Skip to content

Commit d134971

Browse files
Acrolinx score
1 parent f49b9fd commit d134971

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/app-service/configure-authentication-api-version.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ The V2 API does not support creation or editing of Microsoft Account as a distin
2222
The automated migration process will move provider secrets into application settings and then convert the rest of the configuration into the new format. To use the automatic migration:
2323

2424
1. Navigate to your app in the portal and select the **Authentication** menu option.
25-
1. If the app is configured using the V1 model, you will see an **Upgrade** button.
26-
1. Review the description in the confirmation prompt. If you are ready to perform the migration, click **Upgrade** in the prompt.
25+
1. If the app is configured using the V1 model, you'll see an **Upgrade** button.
26+
1. Review the description in the confirmation prompt. If you're ready to perform the migration, click **Upgrade** in the prompt.
2727

2828
### Manually managing the migration
2929

@@ -37,7 +37,7 @@ The following steps will allow you to manually migrate the application to the V2
3737
az webapp auth show -g <group_name> -n <site_name>
3838
```
3939

40-
In the resulting JSON payload, make note of the secret value used for each provider you have configured:
40+
In the resulting JSON payload, make note of the secret value used for each provider you've configured:
4141

4242
* Azure AD: `clientSecret`
4343
* Google: `googleClientSecret`
@@ -48,7 +48,7 @@ The following steps will allow you to manually migrate the application to the V2
4848
> [!IMPORTANT]
4949
> The secret values are important security credentials and should be handled carefully. Do not share these values or persist them on a local machine.
5050
51-
1. Create slot-sticky application settings for each secret value. You may choose the name of each application setting. It's value should match what you obtained in the previous step or [reference a Key Vault secret](./app-service-key-vault-references.md?toc=/azure/azure-functions/toc.json) that you have created with that value.
51+
1. Create slot-sticky application settings for each secret value. You may choose the name of each application setting. Its value should match what you obtained in the previous step or [reference a Key Vault secret](./app-service-key-vault-references.md?toc=/azure/azure-functions/toc.json) that you've created with that value.
5252

5353
To create the setting, you can use the Azure portal or run a variation of the following for each provider:
5454

@@ -63,7 +63,7 @@ The following steps will allow you to manually migrate the application to the V2
6363
> [!NOTE]
6464
> The application settings for this configuration should be marked as slot-sticky, meaning that they will not move between environments during a [slot swap operation](./deploy-staging-slots.md). This is because your authentication configuration itself is tied to the environment.
6565
66-
1. Create a new JSON file named `authsettings.json`.Take the output that you received previously and remove each secret value from it. Write the remaining output to the file, making sure that no secret is included. In some cases, the configuration may have arrays containing empty strings. Make sure that `microsoftAccountOAuthScopes` does not, and if it does, switch that value to `null`.
66+
1. Create a new JSON file named `authsettings.json`. Take the output that you received previously and remove each secret value from it. Write the remaining output to the file, making sure that no secret is included. In some cases, the configuration may have arrays containing empty strings. Make sure that `microsoftAccountOAuthScopes` does not, and if it does, switch that value to `null`.
6767

6868
1. Add a property to `authsettings.json` which points to the application setting name you created earlier for each provider:
6969

@@ -133,7 +133,7 @@ The following steps will allow you to manually migrate the application to the V2
133133

134134
1. Delete the file used in the previous steps.
135135

136-
You have now migrated the app to store identity provider secrets as application settings.
136+
You've now migrated the app to store identity provider secrets as application settings.
137137

138138
#### Support for Microsoft Account provider registrations
139139

@@ -145,9 +145,9 @@ If your existing configuration contains a Microsoft Account provider and does no
145145
1. Navigate to the App Service Authentication / Authorization configuration for your app.
146146
1. Collect the configuration for the Microsoft Account provider.
147147
1. Configure the Azure AD provider using the "Advanced" management mode, supplying the client ID and client secret values you collected in the previous step. For the Issuer URL, use Use `<authentication-endpoint>/<tenant-id>/v2.0`, and replace *\<authentication-endpoint>* with the [authentication endpoint for your cloud environment](../active-directory/develop/authentication-national-cloud.md#azure-ad-authentication-endpoints) (e.g., "https://login.microsoftonline.com" for global Azure), also replacing *\<tenant-id>* with your **Directory (tenant) ID**.
148-
1. Once you have saved the configuration, test the login flow by navigating in your browser to the `/.auth/login/aad` endpoint on your site and complete the sign-in flow.
149-
1. At this point, you have successfully copied the configuration over, but the existing Microsoft Account provider configuration remains. Before you remove it, make sure that all parts of your app reference the Azure AD provider through login links, etc. Verify that all parts of your app work as expected.
150-
1. Once you have validated that things work against the Azure AD provider, you may remove the Microsoft Account provider configuration.
148+
1. Once you've saved the configuration, test the login flow by navigating in your browser to the `/.auth/login/aad` endpoint on your site and complete the sign-in flow.
149+
1. At this point, you've successfully copied the configuration over, but the existing Microsoft Account provider configuration remains. Before you remove it, make sure that all parts of your app reference the Azure AD provider through login links, etc. Verify that all parts of your app work as expected.
150+
1. Once you've validated that things work against the Azure AD provider, you may remove the Microsoft Account provider configuration.
151151

152152
> [!WARNING]
153153
> It is possible to converge the two registrations by modifying the [supported account types](../active-directory/develop/supported-accounts-validation.md) for the Azure AD app registration. However, this would force a new consent prompt for Microsoft Account users, and those users' identity claims may be different in structure, `sub` notably changing values since a new App ID is being used. This approach is not recommended unless thoroughly understood. You should instead wait for support for the two registrations in the V2 API surface.
@@ -185,7 +185,7 @@ az webapp auth show --name <my_app_name> \
185185

186186
In this code, replace `<my_app_name>` with the name of your app. Also replace `<my_resource_group>` with the name of the resource group for your app.
187187

188-
You will see the `runtimeVersion` field in the CLI output. It will resemble the following example output, which has been truncated for clarity:
188+
You'll see the `runtimeVersion` field in the CLI output. It will resemble the following example output, which has been truncated for clarity:
189189
```output
190190
{
191191
"additionalLoginParams": null,

0 commit comments

Comments
 (0)