Skip to content

Commit 80ffa60

Browse files
Incprporated all the suggession after the review. Thanks
1 parent 08a5001 commit 80ffa60

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/container-apps/authentication-azure-active-directory.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This option is designed to make enabling authentication simple and requires just
2828

2929
A client secret is created and stored as a [secret](manage-secrets.md) in the container app.
3030

31-
1. If you're configuring the first identity provider for this application, you prompt to a **Container Apps authentication settings** section. Otherwise, you move on to the next step.
31+
1. If you're configuring the first identity provider for this application, you're prompted with a **Container Apps authentication settings** section. Otherwise, you move on to the next step.
3232

3333
These options determine how your application responds to unauthenticated requests, and the default selections redirect all requests to sign in with this new provider. You can customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
3434

@@ -39,7 +39,7 @@ You're now ready to use the Microsoft identity platform for authentication in yo
3939

4040
## <a name="entra-id-advanced"> </a>Option 2: Use an existing registration created separately
4141

42-
You can also manually register your application for the Microsoft identity platform, customizing the registration, and configuring Container Apps Authentication with the registration details. This approach is useful if you want to use an app registration from a different Microsoft Entra tenant other than the one your application is defined.
42+
You can also manually register your application for the Microsoft identity platform, customize the registration, and configure Container Apps Authentication with the registration details. This approach is useful when you want to use an app registration from a different Microsoft Entra tenant other than the one in which your application is defined.
4343

4444
### <a name="entra-id-register"> </a>Create an app registration in Microsoft Entra ID for your container app
4545

@@ -60,7 +60,7 @@ To register the app, perform the following steps:
6060
1. After the app registration is created, copy the **Application (client) ID** and the **Directory (tenant) ID** for later.
6161
1. Select **Authentication**. Under **Implicit grant and hybrid flows**, enable **ID tokens** to allow OpenID Connect user sign-ins from Container Apps. Select **Save**.
6262
1. (Optional) Select **Branding**. In **Home page URL**, enter the URL of your container app and select **Save**.
63-
1. Select **Expose an API**, and select **Set** next to *Application ID URI*. This value uniquely identifies the application when it used as a resource, allowing tokens to be requested that grant access. The value is also used as a prefix for scopes you create.
63+
1. Select **Expose an API**, and select **Set** next to *Application ID URI*. The ID value uniquely identifies your application when it's used as a resource, which allows requested tokens to grant access. The value is also used as a prefix for scopes you create.
6464

6565
For a single-tenant app, you can use the default value, which is in the form `api://<application-client-id>`. You can also specify a more readable URI like `https://contoso.com/api` based on one of the verified domains for your tenant. For a multitenant app, you must provide a custom URI. To learn more about accepted formats for App ID URIs, see the [app registrations best practices reference](../active-directory/develop/security-best-practices-for-app-registration.md#application-id-uri).
6666

@@ -71,7 +71,7 @@ To register the app, perform the following steps:
7171
1. In **Scope name**, enter *user_impersonation*.
7272
1. In the text boxes, enter the consent scope name and description you want users to see on the consent page. For example, enter *Access &lt;application-name&gt;*.
7373
1. Select **Add scope**.
74-
1. (Optional) To create a client secret, select **Certificates & secrets** > **Client secrets** > **New client secret**. Enter a description and expiration and select **Add**. Copy the client secret value shown in the page. It doesn't show again.
74+
1. (Optional) To create a client secret, select **Certificates & secrets** > **Client secrets** > **New client secret**. Enter a description and expiration and select **Add**. Copy the client secret value shown on the page as the site won't display it to you again.
7575
1. (Optional) To add multiple **Reply URLs**, select **Authentication**.
7676

7777
### <a name="entra-id-secrets"> </a>Enable Microsoft Entra ID in your container app
@@ -84,13 +84,13 @@ To register the app, perform the following steps:
8484
|Field|Description|
8585
|-|-|
8686
|Application (client) ID| Use the **Application (client) ID** of the app registration. |
87-
|Client Secret| Use the client secret you generated in the app registration. With a client secret, hybrid flow is used and the Container Apps returns access and refresh tokens. When the client secret isn't set, implicit flow is used and only an ID token is returned. The provider sends the tokens and stores in the EasyAuth token store.|
87+
|Client Secret| Use the client secret you generated in the app registration. With a client secret, hybrid flow is used and the app returns access and refresh tokens. When the client secret isn't set, implicit flow is used and only an ID token is returned. The provider sends the tokens and they're stored in the EasyAuth token store.|
8888
|Issuer Url| Use `<authentication-endpoint>/<TENANT-ID>/v2.0`, and replace *\<authentication-endpoint>* with the [authentication endpoint for your cloud environment](../active-directory/develop/authentication-national-cloud.md#azure-ad-authentication-endpoints) (for example, "https://login.microsoftonline.com" for global Azure), also replacing *\<TENANT-ID>* with the **Directory (tenant) ID** in which the app registration was created. This value is used to redirect users to the correct Microsoft Entra tenant, and to download the appropriate metadata to determine the appropriate token signing keys and token issuer claim value for example. For applications that use Azure AD v1, omit `/v2.0` in the URL.|
8989
|Allowed Token Audiences| The configured **Application (client) ID** is *always* implicitly considered to be an allowed audience. If this value refers to a cloud or server app and you want to accept authentication tokens from a client container app (the authentication token can be retrieved in the `X-MS-TOKEN-AAD-ID-TOKEN` header), add the **Application (client) ID** of the client app here. |
9090

