Skip to content

Commit 61367f7

Browse files
committed
staged review
1 parent 8ba966a commit 61367f7

4 files changed

+10
-13
lines changed

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,12 @@ It's recommended that you configure each App Service app with its own registrati
3535
1. In the [Azure portal], navigate to your App Service app. In the left navigation, select **Authentication / Authorization**.
3636
2. If **Authentication / Authorization** is not enabled, select **On**.
3737
3. Select **Azure Active Directory**, and then select **Express** under **Management Mode**.
38-
4. Select **OK** to register the App Service app in Azure Active Directory. This creates a new app registration. If you want to choose an existing
39-
app registration instead, click **Select an existing app** and then search for the name of a previously created app registration within your tenant.
40-
Click the app registration to select it and click **OK**. Then click **OK** on the Azure Active Directory settings page.
41-
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
38+
4. Select **OK** to register the App Service app in Azure Active Directory. This creates a new app registration. If you want to choose an existing app registration instead, click **Select an existing app** and then search for the name of a previously created app registration within your tenant. Click the app registration to select it and click **OK**. Then click **OK** on the Azure Active Directory settings page.
39+
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
4240
5. (Optional) To restrict access to your app to only users authenticated by Azure Active Directory, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Azure Active Directory for authentication.
4341

44-
> [!CAUTION]
45-
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
46-
42+
> [!NOTE]
43+
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
4744
6. Click **Save**.
4845

4946
## <a name="advanced"> </a>Configure with advanced settings

articles/app-service/configure-authentication-provider-google.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This topic shows you how to configure Azure App Service to use Google as an auth
2626
To complete the procedure in this topic, you must have a Google account that has a verified email address. To create a new Google account, go to [accounts.google.com](https://go.microsoft.com/fwlink/p/?LinkId=268302).
2727

2828
## <a name="register"> </a>Register your application with Google
29-
2. Follow the Google documentation at [Google Sign-In for server-side apps](https://developers.google.com/identity/sign-in/web/server-side-flow) to create a client ID and client secret, with the following information (no need to make any code changes):
29+
1. Follow the Google documentation at [Google Sign-In for server-side apps](https://developers.google.com/identity/sign-in/web/server-side-flow) to create a client ID and client secret, with the following information (no need to make any code changes):
3030
- For **Authorized JavaScript Origins**, use `https://<app-name>.azurewebsites.net` with the name of your app in *\<app-name>*.
3131
- For **Authorized Redirect URI**, use `https://<app-name>.azurewebsites.net/.auth/login/google/callback`.
3232
1. Once the client ID and client secrets are created, copy their values.
@@ -43,9 +43,9 @@ To complete the procedure in this topic, you must have a Google account that has
4343
App Service provides authentication but does not restrict authorized access to your site content and APIs. For more information, see [Authorize or deny users](app-service-authentication-how-to.md#authorize-or-deny-users).
4444
4. (Optional) To restrict access to your site to only users authenticated by Google, set **Action to take when request is not authenticated** to **Google**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Google for authentication.
4545

46-
> [!CAUTION]
47-
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
48-
46+
> [!NOTE]
47+
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
48+
4949
5. Click **Save**.
5050

5151
You are now ready to use Google for authentication in your app.

articles/app-service/configure-authentication-provider-microsoft.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This topic shows you how to configure Azure App Service to use Microsoft Account
5858

5959
4. (Optional) To restrict access to Microsoft account users, set **Action to take when request is not authenticated** to **Log in with Microsoft Account**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Microsoft account for authentication.
6060

61-
> [!CAUTION]
61+
> [!NOTE]
6262
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
6363
6464
5. Click **Save**.

articles/app-service/configure-authentication-provider-twitter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To complete the procedure in this topic, you must have a Twitter account that ha
4848
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
4949
4. (Optional) To restrict access to your site to only users authenticated by Twitter, set **Action to take when request is not authenticated** to **Twitter**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Twitter for authentication.
5050

51-
> [!CAUTION]
51+
> [!NOTE]
5252
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
5353
5454
5. Click **Save**.

0 commit comments

Comments
 (0)