Skip to content

Commit b402177

Browse files
author
Connor McMahon
authored
Update configure-authentication-provider-microsoft.md
The old microsoft account identity provider only works with the old Microsoft Account identity apps, not with AAD V2 applications. The documentation does not accurately reflect this, which is the source of confusion in #37847 ------- cc: @cephalin
1 parent 1399f1a commit b402177

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/app-service/configure-authentication-provider-microsoft.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,17 @@ ms.custom: seodec18
1313

1414
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1515

16-
This topic shows you how to configure Azure App Service to use Microsoft Account as an authentication provider.
16+
This topic shows you how to configure Azure App Service to use AAD to support personal Microsoft account logins.
17+
18+
> [!NOTE]
19+
> Both personal Microsoft accounts and organizational accounts use the AAD identity provider. At this time, is not possible to configure this identity provider to support both types of log-ins.
1720
1821
## <a name="register-microsoft-account"> </a>Register your app with Microsoft Account
1922

2023
1. Go to [**App registrations**](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade) in the Azure portal. If needed, sign in with your Microsoft account.
2124
1. Select **New registration**, then enter an application name.
22-
1. In **Redirect URIs**, select **Web**, and then enter `https://<app-domain-name>/.auth/login/microsoftaccount/callback`. Replace *\<app-domain-name>* with the domain name of your app. For example, `https://contoso.azurewebsites.net/.auth/login/microsoftaccount/callback`. Be sure to use the HTTPS scheme in the URL.
25+
1. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**
26+
1. In **Redirect URIs**, select **Web**, and then enter `https://<app-domain-name>/.auth/login/aad/callback`. Replace *\<app-domain-name>* with the domain name of your app. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`. Be sure to use the HTTPS scheme in the URL.
2327

2428
1. Select **Register**.
2529
1. Copy the **Application (Client) ID**. You'll need it later.
@@ -33,12 +37,12 @@ This topic shows you how to configure Azure App Service to use Microsoft Account
3337

3438
1. Go to your application in the [Azure portal].
3539
1. Select **Settings** > **Authentication / Authorization**, and make sure that **App Service Authentication** is **On**.
36-
1. Under **Authentication Providers**, select **Microsoft Account**. Paste in the Application (client) ID and client secret that you obtained earlier. Enable any scopes needed by your application.
40+
1. Under **Authentication Providers**, select **Azure Active Directory**. Select **Advanced** under **Management mode**. Paste in the Application (client) ID and client secret that you obtained earlier. Use **https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0** for the **Issuer Url** field.
3741
1. Select **OK**.
3842

3943
App Service provides authentication, but doesn't restrict authorized access to your site content and APIs. You must authorize users in your app code.
4044

41-
1. (Optional) To restrict access to Microsoft account users, set **Action to take when request is not authenticated** to **Log in with Microsoft Account**. When you set this functionality, your app requires all requests to be authenticated. It also redirects all unauthenticated requests to Microsoft account for authentication.
45+
1. (Optional) To restrict access to Microsoft account users, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**. When you set this functionality, your app requires all requests to be authenticated. It also redirects all unauthenticated requests to use AAD for authentication. Note that becuase you have configured your **Issuer Url** to use the Microsoft Account tenant, only personal acccounts will successfully authenticate.
4246

4347
> [!CAUTION]
4448
> Restricting access in this way applies to all calls to your app, which might not be desirable for apps that have a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** might be preferred so that the app manually starts authentication itself. For more information, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).

0 commit comments

Comments
 (0)