You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-aad.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,15 +35,12 @@ It's recommended that you configure each App Service app with its own registrati
35
35
1. In the [Azure portal], navigate to your App Service app. In the left navigation, select **Authentication / Authorization**.
36
36
2. If **Authentication / Authorization** is not enabled, select **On**.
37
37
3. Select **Azure Active Directory**, and then select **Express** under **Management Mode**.
38
-
4. Select **OK** to register the App Service app in Azure Active Directory. This creates a new app registration. If you want to choose an existing
39
-
app registration instead, click **Select an existing app** and then search for the name of a previously created app registration within your tenant.
40
-
Click the app registration to select it and click **OK**. Then click **OK** on the Azure Active Directory settings page.
41
-
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
38
+
4. Select **OK** to register the App Service app in Azure Active Directory. This creates a new app registration. If you want to choose an existing app registration instead, click **Select an existing app** and then search for the name of a previously created app registration within your tenant. Click the app registration to select it and click **OK**. Then click **OK** on the Azure Active Directory settings page.
39
+
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
42
40
5. (Optional) To restrict access to your app to only users authenticated by Azure Active Directory, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Azure Active Directory for authentication.
43
41
44
-
> [!CAUTION]
45
-
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
46
-
42
+
> [!NOTE]
43
+
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
47
44
6. Click **Save**.
48
45
49
46
## <aname="advanced"> </a>Configure with advanced settings
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-google.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This topic shows you how to configure Azure App Service to use Google as an auth
26
26
To complete the procedure in this topic, you must have a Google account that has a verified email address. To create a new Google account, go to [accounts.google.com](https://go.microsoft.com/fwlink/p/?LinkId=268302).
27
27
28
28
## <aname="register"> </a>Register your application with Google
29
-
2. Follow the Google documentation at [Google Sign-In for server-side apps](https://developers.google.com/identity/sign-in/web/server-side-flow) to create a client ID and client secret, with the following information (no need to make any code changes):
29
+
1. Follow the Google documentation at [Google Sign-In for server-side apps](https://developers.google.com/identity/sign-in/web/server-side-flow) to create a client ID and client secret, with the following information (no need to make any code changes):
30
30
- For **Authorized JavaScript Origins**, use `https://<app-name>.azurewebsites.net` with the name of your app in *\<app-name>*.
31
31
- For **Authorized Redirect URI**, use `https://<app-name>.azurewebsites.net/.auth/login/google/callback`.
32
32
1. Once the client ID and client secrets are created, copy their values.
@@ -43,9 +43,9 @@ To complete the procedure in this topic, you must have a Google account that has
43
43
App Service provides authentication but does not restrict authorized access to your site content and APIs. For more information, see [Authorize or deny users](app-service-authentication-how-to.md#authorize-or-deny-users).
44
44
4. (Optional) To restrict access to your site to only users authenticated by Google, set **Action to take when request is not authenticated** to **Google**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Google for authentication.
45
45
46
-
> [!CAUTION]
47
-
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
48
-
46
+
> [!NOTE]
47
+
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
48
+
49
49
5. Click **Save**.
50
50
51
51
You are now ready to use Google for authentication in your app.
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-microsoft.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ This topic shows you how to configure Azure App Service to use Microsoft Account
58
58
59
59
4. (Optional) To restrict access to Microsoft account users, set **Action to take when request is not authenticated** to **Log in with Microsoft Account**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Microsoft account for authentication.
60
60
61
-
> [!CAUTION]
61
+
> [!NOTE]
62
62
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-twitter.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ To complete the procedure in this topic, you must have a Twitter account that ha
48
48
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
49
49
4. (Optional) To restrict access to your site to only users authenticated by Twitter, set **Action to take when request is not authenticated** to **Twitter**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Twitter for authentication.
50
50
51
-
> [!CAUTION]
51
+
> [!NOTE]
52
52
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
0 commit comments