Skip to content

Commit 96bd796

Browse files
authored
Update howto-protect-backend-frontend-azure-ad-b2c.md
PR review: Made changed reported by Acrolinx
1 parent edb540b commit 96bd796

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
3838
> * Import of an Azure Functions API into Azure API Management
3939
> * Securing the API in Azure API Management
4040
> * Calling the Azure Active Directory B2C Authorization Endpoints via the Microsoft identity platform Libraries (MSAL.js)
41-
> * Storing a HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
41+
> * Storing an HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
4242
4343
## Prerequisites
4444

@@ -72,7 +72,7 @@ Here's a quick overview of the steps:
7272
1. Test the Client Application
7373

7474
> [!TIP]
75-
> We're going to capture quite a few pieces of information and keys etc as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
75+
> We're going to capture quite a few pieces of information and keys etc. as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
7676
>
7777
> B2C BACKEND CLIENT ID:
7878
> B2C BACKEND CLIENT SECRET KEY:
@@ -176,7 +176,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
176176
1. Switch back to the Code + Test tab, click 'Get Function URL', then copy the URL that appears and save it for later.
177177

178178
> [!NOTE]
179-
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API, that is capable of returning a very simple payload.
179+
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API that is capable of returning a very simple payload.
180180
>
181181
> You can now test calling this API from a web browser using your version of the URL above that you just copied and saved. You can also remove the query string parameters "?code=secretkey" portion of the URL , and test again, to prove that Azure Functions will return a 401 error.
182182

0 commit comments

Comments
 (0)