You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad.md
+2-8Lines changed: 2 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Learn how to enable user sign-in to the API Management developer po
6
6
author: dlepow
7
7
ms.service: azure-api-management
8
8
ms.topic: article
9
-
ms.date: 09/18/2024
9
+
ms.date: 09/19/2024
10
10
ms.author: danlep
11
11
ms.custom: engagement-fy23, devx-track-azurecli
12
12
---
@@ -110,18 +110,12 @@ After the Microsoft Entra provider is enabled:
110
110
1. In the **Add identity provider** pane's **Allowed tenants** field, specify the Microsoft Entra instance's domains to which you want to grant access to the API Management service instance APIs.
111
111
* You can separate multiple domains with newlines, spaces, or commas.
112
112
113
-
> [!NOTE]
114
-
> You can specify multiple domains in the **Allowed Tenants** section. A global administrator must grant the application access to directory data before users can sign in from a different domain than the original app registration domain. To grant permission, the global administrator should:
115
-
> 1. Go to `https://<URL of your developer portal>/aadadminconsent` (for example, `https://contoso.developer.azure-api.net/aadadminconsent`).
116
-
> 1. Enter the domain name of the Microsoft Entra tenant to which they want to grant access.
117
-
> 1. Select **Submit**.
118
-
119
113
1. After you specify the desired configuration, select **Add**.
120
114
1. Republish the developer portal for the Microsoft Entra configuration to take effect. In the left menu, under **Developer portal**, select **Portal overview** > **Publish**.
121
115
122
116
After the Microsoft Entra provider is enabled:
123
117
124
-
* Users in the specified Microsoft Entra instance can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
118
+
* Users in the specified Microsoft Entra tenant(s) can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
125
119
* You can manage the Microsoft Entra configuration on the **Developer portal** > **Identities** page in the portal.
126
120
* Optionally configure other sign-in settings by selecting **Identities** > **Settings**. For example, you might want to redirect anonymous users to the sign-in page.
127
121
* Republish the developer portal after any configuration change.
0 commit comments