Skip to content

Commit bf1e0b1

Browse files
committed
update the article
1 parent 46df7f1 commit bf1e0b1

1 file changed

Lines changed: 12 additions & 3 deletions

File tree

support/entra/entra-id/app-integration/enable-msal4j-logging-spring-boot-webapp.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,13 +65,22 @@ The sample uses Azure Active Directory B2C.
6565

6666
## Configuration for running the code sample
6767

68-
### HTTP support
68+
### Enable HTTPs support
6969

7070
The code sample uses HTTP protocol. Follow [Configure the sample to use your Azure AD B2C tenant](https://github.com/bachoang/MSAL4J_SpringBoot_Logging/tree/main/msal-b2c-web-sample#step-2--configure-the-sample-to-use-your-azure-ad-b2c-tenant) to generate a self-signed certificate and place the **keystore.p12** file in the resources folder.
7171

72-
### App registration
72+
### App registration configuration
7373

74-
Make sure you have 2 different app registrations in your Azure AD B2C tenant. One for the web app and one for the web API. Expose the scope in the web API (refer to this documentation if you are not familiar with how to expose web API scope) and configure the web API scope in the ‘API Permission’ blade for the web app. You should also grant admin consent to all the configured permission in the web app. You can also follow this tutorial for app registrations covered in this blog. Below is the example:
74+
Follow these step to configure app registration in Azure AD B2C:
75+
76+
1. Create two app registrations in your Azure AD B2C tenant: One for the web application. and the other for the web API.
77+
2. Expose the required scope in the web API. Refer to [this documentation](/azure/active-directory-b2c/configure-authentication-sample-web-app-with-api?tabs=visual-studio#step-22-configure-web-api-app-scopes) for guidance on exposing web API scopes.
78+
3. Configure the web API scope in the **API Permissions** blade for the web application.
79+
4. Grant admin consent to all configured permissions in the web application.
80+
81+
For more information, see [Configure authentication in a sample web app that calls a web API by using Azure AD B2C](/azure/active-directory-b2c/configure-authentication-sample-web-app-with-api).
82+
83+
Example configuration:
7584

7685
:::image type="content" source="media/enable-msal4j-logging-spring-boot-webapp/app-reg.png" alt-text="Diagram that shows configured app registration." border="true" lightbox="media/enable-msal4j-logging-spring-boot-webapp/app-reg.png":::
7786

0 commit comments

Comments
 (0)