Skip to content

Commit 231cea0

Browse files
”Grant frontend app access to backend” Section The document states:"Select Add a permission, then select My APIs > <front-end-app-name>." I believe this should be <back-end-app-name>, not <front-end-app-name> because this section is about granting the frontend app access to the backend app. "Configure App Service to return a usable access token" section The document contains the following code: authSettings=$(echo "$authSettings" | jq '.properties' | jq '.identityProviders.azureActiveDirectory.login += {"loginParameters":["scope==openid offline_access api://<back-end-client-id>/user_impersonation"]}') I think there is an extra "=" in the code for "scope==openid", and it should be modified to "scope=openid". After making this modification, the code should work correctly.
1 parent ac33bb4 commit 231cea0

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Diff for: articles/app-service/tutorial-auth-aad.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ In this step, you **grant the frontend app access to the backend app** on the us
216216

217217
1. In the **Authentication** page for the frontend app, select your frontend app name under **Identity provider**. This app registration was automatically generated for you. Select **API permissions** in the left menu.
218218

219-
1. Select **Add a permission**, then select **My APIs** > **\<front-end-app-name>**.
219+
1. Select **Add a permission**, then select **My APIs** > **\<back-end-app-name>**.
220220

221221
1. In the **Request API permissions** page for the backend app, select **Delegated permissions** and **user_impersonation**, then select **Add permissions**.
222222

@@ -230,7 +230,7 @@ In the Cloud Shell, run the following commands on the frontend app to add the `s
230230

231231
```azurecli-interactive
232232
authSettings=$(az webapp auth show -g myAuthResourceGroup -n <front-end-app-name>)
233-
authSettings=$(echo "$authSettings" | jq '.properties' | jq '.identityProviders.azureActiveDirectory.login += {"loginParameters":["scope==openid offline_access api://<back-end-client-id>/user_impersonation"]}')
233+
authSettings=$(echo "$authSettings" | jq '.properties' | jq '.identityProviders.azureActiveDirectory.login += {"loginParameters":["scope=openid offline_access api://<back-end-client-id>/user_impersonation"]}')
234234
az webapp auth set --resource-group myAuthResourceGroup --name <front-end-app-name> --body "$authSettings"
235235
```
236236

@@ -405,4 +405,4 @@ What you learned:
405405
Advance to the next tutorial to learn how to use this user's identity to access an Azure service.
406406
407407
> [!div class="nextstepaction"]
408-
> [Create a secure n-tier app in Azure App Service](tutorial-secure-ntier-app.md)
408+
> [Create a secure n-tier app in Azure App Service](tutorial-secure-ntier-app.md)

0 commit comments

Comments
 (0)