You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Requires non-internal subscription - internal subscriptions doesn't provide permission to correctly configure Microsoft Entra apps
@@ -186,23 +186,16 @@ If you stop here, you have a self-contained app that's already secured by the Ap
186
186
187
187
1. In the [Azure portal](https://portal.azure.com) menu, select **Resource groups** or search for and select *Resource groups* from any page.
188
188
189
-
1. In **Resource groups**, find and select your resource group. In **Overview**, select your backend app's management page.
189
+
1. In **Resource groups**, find and select your resource group. In **Overview**, select your frontend app's management page.
190
190
191
-
:::image type="content" source="./media/tutorial-auth-aad/portal-navigate-back-end.png" alt-text="Screenshot of the Resource groups window, showing the Overview for an example resource group and a backend app's management page selected.":::
192
-
193
-
1. In your backend app's left menu, select **Authentication**, and then select **Add identity provider**.
191
+
1. In your frontend app's left menu, select **Authentication**, and then select **Add identity provider**.
194
192
195
193
1. In the **Add an identity provider** page, select **Microsoft** as the **Identity provider** to sign in Microsoft and Microsoft Entra identities.
196
194
197
195
1. Accept the default settings and select **Add**.
198
196
199
-
:::image type="content" source="./media/tutorial-auth-aad/configure-auth-back-end.png" alt-text="Screenshot of the backend app's left menu showing Authentication/Authorization selected and settings selected in the right menu.":::
200
-
201
197
1. The **Authentication** page opens. Copy the **Client ID** of the Microsoft Entra application to a notepad. You need this value later.
202
198
203
-
:::image type="content" source="./media/tutorial-auth-aad/get-application-id-back-end.png" alt-text="Screenshot of the Microsoft Entra Settings window showing the Microsoft Entra App, and the Microsoft Entra Applications window showing the Client ID to copy.":::
204
-
205
-
206
199
### Grant frontend app access to backend
207
200
208
201
Now that you've enabled authentication and authorization to both of your apps, each of them is backed by an AD application. To complete the authentication, you need to do three things:
@@ -231,6 +224,7 @@ The frontend app now has the required permissions to access the backend app as t
231
224
In the Cloud Shell, run the following commands on the frontend app to add the `scope` parameter to the authentication setting `identityProviders.azureActiveDirectory.login.loginParameters`. Replace *\<front-end-app-name>* and *\<back-end-client-id>*.
232
225
233
226
```azurecli-interactive
227
+
az extension add --name authV2
234
228
authSettings=$(az webapp auth show -g myAuthResourceGroup -n <front-end-app-name>)
0 commit comments