Skip to content

Commit 8bcd922

Browse files
author
Ryan Wike
committed
updates
1 parent dab816e commit 8bcd922

File tree

3 files changed

+18
-8
lines changed

3 files changed

+18
-8
lines changed

articles/app-service/includes/scenario-secure-app-clean-up-resources.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: web-apps
1515
#Customer intent: As an application developer, I want to learn how to access Azure Storage for an app using managed identities.
1616
---
1717

18-
If you completed all the steps in this multipart tutorial, you created an app service, app service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
18+
If you completed all the steps in this multipart tutorial, you created an App Service, App Service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. If you chose external configuration, you may have created a new external tenant. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
1919

2020
In this tutorial, you learn how to:
2121

@@ -25,7 +25,7 @@ In this tutorial, you learn how to:
2525
2626
### Delete the resource group
2727

28-
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your app service and app service plan.
28+
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your App Service and App Service plan.
2929

3030
Select **Delete resource group** to delete the resource group and all the resources.
3131

@@ -40,3 +40,13 @@ In the [Microsoft Entra admin center](https://entra.microsoft.com), select **App
4040

4141
In the app registration overview, select **Delete**.
4242
:::image type="content" alt-text="Screenshot that shows deleting the app registration." source="../media/scenario-secure-app-clean-up-resources/delete-app-registration.png":::
43+
44+
### Delete the external tenant
45+
46+
In to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Manage tenants**.
47+
48+
Select the tenant you want to delete, and then select **Delete**.
49+
50+
You might need to complete required actions before you can delete the tenant. For example, you might need to delete all user flows and app registrations in the tenant.
51+
52+
If you're ready to delete the tenant, select **Delete**.

articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Now that you have a web app running on App Service, enable authentication and au
5555

5656
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
5757

58-
1. Add a **Name** for the app registration, a public facing display name.
58+
1. Enter a display **Name** for your application. Users of your application might see the display name when they use the app, for example during sign-in.
5959

6060
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
6161

@@ -93,7 +93,7 @@ Now that you have a web app running on App Service, enable authentication and au
9393

9494
1. Select **Create new app registration** to create a new app registration.
9595

96-
1. Click **Create new** to create a new [customer (external) tenant](/entra/external-id/customers/quickstart-tenant-setup), or select an existing tenant to use.
96+
1. Click **Create new** to create a new [external tenant](/entra/external-id/customers/quickstart-tenant-setup), or select an existing tenant to use.
9797

9898
:::image type="content" alt-text="Screenshot that shows the Select a tenent dropdown." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-select.png":::
9999

@@ -121,9 +121,9 @@ Now that you have a web app running on App Service, enable authentication and au
121121

122122
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
123123

124-
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
124+
1. Select **Configure** in the **Review** tab to confirm external tenant update.
125125

126-
1. The browser opens **Add an identity provider**.
126+
1. The browser returns to the **Add an identity provider** page.
127127

128128
1. In the **Additional checks** section, select:
129129

@@ -143,9 +143,9 @@ Now that you have a web app running on App Service, enable authentication and au
143143

144144
## 4. Verify limited access to the web app
145145

146-
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or customer (external) tenant. The app registration has the same display name as your web app.
146+
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or external tenant. The app registration has the display name you created in a previous step.
147147

148-
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If necessary, use the **Settings** icon in the top menu to switch to the customer (external) tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
148+
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If you chose external configuration, use the **Settings** icon in the top menu to switch to the external tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
149149

150150
1. Browse to **Identity** > **Applications** > **App registrations** and select **Applications** > **App registrations** from the menu.
151151
1. Select the app registration that was created.
101 KB
Loading

0 commit comments

Comments
 (0)