You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| DetailControllerExceptionMessage | Error message to be shown on the UI when details loading fails | No |
109
-
| EnvironmentName | Environment Name where this solution is getting deployed (e.g., DEV/ TEST etc.) | No |
110
-
| GraphAPIAuthString | AAD Authority URL with {0} replaced with the TenantID - https://login.windows.net/{0}| No |
111
-
| GraphAPIClientId | AAD Client ID which has permissions to Access Microsoft Graph to get user data | No |
112
-
| GraphAPIClientSecret | AAD Client Secret - used to access Microsoft Graph | Yes |
113
-
| NotificationBroadcastUri | Notification Service's REST endpoint | No |
114
-
| NotificationFrameworkAuthKey | AAD Client Secret - used for Authentication with Notification Framework/service | Yes |
115
-
| NotificationFrameworkClientId | AAD Client ID - used for Authentication with Notification Framework/service | No |
116
-
| ReceiptAcknowledgmentMessage | Message to be shown on the UI while taking action (if applicable | No |
117
-
| ServiceBusConnectionString | Azure Service Bus | Yes |
118
-
| ServiceBusIssuerSecret | Azure Service Bus | Yes |
119
-
| ServiceBusNamespace | Azure Service Bus | No |
120
-
| ServiceComponentId |[Optional] Used for Logging | No |
121
-
| ServiceLineName |[Optional] Used for Logging | No |
122
-
| ServiceName |[Optional] Used for Logging | No |
123
-
| ServiceOfferingName |[Optional] Used for Logging | No |
124
-
| ServiceParameterAuthKey | AAD Client Secret - used for Authentication with LoB apps endpoints/service | Yes |
125
-
| ServiceParameterClientID | AAD Client ID - used for Authentication with LoB apps endpoints/service | No |
126
-
| StorageAccountKey | Azure Storage | Yes |
127
-
| StorageAccountName | Azure Storage | No |
128
-
| SupportEmailId | e.g., mailto:help@contoso.com| No |
129
-
| SyntheticTransactionsApproverAliasList |[Optional] (;) separated list of aliases which would be the allowed approvers for creating synthetic transaction requests | No |
130
-
| UrlPlaceholderTenants |[Optional] Int32 identifiers for simulating LoB apps in self-server portal | No |
131
-
| WhitelistDomains | Domains which will be allowed to access Assent | No |
99
+
| AntiCorruptionMessage |```Message to be shown on the UI while taking action (if applicable)```| No |
100
+
| ApprovalsAudienceUrl |```Microsoft Entra ID Resource (APP ID URL)```| No |
101
+
| ApprovalsBaseUrl |```Approvals Website Base URL```| No |
102
+
| ApprovalsCoreServicesURL |```Approvals API's Base URL```| No |
103
+
| AzureSearchServiceName |```Azure Search```| No |
| DetailControllerExceptionMessage |```Error message to be shown on the UI when details loading fails```| No |
108
+
| EnvironmentName |``` Environment Name where this solution is getting deployed (e.g., DEV/ TEST etc.)```| No |
109
+
| GraphAPIAuthString |```Microsoft Entra ID Authority URL with {0} replaced with the TenantID - https://login.windows.net/{0}```| No |
110
+
| GraphAPIClientId |```Microsoft Entra ID Client ID which has permissions to Access Microsoft Graph to get user data```| No |
111
+
| GraphAPIClientSecret |```Microsoft Entra ID Client Secret - used to access Microsoft Graph```| Yes |
112
+
| NotificationBroadcastUri |```Notification Service's REST endpoint```| No |
113
+
| NotificationFrameworkAuthKey |```Microsoft Entra ID Client Secret - used for Authentication with Notification Framework/service```| Yes |
114
+
| NotificationFrameworkClientId |```Microsoft Entra ID Client ID - used for Authentication with Notification Framework/service```| No |
115
+
| ReceiptAcknowledgmentMessage |```Message to be shown on the UI while taking action (if applicable)```| No |
116
+
| ServiceBusConnectionString |```Azure Service Bus```| Yes |
117
+
| ServiceBusIssuerSecret |```Azure Service Bus```| Yes |
118
+
| ServiceBusNamespace |```Azure Service Bus```| No |
119
+
| ServiceComponentId |```[Optional] Used for Logging```| No |
120
+
| ServiceLineName |```[Optional] Used for Logging```| No |
121
+
| ServiceName |```[Optional] Used for Logging```| No |
122
+
| ServiceOfferingName |```[Optional] Used for Logging```| No |
123
+
| ServiceParameterAuthKey |```Microsoft Entra ID Client Secret - used for Authentication with LoB apps endpoints/service```| Yes |
124
+
| ServiceParameterClientID |```Microsoft Entra ID Client ID - used for Authentication with LoB apps endpoints/service```| No |
125
+
| StorageAccountKey |```Azure Storage```| Yes |
126
+
| StorageAccountName |```Azure Storage```| No |
127
+
| SupportEmailId |```e.g., mailto:help@contoso.com```| No |
128
+
| SyntheticTransactionsApproverAliasList |```[Optional](;) separated list of aliases which would be the allowed approvers for creating synthetic transaction requests```| No |
129
+
| UrlPlaceholderTenants |```[Optional] Int32 identifiers for simulating LoB apps in self-server portal```| No |
130
+
| WhitelistDomains |```Domains which will be allowed to access Assent```| No |
132
131
133
132
```
134
133
Step 3: Go to the App Configuration service on Azure Portal and select the resource
@@ -195,7 +194,7 @@ Select the 'Label' under which the configurations needs to be added (e.g., DEV)
195
194
> > Name of the component which could be name of the component like *ApprovalsCoreServicesAPI or ApprovalsPayloadServiceAPI*.
196
195
>
197
196
> ValidAppIds
198
-
> > This is AzureAD App's ClientIds which are authorized to access this component (; separated).
197
+
> This is Microsoft Entra ID App's ClientIds which are authorized to access this component (; separated).
199
198
>
200
199
```
201
200
Note: The connection string should be the KeyVault url
@@ -204,10 +203,10 @@ Select the 'Label' under which the configurations needs to be added (e.g., DEV)
204
203
#### Setup Authentication/Access Permission
205
204
206
205
* Setup Authentication for APIs and Function Apps
207
-
* Update the Reply Urls section of the AzureAD App created earlier with the URLs of the App Services and FunctionApps (HttpTriggered) URLs suffixed with '/auth/login/aad/callback'
206
+
* Update the Reply Urls section of the Microsoft Entra ID App created earlier with the URLs of the App Services and FunctionApps (HttpTriggered) URLs suffixed with '/auth/login/aad/callback'
208
207
* In the 'Authentication' section of the AppServices / FunctionApps (HttpTriggered),
209
208
* Add or update the Authentication values (ClientId/Secret/Issuer/Audience)
210
-
* Select 'Login with Azure Active Directory' for the option 'Action to take when the request is not authenticated'
209
+
* Select 'Return HTTP 302 Found (Redirect to identity provider)' for the option 'Unauthenticated requests'
211
210
212
211
* Permissions needed needed for System assigned Managed Identity of below Azure Components
0 commit comments