Skip to content

Commit f197d3c

Browse files
authored
Merge pull request #298633 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents e1c2e1f + b041110 commit f197d3c

File tree

4 files changed

+9
-3
lines changed

4 files changed

+9
-3
lines changed

articles/app-service/configure-authentication-provider-openid-connect.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Your provider requires you to register the details of your application with it.
2727
2828
You need to collect a *client ID* and a *client secret* for your application. The client secret is an important security credential. Don't share this secret with anyone or distribute it in a client application.
2929

30+
> [!NOTE]
31+
> You only need to provide a client secret to the configuration if you would like to acquire access tokens for the user through interactive login flow using the authorization code flow. If this is not your case, collecting a secret is not required.
32+
3033
You also need the OIDC metadata for the provider. This metadata is often exposed in a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's issuer URL suffixed with `/.well-known/openid-configuration`. Get this configuration URL.
3134

3235
If you can't use a configuration metadata document, get the following values separately:
@@ -52,7 +55,7 @@ To add provider information for your OpenID Connect provider, follow these steps
5255

5356
Otherwise, select **Provide endpoints separately**. Put each URL from the identity provider in the appropriate field.
5457

55-
1. Provide the values that you collected earlier for **Client ID** and **Client secret**.
58+
1. Provide the values that you collected earlier for **Client ID**. If the **Client secret** was also collected, provide it as part of the configuration process.
5659

5760
1. Specify an application setting name for your client secret. Your client secret is stored as an app setting to ensure that secrets are stored in a secure fashion. If you want to manage the secret in Azure Key vault, update that setting later to use [Azure Key Vault references](./app-service-key-vault-references.md).
5861

@@ -61,6 +64,8 @@ To add provider information for your OpenID Connect provider, follow these steps
6164
> [!NOTE]
6265
> The OpenID provider name can't contain a hyphen (-) because an app setting is created based on this name. The app setting doesn't support hyphens. Use an underscore (_) instead.
6366
>
67+
> It also requires that the `aud` scope in your token be the same as the **Client Id** as configured above. It is currently not possible to configure the allowed audiences for this provider at the moment.
68+
>
6469
> Azure requires `openid`, `profile`, and `email` scopes. Make sure that you configure your app registration in your ID provider with at least these scopes.
6570
6671
## <a name="related-content"> </a>Related content

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -756,6 +756,7 @@ Review the [Checklist before moving resources](./move-resource-group-and-subscri
756756
> | hostpools | **Yes** | **Yes** | No |
757757
> | scalingplans | **Yes** | **Yes** | No |
758758
> | workspaces | **Yes** | **Yes** | No |
759+
> | appattachpackages | **Yes** | **Yes** | No |
759760
760761
## Microsoft.Devices
761762

articles/migrate/vmware/agent-based-migration-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Learn more about [selecting and comparing](server-migrate-overview.md?context=/a
2727

2828
## Agent-based migration
2929

30-
Agent-based migration is used to migrate on-premises VMware VMs and physical servers to Azure. It can also be used to migrate other on-premises virtualized servers, as well as private and public cloud VMs, including AWS instances, and GCP VMs. Agent-based migration in Azure Migrate uses some backend functionality from the [Azure Site Recovery]../../site-recovery/site-recovery-overview.md) service.
30+
Agent-based migration is used to migrate on-premises VMware VMs and physical servers to Azure. It can also be used to migrate other on-premises virtualized servers, as well as private and public cloud VMs, including AWS instances, and GCP VMs. Agent-based migration in Azure Migrate uses some backend functionality from the [Azure Site Recovery](../../site-recovery/site-recovery-overview.md) service.
3131

3232

3333
## Architectural components

articles/spring-apps/migration/migrate-to-azure-container-apps-components-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The OSS version of Spring Cloud Gateway mentioned in this page is provided as an
2828
- An Azure Spring Apps Enterprise plan instance with Spring Cloud Gateway enabled.
2929
- An Azure Container Apps instance. For more information, see [Quickstart: Deploy your first container app using the Azure portal](../../container-apps/quickstart-portal.md).
3030
- [Azure CLI](/cli/azure/install-azure-cli)
31-
- An Azure container registry instance with sufficient permissions to build and push Docker images. For more information, see [Quickstart: Create a private container registry using the Azure CLI](/azure/container-registry/container-registry-get-started-azure-cli).
31+
- An Azure Container Registry instance with sufficient permissions to build and push Docker images. For more information, see [Quickstart: Create a private container registry using the Azure CLI](/azure/container-registry/container-registry-get-started-azure-cli).
3232

3333
## Prepare the code of the self-hosted Spring Cloud Gateway application
3434

0 commit comments

Comments
 (0)