You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-api-version.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,8 @@ The V2 API does not support creation or editing of Microsoft Account as a distin
22
22
The automated migration process will move provider secrets into application settings and then convert the rest of the configuration into the new format. To use the automatic migration:
23
23
24
24
1. Navigate to your app in the portal and select the **Authentication** menu option.
25
-
1. If the app is configured using the V1 model, you will see an **Upgrade** button.
26
-
1. Review the description in the confirmation prompt. If you are ready to perform the migration, click **Upgrade** in the prompt.
25
+
1. If the app is configured using the V1 model, you'll see an **Upgrade** button.
26
+
1. Review the description in the confirmation prompt. If you're ready to perform the migration, click **Upgrade** in the prompt.
27
27
28
28
### Manually managing the migration
29
29
@@ -37,7 +37,7 @@ The following steps will allow you to manually migrate the application to the V2
37
37
az webapp auth show -g <group_name> -n <site_name>
38
38
```
39
39
40
-
In the resulting JSON payload, make note of the secret value used for each provider you have configured:
40
+
In the resulting JSON payload, make note of the secret value used for each provider you've configured:
41
41
42
42
* Azure AD: `clientSecret`
43
43
* Google: `googleClientSecret`
@@ -48,7 +48,7 @@ The following steps will allow you to manually migrate the application to the V2
48
48
> [!IMPORTANT]
49
49
> The secret values are important security credentials and should be handled carefully. Do not share these values or persist them on a local machine.
50
50
51
-
1. Create slot-sticky application settings for each secret value. You may choose the name of each application setting. It's value should match what you obtained in the previous step or [reference a Key Vault secret](./app-service-key-vault-references.md?toc=/azure/azure-functions/toc.json) that you have created with that value.
51
+
1. Create slot-sticky application settings for each secret value. You may choose the name of each application setting. Its value should match what you obtained in the previous step or [reference a Key Vault secret](./app-service-key-vault-references.md?toc=/azure/azure-functions/toc.json) that you've created with that value.
52
52
53
53
To create the setting, you can use the Azure portal or run a variation of the following for each provider:
54
54
@@ -63,7 +63,7 @@ The following steps will allow you to manually migrate the application to the V2
63
63
> [!NOTE]
64
64
> The application settings for this configuration should be marked as slot-sticky, meaning that they will not move between environments during a [slot swap operation](./deploy-staging-slots.md). This is because your authentication configuration itself is tied to the environment.
65
65
66
-
1. Create a new JSON file named `authsettings.json`.Take the output that you received previously and remove each secret value from it. Write the remaining output to the file, making sure that no secret is included. In some cases, the configuration may have arrays containing empty strings. Make sure that `microsoftAccountOAuthScopes` does not, and if it does, switch that value to `null`.
66
+
1. Create a new JSON file named `authsettings.json`.Take the output that you received previously and remove each secret value from it. Write the remaining output to the file, making sure that no secret is included. In some cases, the configuration may have arrays containing empty strings. Make sure that `microsoftAccountOAuthScopes` does not, and if it does, switch that value to `null`.
67
67
68
68
1. Add a property to `authsettings.json` which points to the application setting name you created earlier for each provider:
69
69
@@ -133,7 +133,7 @@ The following steps will allow you to manually migrate the application to the V2
133
133
134
134
1. Delete the file used in the previous steps.
135
135
136
-
You have now migrated the app to store identity provider secrets as application settings.
136
+
You've now migrated the app to store identity provider secrets as application settings.
137
137
138
138
#### Support for Microsoft Account provider registrations
139
139
@@ -145,9 +145,9 @@ If your existing configuration contains a Microsoft Account provider and does no
145
145
1. Navigate to the App Service Authentication / Authorization configuration for your app.
146
146
1. Collect the configuration for the Microsoft Account provider.
147
147
1. Configure the Azure AD provider using the "Advanced" management mode, supplying the client ID and client secret values you collected in the previous step. For the Issuer URL, use Use `<authentication-endpoint>/<tenant-id>/v2.0`, and replace *\<authentication-endpoint>* with the [authentication endpoint for your cloud environment](../active-directory/develop/authentication-national-cloud.md#azure-ad-authentication-endpoints) (e.g., "https://login.microsoftonline.com" for global Azure), also replacing *\<tenant-id>* with your **Directory (tenant) ID**.
148
-
1. Once you have saved the configuration, test the login flow by navigating in your browser to the `/.auth/login/aad` endpoint on your site and complete the sign-in flow.
149
-
1. At this point, you have successfully copied the configuration over, but the existing Microsoft Account provider configuration remains. Before you remove it, make sure that all parts of your app reference the Azure AD provider through login links, etc. Verify that all parts of your app work as expected.
150
-
1. Once you have validated that things work against the Azure AD provider, you may remove the Microsoft Account provider configuration.
148
+
1. Once you've saved the configuration, test the login flow by navigating in your browser to the `/.auth/login/aad` endpoint on your site and complete the sign-in flow.
149
+
1. At this point, you've successfully copied the configuration over, but the existing Microsoft Account provider configuration remains. Before you remove it, make sure that all parts of your app reference the Azure AD provider through login links, etc. Verify that all parts of your app work as expected.
150
+
1. Once you've validated that things work against the Azure AD provider, you may remove the Microsoft Account provider configuration.
151
151
152
152
> [!WARNING]
153
153
> It is possible to converge the two registrations by modifying the [supported account types](../active-directory/develop/supported-accounts-validation.md) for the Azure AD app registration. However, this would force a new consent prompt for Microsoft Account users, and those users' identity claims may be different in structure, `sub` notably changing values since a new App ID is being used. This approach is not recommended unless thoroughly understood. You should instead wait for support for the two registrations in the V2 API surface.
@@ -185,7 +185,7 @@ az webapp auth show --name <my_app_name> \
185
185
186
186
In this code, replace `<my_app_name>` with the name of your app. Also replace `<my_resource_group>` with the name of the resource group for your app.
187
187
188
-
You will see the `runtimeVersion` field in the CLI output. It will resemble the following example output, which has been truncated for clarity:
188
+
You'll see the `runtimeVersion` field in the CLI output. It will resemble the following example output, which has been truncated for clarity:
0 commit comments