You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
38
38
> * Import of an Azure Functions API into Azure API Management
39
39
> * Securing the API in Azure API Management
40
40
> * Calling the Azure Active Directory B2C Authorization Endpoints via the Microsoft identity platform Libraries (MSAL.js)
41
-
> * Storing a HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
41
+
> * Storing an HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
42
42
43
43
## Prerequisites
44
44
@@ -72,7 +72,7 @@ Here's a quick overview of the steps:
72
72
1. Test the Client Application
73
73
74
74
> [!TIP]
75
-
> We're going to capture quite a few pieces of information and keys etc as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
75
+
> We're going to capture quite a few pieces of information and keys etc. as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
76
76
>
77
77
> B2C BACKEND CLIENT ID:
78
78
> B2C BACKEND CLIENT SECRET KEY:
@@ -176,7 +176,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
176
176
1. Switch back to the Code + Test tab, click 'Get Function URL', then copy the URL that appears and save it for later.
177
177
178
178
> [!NOTE]
179
-
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API, that is capable of returning a very simple payload.
179
+
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API that is capable of returning a very simple payload.
180
180
>
181
181
> You can now test calling this API from a web browser using your version of the URL above that you just copied and saved. You can also remove the query string parameters "?code=secretkey" portion of the URL , and test again, to prove that Azure Functions will return a 401 error.
0 commit comments