Skip to content

Commit f2b5184

Browse files
themr0cJessicaJHee
andauthored
Apply suggestions from code review
Co-authored-by: Jessica He <[email protected]>
1 parent e1f900d commit f2b5184

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/authentication/proc-enabling-user-authentication-with-microsoft-azure.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@ Alternatively, you can ask your {azure-short} administrator to prepare the requi
1212
* Your {product-short} backend can access the following hosts:
1313

1414
`login.microsoftonline.com`::
15-
For obtaining and exchanging authorization codes and access tokens.
15+
This is the {azure-brand-name} authorization server, which enables the authentication flow.
1616

1717
`graph.microsoft.com`::
18-
For retrieving user profile information (as referenced in the source code), and avoiding an _Authentication failed, failed to fetch user profile_ error when attempting to log in.
18+
For retrieving organization data, including user and group data, to be ingested into the {product-short} catalog.
1919

2020
.Procedure
2121
:my-product-app-name-in-azure: <Authenticating with {product-short}>
22-
. To allow {product-short} to authenticate with {azure-brand-name}, link:https://learn.microsoft.com/en-us/entra/identity-platform/scenario-web-app-sign-user-app-registration?tabs=aspnetcore#register-an-app-by-using-the-azure-portal[create an OAuth application in {azure-short}].
22+
. To allow {product-short} to authenticate with {azure-short}, link:https://learn.microsoft.com/en-us/entra/identity-platform/scenario-web-app-sign-user-app-registration?tabs=aspnetcore#register-an-app-by-using-the-azure-portal[Register an app by using the {azure-short} portal].
2323

2424
.. In the {azure-short} portal go to link:https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade[*App registrations*], create a **New registration** with the configuration:
2525

@@ -426,7 +426,7 @@ auth:
426426
After successful authentication, {product-short} resolves the user signing in to an existing user in the {product-short} catalog.
427427
To best match users securely for your use case, consider configuring a specific resolver.
428428
+
429-
Enter the resolver list to override the default resolver: `emailLocalPartMatchingUserEntityName`.
429+
Enter the resolver list to override the default resolver: `userIdMatchingUserEntityAnnotation`.
430430
+
431431
The authentication provider tries each sign-in resolver in order until it succeeds, and fails if none succeed.
432432
+

0 commit comments

Comments
 (0)