Skip to content

Commit 8e42a81

Browse files
authored
Merge pull request #268873 from rwike77/externalid
updates for external id
2 parents 2b88dab + ef67547 commit 8e42a81

10 files changed

+105
-37
lines changed

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ During creation of the app registration, collect the following information which
6363
- Client secret (optional, but recommended)
6464
- Application ID URI
6565

66-
The instructions for creating an app registration depend on if you're using [a workforce tenant](../active-directory/fundamentals/active-directory-whatis.md) or [a customer tenant (Preview)][Azure Active Directory for customers (Preview)]. Use the tabs below to select the right set of instructions for your scenario.
66+
The instructions for creating an app registration depend on if you're using [a workforce tenant](../active-directory/fundamentals/active-directory-whatis.md) or [a customer tenant][Azure Active Directory for customers (Preview)]. Use the tabs below to select the right set of instructions for your scenario.
6767

6868
To register the app, perform the following steps:
6969

@@ -74,7 +74,7 @@ To register the app, perform the following steps:
7474

7575
From the portal menu, select **Microsoft Entra ID**. If the tenant you're using is different from the one you use to configure the App Service application, you'll need to [change directories][Switch your directory] first.
7676

77-
# [Customer tenant (Preview)](#tab/customer-tenant)
77+
# [Customer tenant](#tab/customer-tenant)
7878

7979
1. If you do not already have a customer tenant, create one by following the instructions in [Create a customer identity and access management (CIAM) tenant](../active-directory/external-identities/customers/how-to-create-customer-tenant-portal.md).
8080

@@ -117,7 +117,7 @@ To register the app, perform the following steps:
117117

118118
No other steps are required for a workforce tenant.
119119

120-
# [Customer tenant (Preview)](#tab/customer-tenant)
120+
# [Customer tenant](#tab/customer-tenant)
121121

122122
1. Create a user flow, which defines an authentication experience that can be shared across app registrations in the tenant:
123123

@@ -156,7 +156,7 @@ To register the app, perform the following steps:
156156

157157
The **authentication endpoint** for a workforce tenant should be a [value specific to the cloud environment](../active-directory/develop/authentication-national-cloud.md#azure-ad-authentication-endpoints). For example, a workforce tenant in global Azure would use "https://login.microsoftonline.com" as its authentication endpoint. Make note of the authentication endpoint value, as it's needed to construct the right **Issuer URL**.
158158

159-
# [Customer tenant (Preview)](#tab/customer-tenant)
159+
# [Customer tenant](#tab/customer-tenant)
160160

161161
For a customer tenant, you must manually fill in the configuration values according to the following table.
162162

articles/app-service/identity-scenarios.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rwike77
55
manager: CelesteDG
66
ms.author: ryanwi
77
ms.topic: conceptual
8-
ms.date: 10/31/2023
8+
ms.date: 03/14/2024
99
ms.custom: AppServiceIdentity
1010
---
1111
# Authentication scenarios and recommendations
@@ -15,8 +15,8 @@ If you have a web app or an API running in Azure App Service, you can restrict a
1515
## Authentication solutions
1616

1717
- **Azure App Service built-in authentication** - Allows you to sign users in and access data by writing minimal or no code in your web app, RESTful API, or mobile back end. It’s built directly into the platform and doesn’t require any particular language, library, security expertise, or even any code to use.
18-
- **Microsoft Authentication Library (MSAL)** - Enables developers to acquire security tokens from the Microsoft identity platform to authenticate users and access secured web APIs. Available for multiple supported platforms and frameworks, these are general purpose libraries that can be used in various hosted environments. Developers can also integrate with multiple sign-in providers, like Microsoft Entra ID, Facebook, Google, Twitter.
19-
- **Microsoft.Identity.Web** - A higher-level library wrapping MSAL.NET, it provides a set of ASP.NET Core abstractions that simplify adding authentication support to web apps and web APIs integrating with the Microsoft identity platform. It provides a single-surface API convenience layer that ties together ASP.NET Core, its authentication middleware, and MSAL.NET. This library can be used in apps in various hosted environments. You can integrate with multiple sign-in providers, like Microsoft Entra ID, Facebook, Google, Twitter.
18+
- **Microsoft Authentication Library (MSAL)** - Enables developers to acquire security tokens from the Microsoft identity platform to authenticate users and access secured web APIs. Available for multiple supported platforms and frameworks, these are general purpose libraries that can be used in various hosted environments. Developers can also integrate with multiple sign-in providers, like Microsoft Entra, Facebook, Google, Twitter.
19+
- **Microsoft.Identity.Web** - A higher-level library wrapping MSAL.NET, it provides a set of ASP.NET Core abstractions that simplify adding authentication support to web apps and web APIs integrating with the Microsoft identity platform. It provides a single-surface API convenience layer that ties together ASP.NET Core, its authentication middleware, and MSAL.NET. This library can be used in apps in various hosted environments. You can integrate with multiple sign-in providers, like Microsoft Entra, Facebook, Google, Twitter.
2020

