Skip to content

Commit 701bb91

Browse files
Minor edits.
1 parent d00a98b commit 701bb91

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/app-service/tutorial-auth-aad.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ For more information, see [Configure Microsoft Entra authentication for your App
177177
:::image type="content" source="./media/tutorial-auth-aad/configure-auth-back-end.png" alt-text="Screenshot of the backend app's left menu showing Authentication/Authorization selected and settings selected in the right menu.":::
178178

179179
1. For the other values, accept the default settings and select **Add**.
180-
1. The **Authentication** page opens. Copy the **Client ID** of the Microsoft Entra application to Notepad. You need this value later.
180+
1. The **Authentication** page opens. Copy the client ID of the Microsoft Entra application to Notepad. You need this value later.
181181

182182
:::image type="content" source="./media/tutorial-auth-aad/get-application-id-back-end.png" alt-text="Screenshot of the Microsoft Entra Settings window showing the Microsoft Entra App, and the Microsoft Entra Applications window showing the Client ID to copy.":::
183183

@@ -234,7 +234,7 @@ az webapp auth set --resource-group myAuthResourceGroup --name <front-end-app-na
234234

235235
The commands add a `loginParameters` property with other custom scopes. Here's an explanation of the requested scopes:
236236

237-
- `openid` is requested by App Service by default already. For information, see [OpenID Connect Scopes](../active-directory/develop/v2-permissions-and-consent.md#openid-connect-scopes).
237+
- `openid` is requested by App Service by default already. For more information, see [OpenID Connect Scopes](../active-directory/develop/v2-permissions-and-consent.md#openid-connect-scopes).
238238
- [offline_access](../active-directory/develop/v2-permissions-and-consent.md#offline_access) is included here for convenience, in case you want to [refresh tokens](#what-happens-when-the-frontend-token-expires).
239239
- `api://<back-end-client-id>/user_impersonation` is an exposed API in your backend app registration. It's the scope that gives you a JWT that includes the backend app as a [token audience](https://wikipedia.org/wiki/JSON_Web_Token).
240240

@@ -409,7 +409,9 @@ Your access token expires after some time. For information on how to refresh you
409409

410410
### If I have a browser-based app on the frontend app, can it talk to the back end directly?
411411

412-
This approach requires the server code to pass the access token to the JavaScript code running in the client browser. Because there's no way to safeguard the access token in the browser, we don't recommend this approach. Currently, we recommend [the Backend-for-Frontend pattern](https://auth0.com/blog/the-backend-for-frontend-pattern-bff/). If applied to the example in this tutorial, the browser code on the frontend app would make API calls in an authenticated session to its server code as an intermediary. The server code on the frontend app would then make the API calls to the backend app by using the `x-ms-token-aad-access-token` header value as the bearer token. All calls from your browser code to the server code are protected by the authenticated session.
412+
This approach requires the server code to pass the access token to the JavaScript code running in the client browser. Because there's no way to safeguard the access token in the browser, we don't recommend this approach. Currently, we recommend [the Backend-for-Frontend pattern](https://auth0.com/blog/the-backend-for-frontend-pattern-bff/).
413+
414+
If applied to the example in this tutorial, the browser code on the frontend app would make API calls in an authenticated session to its server code as an intermediary. The server code on the frontend app would then make the API calls to the backend app by using the `x-ms-token-aad-access-token` header value as the bearer token. All calls from your browser code to the server code are protected by the authenticated session.
413415

414416
<a name="next"></a>
415417
## Next step

0 commit comments

Comments
 (0)