Skip to content

Commit da2e4a6

Browse files
committed
edit pass: service-fabric-cluster-creation-setup-azure-ad-via-portal
1 parent 225f227 commit da2e4a6

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/service-fabric/service-fabric-cluster-creation-setup-azure-ad-via-portal.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Open the Azure AD [App registrations](https://portal.azure.com/#view/Microsoft_A
2929

3030
![Screenshot of the pane for cluster app registrations and the button for a new registration.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-app-registration.png)
3131

32-
In the **Register an application** pane, enter the following information, and then select **Register**:
32+
On the **Register an application** pane, enter the following information, and then select **Register**:
3333

3434
- **Name**: Enter a descriptive name. It's helpful to define a registration type in the name, as in this example: **{{cluster name}}_Cluster**.
3535
- **Supported account types**: Select **Accounts in this organizational directory only**.
@@ -67,7 +67,7 @@ Select **+ Add a scope**, and then enter the following information:
6767
- **Scope name**: Enter **user_impersonation**.
6868
- **Who can consent?**: Select **Admins and users**.
6969
- **Admin consent display name**: Enter a descriptive name. It's helpful to define the cluster name and authentication type, as in this example: **Access mysftestcluster_Cluster**.
70-
- **Admin consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on behalf of the signed-in user**.
70+
- **Admin consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on behalf of the signed-in user.**
7171
- **User consent display name**: Enter a descriptive name. It's helpful to define the cluster name and authentication type, as in this example: **Access mysftestcluster_Cluster**.
7272
- **User consent description**: Enter a description like this example: **Allow the application to access mysftestcluster_Cluster on your behalf.**
7373
- **State**: Select **Enabled**.
@@ -81,15 +81,15 @@ Select **App roles** > **+ Create app role** to add admin and read-only user rol
8181
![Screenshot of the pane for assigning app roles in the portal.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-cluster-roles.png)
8282

8383
Enter the following information for an admin user, and then select **Apply**:
84-
- **Display Name**: Enter **Admin**.
84+
- **Display name**: Enter **Admin**.
8585
- **Allowed member types**: Select **Users/Groups**.
8686
- **Value**: Enter **Admin**.
8787
- **Description**: Enter **Admins can manage roles and perform all task actions**.
8888

8989
![Screenshot of selections for creating an admin user role in the portal.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-cluster-roles-admin.png)
9090

9191
Enter the following information for a read-only user, and then select **Apply**:
92-
- **Display Name**: Enter **ReadOnly**.
92+
- **Display name**: Enter **ReadOnly**.
9393
- **Allowed member types**: Select **Users/Groups**.
9494
- **Value**: Enter **ReadOnly**.
9595
- **Description**: Enter **ReadOnly roles have limited query access**.
@@ -106,7 +106,7 @@ Enter the following information, and then select **Register**:
106106

107107
- **Name**: Enter a descriptive name. It's helpful to define the registration type in the name, as in the following example: **{{cluster name}}_Client**.
108108
- **Supported account types**: Select **Accounts in this organizational directory only**.
109-
- **Redirect URI**: Select **Public client/native** and enter **urn:ietf:wg:oauth:2.0:oob**.
109+
- **Redirect URI**: Select **Public client/native** and enter `urn:ietf:wg:oauth:2.0:oob`.
110110

111111
![Screenshot of client app registration in the portal.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-client-app-registration.png)
112112

@@ -150,7 +150,7 @@ For both the read-only and admin roles, you use Azure AD cluster app registratio
150150

151151
### Remove filters
152152

153-
To view the enterprise applications that were created during the app registration process, you must remove the default filters for **Application type** and **Application ID starts with** from the **All applications** pane in the portal. Optionally, you can view enterprise applications by opening the **Enterprise applications** link from the **API permissions** pane for app registration.
153+
To view the enterprise applications that you created during the app registration process, you must remove the default filters for **Application type** and **Application ID starts with** from the **All applications** pane in the portal. Optionally, you can view enterprise applications by opening the **Enterprise applications** link from the **API permissions** pane for app registration.
154154

155155
The following screenshot shows default filters to be removed.
156156

@@ -172,11 +172,11 @@ Under **Users**, select the **None Selected** link.
172172

173173
![Screenshot of the pane for adding an assignment, with no users selected.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-enterprise-apps-add-assignment.png)
174174

175-
For users who need read-only (view) access, find each user, and then under **Select a role**, choose the **None Selected** link. Then in the **Select a role** pane, add the **ReadOnly** role.
175+
For users who need read-only (view) access, find each user, and then under **Select a role**, choose the **None Selected** link. Then on the **Select a role** pane, add the **ReadOnly** role.
176176

177177
![Screenshot of selecting the read-only role for a user.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-enterprise-apps-readonly-role.png)
178178

179-
For users who need full read/write access, find each user, and then under **Select a role**, choose the **None Selected** link. Then in the **Select a role** pane, add the **Admin** role.
179+
For users who need full read/write access, find each user, and then under **Select a role**, choose the **None Selected** link. Then on the **Select a role** pane, add the **Admin** role.
180180

181181
![Screenshot of selecting the admin role for a user.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-enterprise-apps-admin-role.png)
182182

@@ -213,7 +213,7 @@ Enter the following information, and then select **Add**:
213213
- **Cluster application**: Enter the ID for the Azure AD cluster app registration. This is also known as the web application.
214214
- **Client application**: Enter the ID for the Azure AD client app registration. This is also known as the native application.
215215

216-
![Screenshot of selections in the Add pane.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-cluster-azure-ad-settings.png)
216+
![Screenshot of selections on the Add pane.](media/service-fabric-cluster-creation-setup-azure-ad-via-portal/portal-cluster-azure-ad-settings.png)
217217

218218
## Connect to a cluster with Azure AD
219219

@@ -299,10 +299,10 @@ On the Azure AD app registration page for your cluster, select **Authentication*
299299
When you try to connect to a Service Fabric cluster by using Azure AD via PowerShell, the sign-in page returns an error: "AADSTS50011: The reply url specified in the request does not match the reply urls configured for the application: <guid>."
300300

301301
#### Reason
302-
Similar to the preceding issue, PowerShell attempts to authenticate against Azure AD, which provides a redirect URL that isn't listed in the **Reply URIs** list for the Azure AD application.
302+
PowerShell attempts to authenticate against Azure AD, which provides a redirect URL that isn't listed in the **Reply URIs** list for the Azure AD application.
303303

304304
#### Solution
305-
On the Azure AD app registration page for your cluster, select **Authentication**. In the **Redirect URIs** section, set the URL to **urn:ietf:wg:oauth:2.0:oob**. This URL is a special redirect for command-line authentication.
305+
On the Azure AD app registration page for your cluster, select **Authentication**. In the **Redirect URIs** section, set the URL to `urn:ietf:wg:oauth:2.0:oob`. This URL is a special redirect for command-line authentication.
306306

307307
## FAQ
308308

0 commit comments

Comments
 (0)