Skip to content

Commit 90df31d

Browse files
authored
Merge pull request #209992 from zackliu/signalrmsi
Update aad in function
2 parents 9d33598 + d9fddba commit 90df31d

File tree

2 files changed

+5
-7
lines changed

2 files changed

+5
-7
lines changed

articles/azure-signalr/howto-use-managed-identity.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,23 +79,21 @@ We provide libraries and code samples that show how to handle token validation.
7979

8080
Setting access token validation in Function App is easy and efficient without code works.
8181

82-
1. In the **Authentication (classic)** page, switch **App Service Authentication** to **On**.
82+
1. In the **Authentication** page, click **Add identity provider**
8383

8484
2. Select **Log in with Azure Active Directory** in **Action to take when request is not authenticated**.
8585

86-
3. In the Authentication Provider, click into **Azure Active Directory**
87-
88-
4. In the new page. Select **Express** and **Create New AD App** and then click **OK**
86+
3. Select **Microsoft** in the identity provider dropdown. The option to create a new registration is selected by default. You can change the name of the registration. For more details on enabling Azure AD provider, please refer to [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md)
8987
:::image type="content" source="media/signalr-howto-use-managed-identity/function-aad.png" alt-text="Function Aad":::
9088

91-
5. Navigate to SignalR Service and follow [steps](howto-use-managed-identity.md#add-a-system-assigned-identity) to add a system-assigned identity or user-assigned identity.
89+
4. Navigate to SignalR Service and follow [steps](howto-use-managed-identity.md#add-a-system-assigned-identity) to add a system-assigned identity or user-assigned identity.
9290

93-
6. Get into **Upstream settings** in SignalR Service and choose **Use Managed Identity** and **Select from existing Applications**. Select the application you created previously.
91+
5. Get into **Upstream settings** in SignalR Service and choose **Use Managed Identity** and **Select from existing Applications**. Select the application you created previously.
9492

9593
After these settings, the Function App will reject requests without an access token in the header.
9694

9795
> [!Important]
98-
> To pass the authentication, the *Issuer Url* must match the *iss* claim in token. Currently, we only support v1 endpoint (see [v1.0 and v2.0](../active-directory/develop/access-tokens.md)), so the *Issuer Url* should look like `https://sts.windows.net/<tenant-id>/`. Check the *Issuer Url* configured in Azure Function. For **Authentication**, go to *Identity provider* -> *Edit* -> *Issuer Url* and for **Authentication (classic)**, go to *Azure Active Directory* -> *Advanced* -> *Issuer Url*
96+
> To pass the authentication, the *Issuer Url* must match the *iss* claim in token. Currently, we only support v1 endpoint (see [v1.0 and v2.0](../active-directory/develop/access-tokens.md)), so the *Issuer Url* should look like `https://sts.windows.net/<tenant-id>/`. Check the *Issuer Url* configured in Azure Function. For **Authentication**, go to *Identity provider* -> *Edit* -> *Issuer Url*
9997
10098

10199
## Use a managed identity for Key Vault reference
110 KB
Loading

0 commit comments

Comments
 (0)