You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/enable-msal4j-logging-spring-boot-webapp.md
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,13 +65,22 @@ The sample uses Azure Active Directory B2C.
65
65
66
66
## Configuration for running the code sample
67
67
68
-
### HTTP support
68
+
### Enable HTTPs support
69
69
70
70
The code sample uses HTTP protocol. Follow [Configure the sample to use your Azure AD B2C tenant](https://github.com/bachoang/MSAL4J_SpringBoot_Logging/tree/main/msal-b2c-web-sample#step-2--configure-the-sample-to-use-your-azure-ad-b2c-tenant) to generate a self-signed certificate and place the **keystore.p12** file in the resources folder.
71
71
72
-
### App registration
72
+
### App registration configuration
73
73
74
-
Make sure you have 2 different app registrations in your Azure AD B2C tenant. One for the web app and one for the web API. Expose the scope in the web API (refer to this documentation if you are not familiar with how to expose web API scope) and configure the web API scope in the ‘API Permission’ blade for the web app. You should also grant admin consent to all the configured permission in the web app. You can also follow this tutorial for app registrations covered in this blog. Below is the example:
74
+
Follow these step to configure app registration in Azure AD B2C:
75
+
76
+
1. Create two app registrations in your Azure AD B2C tenant: One for the web application. and the other for the web API.
77
+
2. Expose the required scope in the web API. Refer to [this documentation](/azure/active-directory-b2c/configure-authentication-sample-web-app-with-api?tabs=visual-studio#step-22-configure-web-api-app-scopes) for guidance on exposing web API scopes.
78
+
3. Configure the web API scope in the **API Permissions** blade for the web application.
79
+
4. Grant admin consent to all configured permissions in the web application.
80
+
81
+
For more information, see [Configure authentication in a sample web app that calls a web API by using Azure AD B2C](/azure/active-directory-b2c/configure-authentication-sample-web-app-with-api).
0 commit comments