Skip to content

Commit 7437719

Browse files
authored
Correcting code indentation for auto-numbering
1 parent df02661 commit 7437719

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
9999
1. Go to the Function Apps blade of the Azure portal, open your empty function app, then create a new In-Portal 'Webhook + API' function via the quickstart.
100100
1. Paste the sample code from below into Run.csx over the existing code that appears.
101101

102-
```csharp
102+
```csharp
103103

104104
using System.Net;
105105
using Microsoft.AspNetCore.Mvc;
@@ -120,7 +120,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
120120
3. Select “Integrate” from the left-hand blade, then select ‘Advanced Editor’ in the top-right-hand corner of the pane.
121121
4. Paste the sample code below over the existing json.
122122

123-
```json
123+
```json
124124
{
125125
"bindings": [
126126
{
@@ -140,7 +140,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
140140
}
141141
]
142142
}
143-
```
143+
```
144144

145145
5. Switch back to the HttpTrigger1 tab, click 'Get Function URL', then copy the URL that appears.
146146

@@ -213,7 +213,7 @@ You'll need to add CIDR formatted blocks of addresses to the IP restrictions pan
213213
1. Switch back to the design tab and choose “All APIs”, then click the code view button to show the policy editor.
214214
1. Edit the inbound section and paste the below xml so it reads like the following.
215215

216-
```xml
216+
```xml
217217
<inbound>
218218
<validate-jwt header-name="Authorization" failed-validation-httpcode="401" failed-validation-error-message="Unauthorized. Access token is missing or invalid.">
219219
<openid-config url="https://tenant.b2clogin.com/tenant.onmicrosoft.com/v2.0/.well-known/openid-configuration?p=B2C_1_MyDefaultPolicy" />
@@ -238,7 +238,7 @@ You'll need to add CIDR formatted blocks of addresses to the IP restrictions pan
238238
</expose-headers>
239239
</cors>
240240
</inbound>
241-
```
241+
```
242242
1. Edit the openid-config url to match your well-known Azure AD B2C endpoint for the sign up or sign in policy.
243243
1. Edit the claim value to match the valid application ID, also known as a client ID for the backend API application and save.
244244
1. Select the api operation below the "All APIs"
@@ -292,7 +292,7 @@ Now that the OAuth 2.0 user authorization is enabled on the `Echo API`, the Deve
292292
1. Still in the storage account blade, select the 'Blobs' blade from the Blob Service section and click on the $web container that appears in the right-hand pane.
293293
1. Save the code below to a file locally on your machine as index.html and then upload the file index.html to the $web container.
294294

295-
```html
295+
```html
296296
<!doctype html>
297297
<html lang="en">
298298
<head>
@@ -404,8 +404,8 @@ Now that the OAuth 2.0 user authorization is enabled on the `Echo API`, the Deve
404404
</script>
405405
</body>
406406
</html>
407-
408-
```
407+
408+
```
409409

410410
1. Browse to the Static Website Primary Endpoint you stored earlier in the last section.
411411

@@ -421,15 +421,15 @@ Now that the OAuth 2.0 user authorization is enabled on the `Echo API`, the Deve
421421
1. Create An APIM subscription key by heading to the API Management back to the API Management blade, selecting 'Subscriptions', and clicking 'Add Subscription' then saving the record. Clicking the Ellipsis (...) next to the created row will allow you to show the keys so you can copy the primary key.
422422
1. It should look something like the below code:-
423423

424-
```javascript
424+
```javascript
425425
var applicationConfig =
426426
clientID: "{aadb2c-clientid-goeshere}",
427427
authority: "https://{tenant}.b2clogin.com/{tenant}/{policy}",
428428
b2cScopes: ["https://{tenant}/{app}/{scope}"],
429429
webApi: 'http://{apim-url-for-your-function}',
430430
subKey: '{apim-subscription-key-goes-here}'
431431
};
432-
```
432+
```
433433

434434
1. Click Save
435435

0 commit comments

Comments
 (0)