2121
## Scenario recommendations
2222

articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md

Lines changed: 72 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77

88
ms.service: app-service
99
ms.topic: include
10-
ms.date: 02/25/2022
10+
ms.date: 03/12/2024
1111
ms.author: ryanwi
1212
ms.reviewer: stsoneff
1313
ms.custom: azureday1
@@ -37,29 +37,31 @@ You need these names throughout this tutorial.
3737

3838
## 3. Configure authentication and authorization
3939

40-
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra ID as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
40+
Now that you have a web app running on App Service, enable authentication and authorization. You use Microsoft Entra as the identity provider. For more information, see [Configure Microsoft Entra authentication for your App Service application](../../configure-authentication-provider-aad.md).
41+
42+
# [Workforce configuration](#tab/workforce-configuration)
4143

4244
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
4345

4446
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
4547

4648
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
4749

48-
1. On your app's left menu, select **Authentication**, and then click **Add identity provider**.
50+
1. On your app's left menu, select **Authentication**, and then select **Add identity provider**.
4951

50-
1. In the **Add an identity provider** page, for example select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
52+
1. In the **Add an identity provider** page, select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
5153

52-
1. Select a **Tenant type**, for example **Workforce** for work and school accounts or Microsoft accounts.
54+
1. For **Tenant type**, select **Workforce configuration (current tenant)** for employees and business guests.
5355

54-
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra ID.
56+
1. For **App registration** > **App registration type**, select **Create new app registration** to create a new app registration in Microsoft Entra.
5557

5658
1. Add a **Name** for the app registration, a public facing display name.
5759

5860
1. For **App registration** > **Supported account types**, select **Current tenant-single tenant** so only users in your organization can sign in to the web app.
5961

6062
1. In the **App Service authentication settings** section, leave **Authentication** set to **Require authentication** and **Unauthenticated requests** set to **HTTP 302 Found redirect: recommended for websites**.
6163

62-
1. At the bottom of the **Add an identity provider** page, click **Add** to enable authentication for your web app.
64+
1. At the bottom of the **Add an identity provider** page, select **Add** to enable authentication for your web app.
6365

6466
:::image type="content" alt-text="Screenshot that shows configuring authentication." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication.png":::
6567

