Skip to content

Commit b02e7ae

Browse files
Merge pull request #249732 from davidmu1/updatesteps14
updated sign-in steps for admin center
2 parents 7b94251 + ff60719 commit b02e7ae

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
33
titleSuffix: Microsoft identity platform
44
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
4444

4545
To access the Azure AD sign-in logs:
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
49-
1. Select the latest sign-in log.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
48+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
49+
1. Select **Sign-in logs**, and then select the latest sign-in log.
5050
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
5151

5252
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
8989

9090
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
9191

92-
1. Sign in to the [Azure portal](https://portal.azure.com) with your Azure administrator account.
93-
1. Select **Azure Active Directory** > **App registrations**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93+
1. Browse to **Identity** > **Applications** > **Application registrations**.
9494
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
9595
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
9696
1. If you haven't created an app secret, follow these steps:

0 commit comments

Comments
 (0)