Skip to content

Commit c6708c3

Browse files
authored
Merge pull request #115540 from craigshoemaker/crs-swa-updates
Updates Static Web Apps auth article
2 parents 3892b4c + 46afece commit c6708c3

File tree

1 file changed

+10
-1
lines changed

1 file changed

+10
-1
lines changed

articles/static-web-apps/authentication-authorization.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ https://identity.azurestaticapps.net/.auth/purge/<AUTHENTICATION_PROVIDER_NAME>
113113
To prevent the platform from providing this information on future requests to individual apps, submit a request to the following URL:
114114

115115
```url
116-
https://<WEB_APP_DOMAIN_NAME>/identity/.auth/purge/<AUTHENTICATION_PROVIDER_NAME>
116+
https://<WEB_APP_DOMAIN_NAME>/.auth/purge/<AUTHENTICATION_PROVIDER_NAME>
117117
```
118118

119119
## System folder
@@ -149,6 +149,11 @@ You can use a [route rule](routes.md) to map a default provider to a friendly ro
149149
}
150150
```
151151

152+
### Post login redirect
153+
154+
If you want a user to return to a specific page after login, provide a URL in `post_login_redirect_uri` query string parameter.
155+
156+
152157
## Logout
153158

154159
The `/.auth/logout` route logs users out from the website. You can add a link to your site navigation to allow the user to log out as shown in the following example.
@@ -166,6 +171,10 @@ You can use a [route rule](routes.md) to map a friendly route like _/logout_.
166171
}
167172
```
168173

174+
### Post logout redirect
175+
176+
If you want a user to return to a specific page after logout, provide a URL in `post_logout_redirect_uri` query string parameter.
177+
169178
## Block an authorization provider
170179

171180
You may want to restrict your app from using an authorization provider. For instance, your app may want to standardize only on [providers that expose email addresses](#provider-user-details).

0 commit comments

Comments
 (0)