You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+38-9Lines changed: 38 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,19 +31,19 @@ Reflex will need to access these variables to authenticate users via OpenID Conn
31
31
- Redirect URI: add the authorization callback path for your app, e.g. `https://your-app.example.com/authorization-code/callback` (use `http://localhost:3000/authorization-code/callback` for local development).
32
32
3. Register the app and copy the "Application (client) ID" → this is `AZURE_CLIENT_ID`.
33
33
4. Under "Certificates & secrets" create a new client secret and copy the value → this is `AZURE_CLIENT_SECRET`.
34
-
5. Under "Expose an API" or "API permissions" add the scopes your app needs. For typical OpenID Connect sign-in, request the `openid`, `profile`, and `email` scopes. If you need access to a custom API, expose an application ID URI (e.g. `api://<client-id>`) and create delegated scopes.
35
-
6. Determine your issuer (authority) URL:
36
-
- For a single tenant: `https://login.microsoftonline.com/<your-tenant-id>`
37
-
- For common/multi-tenant flows: `https://login.microsoftonline.com/common`
38
-
Use the `AZURE_ISSUER_URI` env var to set this (you can include the `/v2.0` suffix or we default to `v2.0` for endpoint assembly).
34
+
5. Under "Expose an API" or "API permissions" add the scopes your app needs. For typical OpenID Connect sign-in, request the `openid`, `profile`, and `email` scopes.
35
+
6. Determine your issuer (authority) URL as `AZURE_ISSUER_URI` env var.
36
+
- For a single tenant: `https://login.microsoftonline.com/<your-tenant-id>/v2.0`
37
+
- For common/multi-tenant flows: `https://login.microsoftonline.com/common/v2.0`
38
+
7. For multi-tenant apps, you can use the `AZURE_VALID_TENANT_IDS` env var to specify which comma-separated tenant IDs are allowed.
0 commit comments