You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/custom-extension-troubleshoot.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
3
3
titleSuffix: Microsoft identity platform
4
4
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
5
5
services: active-directory
6
-
author: yoelhor
6
+
author: davidmu1
7
7
manager: CelesteDG
8
8
9
9
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
44
44
45
45
To access the Azure AD sign-in logs:
46
46
47
-
1. Sign in to the [Azure portal](https://portal.azure.com).
48
-
1.In the**Enterprise apps**experience for your given application, select on the **Sign-in**logs tab.
49
-
1. Select the latest sign-in log.
47
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Select **Sign-in logs**, and then select the latest sign-in log.
50
50
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
51
51
52
52
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
89
89
90
90
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
91
91
92
-
1. Sign in to the [Azure portal](https://portal.azure.com)with your Azure administrator account.
93
-
1.Select **Azure Active Directory** > **App registrations**.
92
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93
+
1.Browse to **Identity** > **Applications** > **Application registrations**.
94
94
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
95
95
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
96
96
1. If you haven't created an app secret, follow these steps:
0 commit comments