You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/operator/app-service-release-notes-2024R1.md
+35-33Lines changed: 35 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -283,50 +283,52 @@ This script must be run under the following conditions:
283
283
GO
284
284
```
285
285
286
-
- A new Redirect URL must be added to the Identity Application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
286
+
- A new Redirect URL must be added to the identity application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
287
287
288
288
# [Entra ID](#tab/EntraID)
289
289
290
-
## Retrieve the Identity Application Client ID
291
-
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
292
-
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
293
-
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
294
-
1. Launch the **Web Cloud Management Console**.
295
-
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
296
-
1. Select **Settings**.
297
-
1. Find the **ApplicationClientId** setting. Retrieve the value.
298
-
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
299
-
1. Modify the **Inbound_Rdp_3389** rule to deny access.
300
-
301
-
## Update the Entra ID Application with new Redirect URI
302
-
303
-
1. Sign into the **Azure** Portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
304
-
1. Using the **Azure** Portal and navigate to **Microsoft Entra ID**
305
-
1. Search your tenant for the ApplicationClientId you retrieved earlier.
306
-
1. Select the Application
307
-
1. Select **Authentication**
308
-
1. Add an additional Redirect URI to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**
290
+
## Retrieve the Identity Application Client ID
291
+
292
+
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
293
+
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
294
+
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
295
+
1. Launch the **Web Cloud Management Console**.
296
+
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
297
+
1. Select **Settings**.
298
+
1. Find the **ApplicationClientId** setting. Retrieve the value.
299
+
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
300
+
1. Modify the **Inbound_Rdp_3389** rule to deny access.
309
301
302
+
## Update the Entra ID Application with new Redirect URI
303
+
304
+
1. Sign into the Azure portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
305
+
1. Using the Azure portal and navigate to **Microsoft Entra ID**.
306
+
1. Search your tenant for the `ApplicationClientId` you retrieved earlier.
307
+
1. Select the application.
308
+
1. Select **Authentication**.
309
+
1. Add an additional **Redirect URI** to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**.
310
310
311
311
# [ADFS](#tab/ADFS)
312
312
313
-
## Retrieve the Identity Application
314
-
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md)
315
-
1. Run the following command to retrieve the ADFS Graph Applications
313
+
## Retrieve the identity application
314
+
315
+
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md).
316
+
1. Run the following command to retrieve the AD FS Graph applications:
317
+
318
+
```PowerShell
319
+
Get-GraphApplication
320
+
```
316
321
317
-
```PowerShell
318
-
Get-GraphApplication
319
-
```
322
+
1. Find the identifier for the AzureStack-AppService application.
323
+
1. Update the `RedirectURIs` for the application:
320
324
321
-
1. Find the Identifier for the AzureStack-AppService application
0 commit comments