9191
The client secret is stored as [secrets](manage-secrets.md) in your container app.
9292

93-
1. If this is the first identity provider configured for the application, you also be prompted with a **Container Apps authentication settings** section. Otherwise, you move on to the next step.
93+
1. If this is the first identity provider configured for the application, you're also prompted with a **Container Apps authentication settings** section. Otherwise, you move on to the next step.
9494

9595
These options determine how your application responds to unauthenticated requests, and the default selections will redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
9696

@@ -100,7 +100,7 @@ You're now ready to use the Microsoft identity platform for authentication in yo
100100

101101
## Configure client apps to access your container app
102102

103-
In the prior section, you registered your container app to authenticate users. This section explains to you how to register native client or daemon apps. They can then request access to APIs exposed by your container app on behalf of users or themselves. Completing the steps in this section isn't required if you only wish to authenticate users.
103+
In the prior section, you registered your container app to authenticate users. In this section, you register native client or daemon apps. They can then request access to APIs exposed by your container app on behalf of users or themselves. Completing the steps in this section isn't required if you only wish to authenticate users.
104104

105105
### Native client application
106106

@@ -118,7 +118,7 @@ You can register native clients to request access your container app's APIs on b
118118
1. Select the app registration you created earlier for your container app. If you don't see the app registration, make sure that you added the **user_impersonation** scope in [Create an app registration in Microsoft Entra ID for your container app](#entra-id-register).
119119
1. Under **Delegated permissions**, select **user_impersonation**, and then select **Add permissions**.
120120

121-
You configured a native client application that can request access your container app on behalf of a user.
121+
In this section, you configured a native client application that can request access your container app on behalf of a user.
122122

123123
### Daemon client application (service-to-service calls)
124124

@@ -129,9 +129,9 @@ Your application can acquire a token to call a Web API hosted in your container
129129
1. For a daemon application, you don't need a Redirect URI so you can keep that empty.
130130
1. Select **Create**.
131131
1. After the app registration is created, copy the value of **Application (client) ID**.
132-
1. Select **Certificates & secrets** > **New client secret** > **Add**. Copy the client secret value shown in the page. It doesn't show again.
132+
1. Select **Certificates & secrets** > **New client secret** > **Add**. Copy the client secret value shown in the page. It isn't shown again.
133133

134-
You can now [request an access token using the client ID and client secret](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#first-case-access-token-request-with-a-shared-secret) by setting the `resource` parameter to the **Application ID URI** of the target app. The resulting access token can then be presented to the target app using the standard [OAuth 2.0 Authorization header](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#use-a-token), and Container Apps Authentication / Authorization validates and uses the token as usual to now indicate that the caller (an application in this case, not a user) is authenticated.
134+
You can now [request an access token using the client ID and client secret](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#first-case-access-token-request-with-a-shared-secret) by setting the `resource` parameter to the **Application ID URI** of the target app. The resulting access token can then be presented to the target app using the standard [OAuth 2.0 Authorization header](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#use-a-token), and Container Apps Authentication / Authorization validates and uses the token as usual to indicate that the caller (an application in this case, not a user) is authenticated.
135135

136136
This process allows _any_ client application in your Microsoft Entra tenant to request an access token and authenticate to the target app. If you also want to enforce _authorization_ to allow only certain client applications, you must adjust the configuration.
137137

@@ -141,9 +141,9 @@ This process allows _any_ client application in your Microsoft Entra tenant to r
141141
1. Under **Application permissions**, select the App Role you created earlier, and then select **Add permissions**.
142142
1. Make sure to select **Grant admin consent** to authorize the client application to request the permission.
143143
1. Similar to the previous scenario (before any roles were added), you can now [request an access token](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#first-case-access-token-request-with-a-shared-secret) for the same target `resource`, and the access token includes a `roles` claim containing the App Roles that were authorized for the client application.
144-
1. Within the target Container Apps code, you can now validate that the expected roles are present in the token. The Container Apps auth layer doesn't perform the Validation steps. For more information, see [Access user claims](authentication.md#access-user-claims-in-application-code).
144+
1. Within the target Container Apps code, you can now validate that the expected roles are present in the token. The Container Apps auth layer doesn't perform the validation steps. For more information, see [Access user claims](authentication.md#access-user-claims-in-application-code).
145145

146-
Now you configured a daemon client application that can access your container app using its own identity.
146+
In this section, you configured a daemon client application that can access your container app using its own identity.
147147

148148
## Working with authenticated users
149149

0 commit comments

Comments
 (0)