Skip to content

Commit 5c8f30b

Browse files
Merge pull request #279646 from craigshoemaker/patch-10
[Static Web Apps] Update: Authentication authorization -> change restricted provider
2 parents aada652 + f95628d commit 5c8f30b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/static-web-apps/authentication-authorization.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
description: Learn to use different authorization providers to secure your Azure Static Web Apps.
66
author: craigshoemaker
77
ms.author: cshoe
8-
ms.date: 06/24/2024
8+
ms.date: 06/28/2024
99
ms.service: static-web-apps
1010
ms.topic: how-to
1111
ms.custom:
@@ -118,11 +118,11 @@ procedureSection:
118118
119119
By default, all authentication providers are enabled, but you may want to restrict your app from using a provider. For instance, your app may want to only use [providers that expose email addresses](authentication-custom.md#create-an-invitation).
120120
121-
To block a provider, create a [route rule](configuration.md#routes) to return a `404` status code for requests to the blocked provider-specific route. For example, to restrict X (formerly Twitter) as provider, add the following route rule.
121+
To block a provider, create a [route rule](configuration.md#routes) to return a `404` status code for requests to the blocked provider-specific route. For example, to restrict Entra ID (formerly Azure Active Directory, known as "aad") provider, add the following route rule.
122122
code: |
123123
```json
124124
{
125-
"route": "/.auth/login/twitter",
125+
"route": "/.auth/login/aad",
126126
"statusCode": 404
127127
}
128128
```

0 commit comments

Comments
 (0)