Skip to content

Commit 7465a71

Browse files
committed
Fixes to app serv relnotes
1 parent 78b6512 commit 7465a71

File tree

1 file changed

+35
-33
lines changed

1 file changed

+35
-33
lines changed

azure-stack/operator/app-service-release-notes-2024R1.md

Lines changed: 35 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -283,50 +283,52 @@ This script must be run under the following conditions:
283283
GO
284284
```
285285

286-
- A new Redirect URL must be added to the Identity Application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
286+
- A new Redirect URL must be added to the identity application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
287287

288288
# [Entra ID](#tab/EntraID)
289289

290-
## Retrieve the Identity Application Client ID
291-
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
292-
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
293-
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
294-
1. Launch the **Web Cloud Management Console**.
295-
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
296-
1. Select **Settings**.
297-
1. Find the **ApplicationClientId** setting. Retrieve the value.
298-
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
299-
1. Modify the **Inbound_Rdp_3389** rule to deny access.
300-
301-
## Update the Entra ID Application with new Redirect URI
302-
303-
1. Sign into the **Azure** Portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
304-
1. Using the **Azure** Portal and navigate to **Microsoft Entra ID**
305-
1. Search your tenant for the ApplicationClientId you retrieved earlier.
306-
1. Select the Application
307-
1. Select **Authentication**
308-
1. Add an additional Redirect URI to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**
290+
## Retrieve the Identity Application Client ID
291+
292+
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
293+
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
294+
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
295+
1. Launch the **Web Cloud Management Console**.
296+
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
297+
1. Select **Settings**.
298+
1. Find the **ApplicationClientId** setting. Retrieve the value.
299+
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
300+
1. Modify the **Inbound_Rdp_3389** rule to deny access.
309301

302+
## Update the Entra ID Application with new Redirect URI
303+
304+
1. Sign into the Azure portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
305+
1. Using the Azure portal and navigate to **Microsoft Entra ID**.
306+
1. Search your tenant for the `ApplicationClientId` you retrieved earlier.
307+
1. Select the application.
308+
1. Select **Authentication**.
309+
1. Add an additional **Redirect URI** to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**.
310310

311311
# [ADFS](#tab/ADFS)
312312

313-
## Retrieve the Identity Application
314-
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md)
315-
1. Run the following command to retrieve the ADFS Graph Applications
313+
## Retrieve the identity application
314+
315+
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md).
316+
1. Run the following command to retrieve the AD FS Graph applications:
317+
318+
``` PowerShell
319+
Get-GraphApplication
320+
```
316321

317-
``` PowerShell
318-
Get-GraphApplication
319-
```
322+
1. Find the identifier for the AzureStack-AppService application.
323+
1. Update the `RedirectURIs` for the application:
320324

321-
1. Find the Identifier for the AzureStack-AppService application
322-
1. Update the RedirectURIs for the application:
325+
``` PowerShell
326+
$RedirectURIs = "@("https://appservice.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://api.appservice.\<region\>.\<DomainName\>.\<extension\>:44300/manage")
327+
Set-GraphApplication -ApplicationIdentifier <insert Identifier value> -ClientRedirectUris $RedirectURIs
328+
```
323329

324-
``` PowerShell
325-
$RedirectURIs = "@("https://appservice.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://api.appservice.\<region\>.\<DomainName\>.\<extension\>:44300/manage")
326-
Set-GraphApplication -ApplicationIdentifier <insert Identifier value> -ClientRedirectUris $RedirectURIs
327-
```
330+
1. Close the session to the Privileged Endpoint.
328331

329-
1. Close the session to the Privileged Endpoint
330332
---
331333

332334
## Known issues (post-installation)

0 commit comments

Comments
 (0)