|
1 | 1 | # Set Up Authentication in Azure App Service |
2 | 2 |
|
| 3 | +This document provides step-by-step instructions to configure Azure App Registrations for a front-end application. |
| 4 | + |
| 5 | +## Prerequisites |
| 6 | + |
| 7 | +- Access to **Microsoft Entra ID** |
| 8 | +- Necessary permissions to create and manage **App Registrations** |
| 9 | + |
3 | 10 | ## Step 1: Add Authentication in Azure App Service configuration |
4 | 11 |
|
5 | 12 | 1. Click on `Authentication` from left menu. |
6 | 13 |
|
7 | 14 |  |
8 | 15 |
|
9 | | -2. Click on `+ Add Provider` to see a list of identity providers. |
| 16 | +2. Click on `+ Add identity provider` to see a list of identity providers. |
10 | 17 |
|
11 | 18 |  |
12 | 19 |
|
13 | | -3. Click on `+ Add Provider` to see a list of identity providers. |
| 20 | +3. Click on `Identity Provider` dropdown to see a list of identity providers. |
14 | 21 |
|
15 | 22 |  |
16 | 23 |
|
17 | | -4. Select the first option `Microsoft Entra Id` from the drop-down list. If `Create new app registration` is disabled, go to [Step 1a](#step-1a-creating-a-new-app-registration). |
| 24 | +4. Select the first option `Microsoft Entra Id` from the drop-down list and select `client secret expiration` under App registration. |
| 25 | +> NOTE: If `Create new app registration` is disabled, then go to [Create new app registration](/docs/create_new_app_registration.md) and come back to this step to complete the app authentication. |
18 | 26 |
|
19 | 27 |  |
20 | 28 |
|
21 | 29 | 5. Accept the default values and click on `Add` button to go back to the previous page with the idenity provider added. |
22 | 30 |
|
23 | 31 |  |
24 | 32 |
|
25 | | -### Step 1a: Creating a new App Registration |
26 | | - |
27 | | -1. Click on `Home` and select `Microsoft Entra ID`. |
28 | | - |
29 | | - |
30 | | - |
31 | | -2. Click on `App registrations`. |
32 | | - |
33 | | - |
34 | | - |
35 | | -3. Click on `+ New registration`. |
36 | | - |
37 | | - |
38 | | - |
39 | | -4. Provide the `Name`, select supported account types as `Accounts in this organizational directory only(Contoso only - Single tenant)`, select platform as `Web`, enter/select the `URL` and register. |
40 | | - |
41 | | - |
42 | | - |
43 | | -5. After application is created sucessfully, then click on `Add a Redirect URL`. |
44 | | - |
45 | | - |
46 | | - |
47 | | -6. Click on `+ Add a platform`. |
48 | | - |
49 | | - |
50 | | - |
51 | | -7. Click on `Web`. |
52 | | - |
53 | | - |
54 | | - |
55 | | -8. Enter the `web app URL` (Provide the app service name in place of XXXX) and Save. Then go back to [Step 1](#step-1-add-authentication-in-azure-app-service-configuration) and follow from _Point 4_ choose `Pick an existing app registration in this directory` from the Add an Identity Provider page and provide the newly registered App Name. |
56 | | -E.g. <<https://<< appservicename >>.azurewebsites.net/.auth/login/aad/callback>> |
57 | | - |
58 | | - |
| 33 | +6. You have successfully added app authentication, and now required to log in to access the application. |
0 commit comments