You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/includes/scenario-secure-app-clean-up-resources.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.subservice: web-apps
15
15
#Customer intent: As an application developer, I want to learn how to access Azure Storage for an app using managed identities.
16
16
---
17
17
18
-
If you completed all the steps in this multipart tutorial, you created an app service, app service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
18
+
If you completed all the steps in this multipart tutorial, you created an App Service, App Service hosting plan, and a storage account in a resource group. You also created an app registration in Microsoft Entra ID. If you chose external configuration, you may have created a new external tenant. When no longer needed, delete these resources and app registration so that you don't continue to accrue charges.
19
19
20
20
In this tutorial, you learn how to:
21
21
@@ -25,7 +25,7 @@ In this tutorial, you learn how to:
25
25
26
26
### Delete the resource group
27
27
28
-
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your app service and app service plan.
28
+
In the [Azure portal](https://portal.azure.com), select **Resource groups** from the portal menu and select the resource group that contains your App Service and App Service plan.
29
29
30
30
Select **Delete resource group** to delete the resource group and all the resources.
31
31
@@ -40,3 +40,13 @@ In the [Microsoft Entra admin center](https://entra.microsoft.com), select **App
40
40
41
41
In the app registration overview, select **Delete**.
42
42
:::image type="content" alt-text="Screenshot that shows deleting the app registration." source="../media/scenario-secure-app-clean-up-resources/delete-app-registration.png":::
43
+
44
+
### Delete the external tenant
45
+
46
+
In to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Manage tenants**.
47
+
48
+
Select the tenant you want to delete, and then select **Delete**.
49
+
50
+
You might need to complete required actions before you can delete the tenant. For example, you might need to delete all user flows and app registrations in the tenant.
51
+
52
+
If you're ready to delete the tenant, select **Delete**.
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Now that you have a web app running on App Service, enable authentication and au
55
55
56
56
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
57
57
58
-
1.Add a **Name** for the app registration, a public facing display name.
58
+
1.Enter a display **Name** for your application. Users of your application might see the display name when they use the app, for example during sign-in.
59
59
60
60
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
61
61
@@ -93,7 +93,7 @@ Now that you have a web app running on App Service, enable authentication and au
93
93
94
94
1. Select **Create new app registration** to create a new app registration.
95
95
96
-
1. Click **Create new** to create a new [customer (external) tenant](/entra/external-id/customers/quickstart-tenant-setup), or select an existing tenant to use.
96
+
1. Click **Create new** to create a new [external tenant](/entra/external-id/customers/quickstart-tenant-setup), or select an existing tenant to use.
97
97
98
98
:::image type="content" alt-text="Screenshot that shows the Select a tenent dropdown." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-select.png":::
99
99
@@ -121,9 +121,9 @@ Now that you have a web app running on App Service, enable authentication and au
121
121
122
122
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
123
123
124
-
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
124
+
1. Select **Configure** in the **Review** tab to confirm external tenant update.
125
125
126
-
1. The browser opens **Add an identity provider**.
126
+
1. The browser returns to the **Add an identity provider** page.
127
127
128
128
1. In the **Additional checks** section, select:
129
129
@@ -143,9 +143,9 @@ Now that you have a web app running on App Service, enable authentication and au
143
143
144
144
## 4. Verify limited access to the web app
145
145
146
-
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or customer (external) tenant. The app registration has the same display name as your web app.
146
+
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or external tenant. The app registration has the display name you created in a previous step.
147
147
148
-
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If necessary, use the **Settings** icon in the top menu to switch to the customer (external) tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
148
+
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If you chose external configuration, use the **Settings** icon in the top menu to switch to the external tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
149
149
150
150
1. Browse to **Identity** > **Applications** > **App registrations** and select **Applications** > **App registrations** from the menu.
0 commit comments