this secret with anyone or distribute it in a client application.
2929

30+
> [!NOTE]
31+
> You only need to provide a client secret to the configuration if you would like to acquire access tokens for the user through interactive login flow using the authorization code flow. If this is not your case, collecting a secret is not required.
32+
3033
You also need the OIDC metadata for the provider. This metadata is often exposed in a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's issuer URL suffixed with `/.well-known/openid-configuration`. Get this configuration URL.
3134

3235
If you can't use a configuration metadata document, get the following values separately:
@@ -52,7 +55,7 @@ To add provider information for your OpenID Connect provider, follow these steps
5255

5356
Otherwise, select **Provide endpoints separately**. Put each URL from the identity provider in the appropriate field.
5457

55-
1. Provide the values that you collected earlier for **Client ID** and **Client secret**.
58+
1. Provide the values that you collected earlier for **Client ID**. If the **Client secret** was also collected, provide it as part of the configuration process.
5659

5760
1. Specify an application setting name for your client secret. Your client secret is stored as an app setting to ensure that secrets are stored in a secure fashion. If you want to manage the secret in Azure Key vault, update that setting later to use [Azure Key Vault references](./app-service-key-vault-references.md).
5861

@@ -61,6 +64,8 @@ To add provider information for your OpenID Connect provider, follow these steps
6164
> [!NOTE]
6265
> The OpenID provider name can't contain a hyphen (-) because an app setting is created based on this name. The app setting doesn't support hyphens. Use an underscore (_) instead.
6366
>
67+
> It also requires that the `aud` scope in your token be the same as the **Client Id** as configured above. It is currently not possible to configure the allowed audiences for this provider at the moment.
68+
>
6469
> Azure requires `openid`, `profile`, and `email` scopes. Make sure that you configure your app registration in your ID provider with at least these scopes.
6570
6671
## <a name="related-content"> </a>Related content

0 commit comments

Comments
 (0)