You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/Security/Authentication/OpenIdConnect/samples/OpenIdConnectSample/Readme.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# How to set up the sample locally
2
2
3
-
The OpenIdConnect sample supports multilpe authentication providers. In these instruction, we will explore how to set up this sample with both Azure Active Directory and Google Identity Platform.
3
+
The OpenIdConnect sample supports multiple authentication providers. In these instruction, we will explore how to set up this sample with both Azure Active Directory and Google Identity Platform.
4
4
5
5
## Determine your development environment and a few key variables
6
6
@@ -14,19 +14,21 @@ If the application is run from command line or terminal, environment variable AS
14
14
15
15
1. Set up a new Azure Active Directory (AAD) in your Azure Subscription.
16
16
2. Open the newly created AAD in Azure web portal.
17
-
3. Navigate to the Applications tab.
17
+
3. Navigate to the App registrations tab.
18
18
4. Add a new Application to the AAD. Set the "Sign-on URL" to sample application's URL.
19
-
5.Naigate to the Application, and click the Configure tab.
19
+
5.Navigate to the Application, and click the Configure tab.
20
20
6. Find and save the "Client Id".
21
21
7. Add a new key in the "Keys" section. Save value of the key, which is the "Client Secret".
22
22
8. Click the "View Endpoints" on the drawer, a dialog will shows six endpoint URLs. Copy the "OAuth 2.0 Authorization Endpoint" to a text editor and remove the "/oauth2/authorize" from the string. The remaining part is the __authority URL__. It looks like `https://login.microsoftonline.com/<guid>`.
23
+
9. Click the Authentication tab and check (i.e. enable) the ID tokens option under "Implicit grant".
24
+
10. On the Authentication tab, ensure the "Redirect URIs" is set to `https://localhost:44318/signin-oidc` (i.e. the sample application's URI appended with "/signin-oidc")
23
25
24
-
### Configure with Google Identity Platform
26
+
### Configure with Google Identity Platform
25
27
26
28
1. Create a new project through [Google APIs](https://console.developers.google.com).
27
29
2. In the sidebar choose "Credentials".
28
30
3. Navigate to "OAuth consent screen" tab, fill in the project name and save.
0 commit comments