You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| DetailControllerExceptionMessage | Error message to be shown on the UI when details loading fails | No |
109
-
| EnvironmentName | Environment Name where this solution is getting deployed (e.g., DEV/ TEST etc.) | No |
110
-
| GraphAPIAuthString |AAD Authority URL with {0} replaced with the TenantID - https://login.windows.net/{0}| No |
111
-
| GraphAPIClientId |AAD Client ID which has permissions to Access Microsoft Graph to get user data | No |
112
-
| GraphAPIClientSecret |AAD Client Secret - used to access Microsoft Graph | Yes |
113
-
| NotificationBroadcastUri | Notification Service's REST endpoint | No |
114
-
| NotificationFrameworkAuthKey |AAD Client Secret - used for Authentication with Notification Framework/service | Yes |
115
-
| NotificationFrameworkClientId |AAD Client ID - used for Authentication with Notification Framework/service | No |
116
-
| ReceiptAcknowledgmentMessage | Message to be shown on the UI while taking action (if applicable | No |
117
-
| ServiceBusConnectionString | Azure Service Bus | Yes |
118
-
| ServiceBusIssuerSecret | Azure Service Bus | Yes |
119
-
| ServiceBusNamespace | Azure Service Bus | No |
120
-
| ServiceComponentId |[Optional] Used for Logging | No |
121
-
| ServiceLineName |[Optional] Used for Logging | No |
122
-
| ServiceName |[Optional] Used for Logging | No |
123
-
| ServiceOfferingName |[Optional] Used for Logging | No |
124
-
| ServiceParameterAuthKey |AAD Client Secret - used for Authentication with LoB apps endpoints/service | Yes |
125
-
| ServiceParameterClientID |AAD Client ID - used for Authentication with LoB apps endpoints/service | No |
126
-
| StorageAccountKey | Azure Storage | Yes |
127
-
| StorageAccountName | Azure Storage | No |
128
-
| SupportEmailId | e.g., mailto:help@contoso.com| No |
129
-
| SyntheticTransactionsApproverAliasList |[Optional](;) separated list of aliases which would be the allowed approvers for creating synthetic transaction requests | No |
130
-
| UrlPlaceholderTenants |[Optional] Int32 identifiers for simulating LoB apps in self-server portal | No |
131
-
| WhitelistDomains | Domains which will be allowed to access Assent | No |
99
+
|AntiCorruptionMessage|```Message to be shown on the UI while taking action (if applicable)```| No |
100
+
|ApprovalsAudienceUrl|```Microsoft Entra ID Resource (APP ID URL)```| No |
101
+
|ApprovalsBaseUrl|```Approvals Website Base URL```| No |
102
+
|ApprovalsCoreServicesURL|```Approvals API's Base URL```| No |
103
+
|Authority|```URL that indicates a directory that MSAL can request tokens from```| No |
104
+
| AzureSearchServiceName |```Azure Search```| No |
| DetailControllerExceptionMessage |```Error message to be shown on the UI when details loading fails```| No |
109
+
| EnvironmentName |``` Environment Name where this solution is getting deployed (e.g., DEV/ TEST etc.)```| No |
110
+
| GraphAPIAuthString |```Microsoft Entra ID Authority URL with {0} replaced with the TenantID - https://login.windows.net/{0}```| No |
111
+
| GraphAPIClientId |```Microsoft Entra ID Client ID which has permissions to Access Microsoft Graph to get user data```| No |
112
+
| GraphAPIClientSecret |```Microsoft Entra ID Client Secret - used to access Microsoft Graph```| Yes |
113
+
| NotificationBroadcastUri |```Notification Service's REST endpoint```| No |
114
+
| NotificationFrameworkAuthKey |```Microsoft Entra ID Client Secret - used for Authentication with Notification Framework/service```| Yes |
115
+
| NotificationFrameworkClientId |```Microsoft Entra ID Client ID - used for Authentication with Notification Framework/service```| No |
116
+
| ReceiptAcknowledgmentMessage |```Message to be shown on the UI while taking action (if applicable)```| No |
117
+
| ServiceBusConnectionString |```Azure Service Bus```| Yes |
118
+
| ServiceBusIssuerSecret |```Azure Service Bus```| Yes |
119
+
| ServiceBusNamespace |```Azure Service Bus```| No |
120
+
| ServiceComponentId |```[Optional] Used for Logging```| No |
121
+
| ServiceLineName |```[Optional] Used for Logging```| No |
122
+
| ServiceName |```[Optional] Used for Logging```| No |
123
+
| ServiceOfferingName |```[Optional] Used for Logging```| No |
124
+
| ServiceParameterAuthKey |```Microsoft Entra ID Client Secret - used for Authentication with LoB apps endpoints/service```| Yes |
125
+
| ServiceParameterClientID |```Microsoft Entra ID Client ID - used for Authentication with LoB apps endpoints/service```| No |
126
+
| StorageAccountKey |```Azure Storage```| Yes |
127
+
| StorageAccountName |```Azure Storage```| No |
128
+
| SupportEmailId |```e.g., mailto:help@contoso.com```| No |
129
+
| SyntheticTransactionsApproverAliasList |```[Optional](;) separated list of aliases which would be the allowed approvers for creating synthetic transaction requests```| No |
130
+
| UrlPlaceholderTenants |```[Optional] Int32 identifiers for simulating LoB apps in self-server portal```| No |
131
+
| WhitelistDomains |```Domains which will be allowed to access Assent```| No |
132
132
133
133
```
134
134
Step 3: Go to the App Configuration service on Azure Portal and select the resource
@@ -195,7 +195,7 @@ Select the 'Label' under which the configurations needs to be added (e.g., DEV)
195
195
> > Name of the component which could be name of the component like *ApprovalsCoreServicesAPI or ApprovalsPayloadServiceAPI*.
196
196
>
197
197
> ValidAppIds
198
-
> > This is AzureAD App's ClientIds which are authorized to access this component (; separated).
198
+
> This is Microsoft Entra ID App's ClientIds which are authorized to access this component (; separated).
199
199
>
200
200
```
201
201
Note: The connection string should be the KeyVault url
@@ -204,10 +204,10 @@ Select the 'Label' under which the configurations needs to be added (e.g., DEV)
204
204
#### Setup Authentication/Access Permission
205
205
206
206
* Setup Authentication for APIs and Function Apps
207
-
* Update the Reply Urls section of the AzureAD App created earlier with the URLs of the App Services and FunctionApps (HttpTriggered) URLs suffixed with '/auth/login/aad/callback'
207
+
* Update the Reply Urls section of the Microsoft Entra ID App created earlier with the URLs of the App Services and FunctionApps (HttpTriggered) URLs suffixed with '/auth/login/aad/callback'
208
208
* In the 'Authentication' section of the AppServices / FunctionApps (HttpTriggered),
209
209
* Add or update the Authentication values (ClientId/Secret/Issuer/Audience)
210
-
* Select 'Login with Azure Active Directory' for the option 'Action to take when the request is not authenticated'
210
+
* Select 'Return HTTP 302 Found (Redirect to identity provider)' for the option 'Unauthenticated requests'
211
211
212
212
* Permissions needed needed for System assigned Managed Identity of below Azure Components
0 commit comments