@@ -69,15 +71,75 @@ Now that you have a web app running on App Service, enable authentication and au
6971
> To allow accounts from other tenants, change the 'Issuer URL' to 'https://login.microsoftonline.com/common/v2.0' by editing your 'Identity Provider' from the 'Authentication' blade.
7072
>
7173
74+
# [External configuration](#tab/external-configuration)
75+
76+
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups**, or search for and select **Resource groups** from any page.
77+
78+
1. In **Resource groups**, find and select your resource group. In **Overview**, select your app's management page.
79+
80+
:::image type="content" alt-text="Screenshot that shows selecting your app's management page." source="../../media/scenario-secure-app-authentication-app-service/select-app-service.png":::
81+
82+
1. On your app's left menu, select **Authentication**, and then select **Add identity provider**.
83+
84+
1. In the **Add an identity provider** page, select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
85+
86+
1. For **Tenant type**, select **External configuration** for external users.
87+
88+
1. Select **Create new app registration** to create a new app registration and select the [customer (external) tenant](/entra/external-id/customers/quickstart-tenant-setup) you want to use.
89+
90+
1. Select **Configure** to configure external authentication.
91+
92+
:::image type="content" alt-text="Screenshot that shows the Add an identity provider page." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external.png":::
93+
94+
1. The browser opens **Configure customer authentication**. In **Setup sign-in**, select **Create new** to create a sign-in experience for your external users.
95+
96+
1. Enter a **Name** for the user flow.
97+
98+
1. For this quickstart, select **Email and password** which allows new users to sign up and sign in using an email address as the sign-in name and a password as their first factor credential.
99+
100+
1. Select **Create** to create the user flow.
101+
102+
:::image type="content" alt-text="Screenshot that shows creating a user flow." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-user-flow.png":::
103+
104+
1. Select **Next** to customize branding.
105+
106+
1. Add your company logo, select a background color, and select a sign-in layout.
107+
108+
:::image type="content" alt-text="Screenshot that shows the customize branding tab." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-branding.png":::
109+
110+
1. Select **Next** and **Yes, update the changes** to accept the branding changes.
111+
112+
1. Select **Configure** in the **Review** tab to confirm External ID (CIAM) tenant update.
113+
114+
1. The browser opens **Add an identity provider**.
115+
116+
1. In the **App Service authentication settings** section, select:
117+
118+
- **Allow requests only from this application itself** for **Client application requirement**
119+
- **Allow requests from any identity** for **Identity requirement**
120+
- **Allow requests only from the issuer tenant** for **Tenant requirement**
121+
122+
1. In the **App Service authentication settings** section, set:
123+
- **Require authentication** for **Authentication**
124+
- **HTTP 302 Found redirect: recommended for websites** for **Unauthenticated requests**
125+
- **Token store** box
126+
127+
1. At the bottom of the **Add an identity provider** page, select **Add** to enable authentication for your web app.
128+
129+
:::image type="content" alt-text="Screenshot that shows the Additional checks and authentication settings sections." source="../../media/scenario-secure-app-authentication-app-service/configure-authentication-external-enable.png":::
130+
---
131+
72132
## 4. Verify limited access to the web app
73133

74-
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your Microsoft Entra tenant. The app registration has the same display name as your web app.
134+
When you enabled the App Service authentication/authorization module in the previous section, an app registration was created in your workforce or customer (external) tenant. The app registration has the same display name as your web app.
135+
136+
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer). If necessary, use the **Settings** icon in the top menu to switch to the customer (external) tenant with your web app from the **Directories** + **subscriptions** menu. When you are in the correct tenant:
75137

76-
1. To check the settings, go to the [Microsoft Entra admin center](https://entra.microsoft.com) and select **Applications** and then **App registrations** from the menu.
138+
1. Browse to **Identity** > **Applications** > **App registrations** and select **Applications** > **App registrations** from the menu.
77139
1. Select the app registration that was created.
78140
1. In the overview, verify that **Supported account types** is set to **My organization only**.
79141

80-
1. To verify that access to your app is limited to users in your organization, got to your web app **Overview** and select the **Default domain** link. Or, start a browser in incognito or private mode and go to `https://<app-name>.azurewebsites.net`.
142+
1. To verify that access to your app is limited to users in your organization, go to your web app **Overview** and select the **Default domain** link. Or, start a browser in incognito or private mode and go to `https://<app-name>.azurewebsites.net`.
81143

82144
:::image type="content" alt-text="Screenshot that shows verifying access." source="../../media/scenario-secure-app-authentication-app-service/verify-access.png":::
83145

articles/app-service/includes/tutorial-set-up-app-service-authentication/intro.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,18 @@ In this tutorial, you learn how to:
2222
> [!div class="checklist"]
2323
>
2424
> * Configure authentication for the web app.
25-
> * Limit access to the web app to users in your organization by using Microsoft Entra ID as the identity provider.
25+
> * Limit access to the web app to users in your organization by using Microsoft Entra as the identity provider.
2626
2727
## Automatic authentication provided by App Service
2828

29-
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you are ready for custom authentication and authorization, you build on this architecture.
29+
App Service provides built-in authentication and authorization support, so you can sign in users with no code in your web app. Using the optional App Service authentication/authorization module simplifies authentication and authorization for your app. When you're ready for custom authentication and authorization, you build on this architecture.
3030

3131
App service authentication provides:
3232

3333
* Easily turn on and configure through the Azure portal and app settings.
3434
* No SDKs, specific languages, or changes to application code are required.​
3535
* Several identity providers are supported:
36-
* Microsoft Entra ID
36+
* Microsoft Entra
3737
* Microsoft Account
3838
* Facebook
3939
* Google
105 KB
Loading
Loading
Loading
103 KB
Loading

0 commit comments

Comments
 (0)