Skip to content

Commit 78e29cf

Browse files
Merge pull request #286968 from dlepow/ropc3
[APIM] Update to Entra auth to dev portal
2 parents 864e290 + b34a695 commit 78e29cf

File tree

2 files changed

+6
-23
lines changed

2 files changed

+6
-23
lines changed

articles/api-management/api-management-howto-aad.md

Lines changed: 6 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Learn how to enable user sign-in to the API Management developer po
66
author: dlepow
77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 12/08/2023
9+
ms.date: 09/19/2024
1010
ms.author: danlep
1111
ms.custom: engagement-fy23, devx-track-azurecli
1212
---
@@ -76,14 +76,7 @@ After the Microsoft Entra provider is enabled:
7676
1. Save the **Redirect URL** for later.
7777

7878
:::image type="content" source="media/api-management-howto-aad/api-management-with-aad001.png" alt-text="Screenshot of adding identity provider in Azure portal.":::
79-
80-
> [!NOTE]
81-
> There are two redirect URLs:<br/>
82-
> * **Redirect URL** points to the latest developer portal of the API Management.
83-
> * **Redirect URL (deprecated portal)** points to the deprecated developer portal of API Management.
84-
>
85-
> We recommended you use the latest developer portal Redirect URL.
86-
79+
8780
1. In your browser, open the Azure portal in a new tab.
8881
1. Navigate to [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) to register an app in Active Directory.
8982
1. Select **New registration**. On the **Register an application** page, set the values as follows:
@@ -104,9 +97,6 @@ After the Microsoft Entra provider is enabled:
10497
* Select any option for **Expires**.
10598
* Choose **Add**.
10699
1. Copy the client **Secret value** before leaving the page. You will need it later.
107-
1. Under **Manage** in the side menu, select **Authentication**.
108-
1. Under the **Implicit grant and hybrid flows** section, select the **ID tokens** checkbox.
109-
1. Select **Save**.
110100
1. Under **Manage** in the side menu, select **Token configuration** > **+ Add optional claim**.
111101
1. In **Token type**, select **ID**.
112102
1. Select (check) the following claims: **email**, **family_name**, **given_name**.
@@ -117,21 +107,14 @@ After the Microsoft Entra provider is enabled:
117107
> [!IMPORTANT]
118108
> Update the **Client secret** before the key expires.
119109
120-
1. In the **Add identity provider** pane's **Allowed tenants** field, specify the Microsoft Entra instance's domains to which you want to grant access to the API Management service instance APIs.
121-
* You can separate multiple domains with newlines, spaces, or commas.
122-
123-
> [!NOTE]
124-
> You can specify multiple domains in the **Allowed Tenants** section. A global administration must grant the application access to directory data before users can sign in from a different domain than the original app registration domain. To grant permission, the global administrator should:
125-
> 1. Go to `https://<URL of your developer portal>/aadadminconsent` (for example, `https://contoso.portal.azure-api.net/aadadminconsent`).
126-
> 1. Enter the domain name of the Microsoft Entra tenant to which they want to grant access.
127-
> 1. Select **Submit**.
128-
110+
1. In **Signin tenant**, specify a tenant name or ID to use for sign-in to Microsoft Entra. If no value is specified, the Common endpoint is used.
111+
1. In **Allowed tenants**, add specific Microsoft Entra tenant names or IDs for sign-in to Microsoft Entra.
129112
1. After you specify the desired configuration, select **Add**.
130113
1. Republish the developer portal for the Microsoft Entra configuration to take effect. In the left menu, under **Developer portal**, select **Portal overview** > **Publish**.
131114

132115
After the Microsoft Entra provider is enabled:
133116

134-
* Users in the specified Microsoft Entra instance can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
117+
* Users in the specified Microsoft Entra tenant(s) can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
135118
* You can manage the Microsoft Entra configuration on the **Developer portal** > **Identities** page in the portal.
136119
* Optionally configure other sign-in settings by selecting **Identities** > **Settings**. For example, you might want to redirect anonymous users to the sign-in page.
137120
* Republish the developer portal after any configuration change.
@@ -160,7 +143,7 @@ For steps, see [Switch redirect URIs to the single-page application type](../act
160143
## Add an external Microsoft Entra group
161144

162145
Now that you've enabled access for users in a Microsoft Entra tenant, you can:
163-
* Add Microsoft Entra groups into API Management.
146+
* Add Microsoft Entra groups into API Management. Groups added must be in the tenant where your API Management instance is deployed.
164147
* Control product visibility using Microsoft Entra groups.
165148

166149
1. Navigate to the App Registration page for the application you registered in [the previous section](#enable-user-sign-in-using-azure-ad---portal).
-21.1 KB
Loading

0 commit comments

Comments
 (0)