You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/Authorization/AzureAD.md
+11-12Lines changed: 11 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,25 @@
1
1
### Azure Active Directory
2
2
3
-
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It includes support for various identity protocols, including OpenID Connect (OIDC), which is a standard protocol built on top of OAuth 2.0 for authentication and identity verification.
3
+
Microsoft Entra ID (old Azure AD) is Microsoft's cloud-based identity and access management service. It supports various identity protocols, including OpenID Connect (OIDC), a standard protocol built on top of OAuth 2.0 for authentication and identity verification.
4
4
5
-
For more information go to: https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
5
+
For more information, go to: https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
6
6
7
7
#### Register a client app in Azure
8
8
9
-
- Navigate to Azure Active Directory in the Azure portal. Select App registrations in the sidebar. Select the New registration button.
9
+
- Navigate to Azure Active Directory in the Azure portal. In the sidebar, select App registrations. Select the New registration button.
10
10
- Provide a Name for the app (for example, Blog Client AAD).
11
-
- Choose a Supported account types. You may select Accounts in this organizational directory only (single tenant).
12
-
- Set the Redirect URI dropdown list to Web and provide the following redirect URI: `https://localhost:PORT/callback` (please change port number). If you know the production redirect URI for the Azure default host (for example, azurewebsites.net) or the custom domain host (for example, contoso.com), you can also add the production redirect URI at the same time that you're providing the localhost redirect URI. Be sure to include the port number for non-:443 ports in any production redirect URIs that you add.
11
+
- Choose a Supported account types. You may select `Accounts in this organizational directory only (single tenant)`.
12
+
- Set the Redirect URI dropdown list to Web and provide the following redirect URI: `https://localhost:PORT/callback` (please change the port number). If you know the production redirect URI for the Azure default host (for example, azurewebsites.net) or the custom domain host (for example, contoso.com), you can also add the production redirect URI at the same time that you're providing the localhost redirect URI. Be sure to include the port number for non-:443 ports in any production redirect URIs that you add.
13
13
- Select Register.
14
14
- After Registration, go to Authentication and enable Access tokens and ID tokens inside Implicit grant and hybrid flows
15
-
- note down the Application (client) ID, tenant ID
16
-
- Go to Certificates & secrets and generate a new secret and note it down for future use
17
-
18
-
Fore more about application registration please visit : https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
15
+
- Write down the Application (client) ID and tenant ID.
16
+
- Go to Certificates & secrets, generate a new secret, and write it down for future use.
17
+
For more about application registration, please visit: https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
19
18
20
19
### Configuration
21
20
22
-
In `appsettings.json` change the `AuthenticationProvider` to `Auth0`
23
-
and add following configurations
21
+
In `appsettings.json`, change the `AuthenticationProvider` to `AzureAD`
22
+
and add the following configurations
24
23
25
24
```json
26
25
{
@@ -43,5 +42,5 @@ and add following configurations
43
42
|`name of the auth provider`|| Configuration for setting up the auth provider, it should be same as the value of AuthProvider property |
0 commit comments