You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-cluster-creation-setup-azure-ad-via-portal.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Open the Azure AD [App registrations](https://portal.azure.com/#view/Microsoft_A
29
29
30
30

31
31
32
-
In the **Register an application** pane, enter the following information, and then select **Register**:
32
+
On the **Register an application** pane, enter the following information, and then select **Register**:
33
33
34
34
-**Name**: Enter a descriptive name. It's helpful to define a registration type in the name, as in this example: **{{cluster name}}_Cluster**.
35
35
-**Supported account types**: Select **Accounts in this organizational directory only**.
@@ -67,7 +67,7 @@ Select **+ Add a scope**, and then enter the following information:
67
67
-**Scope name**: Enter **user_impersonation**.
68
68
-**Who can consent?**: Select **Admins and users**.
69
69
-**Admin consent display name**: Enter a descriptive name. It's helpful to define the cluster name and authentication type, as in this example: **Access mysftestcluster_Cluster**.
70
-
-**Admin consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on behalf of the signed-in user**.
70
+
-**Admin consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on behalf of the signed-in user.**
71
71
-**User consent display name**: Enter a descriptive name. It's helpful to define the cluster name and authentication type, as in this example: **Access mysftestcluster_Cluster**.
72
72
-**User consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on your behalf.**
73
73
-**State**: Select **Enabled**.
@@ -81,15 +81,15 @@ Select **App roles** > **+ Create app role** to add admin and read-only user rol
81
81

82
82
83
83
Enter the following information for an admin user, and then select **Apply**:
84
-
-**Display Name**: Enter **Admin**.
84
+
-**Display name**: Enter **Admin**.
85
85
-**Allowed member types**: Select **Users/Groups**.
86
86
-**Value**: Enter **Admin**.
87
87
-**Description**: Enter **Admins can manage roles and perform all task actions**.
88
88
89
89

90
90
91
91
Enter the following information for a read-only user, and then select **Apply**:
92
-
-**Display Name**: Enter **ReadOnly**.
92
+
-**Display name**: Enter **ReadOnly**.
93
93
-**Allowed member types**: Select **Users/Groups**.
94
94
-**Value**: Enter **ReadOnly**.
95
95
-**Description**: Enter **ReadOnly roles have limited query access**.
@@ -106,7 +106,7 @@ Enter the following information, and then select **Register**:
106
106
107
107
-**Name**: Enter a descriptive name. It's helpful to define the registration type in the name, as in the following example: **{{cluster name}}_Client**.
108
108
-**Supported account types**: Select **Accounts in this organizational directory only**.
109
-
-**Redirect URI**: Select **Public client/native** and enter **urn:ietf:wg:oauth:2.0:oob**.
109
+
-**Redirect URI**: Select **Public client/native** and enter `urn:ietf:wg:oauth:2.0:oob`.
110
110
111
111

112
112
@@ -150,7 +150,7 @@ For both the read-only and admin roles, you use Azure AD cluster app registratio
150
150
151
151
### Remove filters
152
152
153
-
To view the enterprise applications that were created during the app registration process, you must remove the default filters for **Application type** and **Application ID starts with** from the **All applications** pane in the portal. Optionally, you can view enterprise applications by opening the **Enterprise applications** link from the **API permissions** pane for app registration.
153
+
To view the enterprise applications that you created during the app registration process, you must remove the default filters for **Application type** and **Application ID starts with** from the **All applications** pane in the portal. Optionally, you can view enterprise applications by opening the **Enterprise applications** link from the **API permissions** pane for app registration.
154
154
155
155
The following screenshot shows default filters to be removed.
156
156
@@ -172,11 +172,11 @@ Under **Users**, select the **None Selected** link.
172
172
173
173

174
174
175
-
For users who need read-only (view) access, find each user, and then under **Select a role**, choose the **None Selected** link. Then in the **Select a role** pane, add the **ReadOnly** role.
175
+
For users who need read-only (view) access, find each user, and then under **Select a role**, choose the **None Selected** link. Then on the **Select a role** pane, add the **ReadOnly** role.
176
176
177
177

178
178
179
-
For users who need full read/write access, find each user, and then under **Select a role**, choose the **None Selected** link. Then in the **Select a role** pane, add the **Admin** role.
179
+
For users who need full read/write access, find each user, and then under **Select a role**, choose the **None Selected** link. Then on the **Select a role** pane, add the **Admin** role.
180
180
181
181

182
182
@@ -213,7 +213,7 @@ Enter the following information, and then select **Add**:
213
213
-**Cluster application**: Enter the ID for the Azure AD cluster app registration. This is also known as the web application.
214
214
-**Client application**: Enter the ID for the Azure AD client app registration. This is also known as the native application.
215
215
216
-

216
+

217
217
218
218
## Connect to a cluster with Azure AD
219
219
@@ -299,10 +299,10 @@ On the Azure AD app registration page for your cluster, select **Authentication*
299
299
When you try to connect to a Service Fabric cluster by using Azure AD via PowerShell, the sign-in page returns an error: "AADSTS50011: The reply url specified in the request does not match the reply urls configured for the application: <guid>."
300
300
301
301
#### Reason
302
-
Similar to the preceding issue, PowerShell attempts to authenticate against Azure AD, which provides a redirect URL that isn't listed in the **Reply URIs** list for the Azure AD application.
302
+
PowerShell attempts to authenticate against Azure AD, which provides a redirect URL that isn't listed in the **Reply URIs** list for the Azure AD application.
303
303
304
304
#### Solution
305
-
On the Azure AD app registration page for your cluster, select **Authentication**. In the **Redirect URIs** section, set the URL to **urn:ietf:wg:oauth:2.0:oob**. This URL is a special redirect for command-line authentication.
305
+
On the Azure AD app registration page for your cluster, select **Authentication**. In the **Redirect URIs** section, set the URL to `urn:ietf:wg:oauth:2.0:oob`. This URL is a special redirect for command-line authentication.
0 commit comments