Skip to content

Commit 3b593ec

Browse files
guardrexhalter73
andauthored
Update aspnetcore/blazor/security/blazor-web-app-with-entra.md
Co-authored-by: Stephen Halter <[email protected]>
1 parent 3a1af48 commit 3b593ec

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

aspnetcore/blazor/security/blazor-web-app-with-entra.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ If you don't add the signed-out callback path URI to the app's registration in E
112112
app (Blazor samples repo). -->
113113

114114
> [!NOTE]
115-
> Entra currently only redirects back to the <xref:Microsoft.AspNetCore.Builder.OpenIdConnectOptions.SignedOutCallbackPath%2A> if the `microsoftonline.com` Authority (`https://login.microsoftonline.com/{TENANT ID}/v2.0/`) is used. This limitation doesn't exist if you can use the "common" Authority with Microsoft Identity Web. For more information, see [postLogoutRedirectUri not working when authority url contains a tenant ID (`AzureAD/microsoft-authentication-library-for-js` #5783)](https://github.com/AzureAD/microsoft-authentication-library-for-js/issues/5783).
115+
> Entra doesn't redirect a primary admin user (root account) or external user back to the Blazor application. Instead, Entra logs the user out of the app and recommends that they close all of their browser windows. For more information, see [postLogoutRedirectUri not working when authority url contains a tenant ID (`AzureAD/microsoft-authentication-library-for-js` #5783)](https://github.com/AzureAD/microsoft-authentication-library-for-js/issues/5783#issuecomment-1465217522).
116116
117117
[!INCLUDE[](~/blazor/security/includes/secure-authentication-flows.md)]
118118

0 commit comments

Comments
 (0)