You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -41,8 +41,8 @@ Application Gateway doesn't maintain any session or cookie-based state. This app
41
41
- Outbound connectivity from the Application Gateway subnet to `login.microsoftonline.com` over TCP port 443.
42
42
43
43
- Microsoft Entra ID requirements:
44
-
-Register your web API in Microsoft Entra ID.
45
-
-Make a call to Microsoft Entra ID to request access to a service. Microsoft Entra ID responds with an access token.
44
+
-Registration of your web API in Microsoft Entra ID.
45
+
-A call to Microsoft Entra ID to request access to a service. Microsoft Entra ID responds with an access token.
46
46
47
47
- Configuration of JWT validation in Application Gateway.
48
48
@@ -56,6 +56,13 @@ Application Gateway doesn't maintain any session or cookie-based state. This app
56
56
57
57
1. For **Supported account types**, select **Accounts in this organizational directory only (Microsoft only - Single tenant)**.
58
58
59
+
> [!NOTE]
60
+
> Supported account types are:
61
+
>
62
+
> - Single tenant (this directory only)
63
+
> - Multitenant (any Microsoft Entra ID directory)
64
+
> - Accounts in any Microsoft Entra ID directory and personal Microsoft accounts
65
+
59
66
1. For **Redirect URI (optional)**, you can leave the boxes blank. This setting isn't required for API scenarios.
60
67
61
68
1. Select **Register**.
@@ -71,75 +78,70 @@ Application Gateway doesn't maintain any session or cookie-based state. This app
71
78
72
79
- Go to **Expose an API** > **Add a scope**.
73
80
74
-
This is for future authorization features (not required for Public Preview)
75
-
76
-
> [!NOTE]
77
-
> Supported account types are:
78
-
>
79
-
> Single tenant (This directory only)
80
-
>
81
-
> Multitenant (Any Azure AD directory)
82
-
>
83
-
> Accounts in any Azure AD directory + personal Microsoft accounts
81
+
This capability is for future authorization features. It's not required for the preview.
84
82
85
83
## Configure JWT validation in Application Gateway
86
84
87
85
1. Open the [preview configuration portal](https://ms.portal.azure.com/?feature.applicationgatewayjwtvalidation=true#home).
88
86
89
-
1. Open your Application Gateway, navigate to Settings in the left menu, and select the **JWT validation configuration** window.
87
+
1. Open your Application Gateway instance, go to **Settings** on the left menu, and then select **JWT validation configurations**.
90
88
91
-
:::image type="content" source="media/json-web-token-overview/json-web-token-configuration.png" alt-text="Screenshot of JSON Web Token configuration window for Application Gateway.":::
89
+
:::image type="content" source="media/json-web-token-overview/json-web-token-configuration.png" alt-text="Screenshot of the pane for updating JSON Web Token configuration for Application Gateway.":::
1. Associate the configuration with a **Routing rule** (see next section if new routing rule is needed).
101
+
1. Associate the configuration with a routing rule as described in the following section, if you need a new routing rule.
104
102
105
-
## Create a routing rule (if needed)
103
+
## Create a routing rule (if necessary)
106
104
107
105
1. Go to **Application Gateway** > **Rules** > **Add Routing rule**.
108
106
109
-
1. Enter or select the following:
110
-
-**Listener:** Protocol `HTTPS`, assign certificate, or Key Vault secret.
111
-
-**Backend target:** Select or create a backend pool.
112
-
-**Backend settings:** Use appropriate HTTP/HTTPS port.
113
-
-**Rule name:** For example,`jwt-route-rule`.
107
+
1. Enter or select the following items:
108
+
-**Listener**: Use the protocol `HTTPS`, an assigned certificate, or an Azure Key Vault secret.
109
+
-**Backend target**: Select or create a backend pool.
110
+
-**Backend settings**: Use an appropriate HTTP/HTTPS port.
111
+
-**Rule name**: Enter a name such as`jwt-route-rule`.
114
112
115
-
1. Link this rule to your JWT validation configuration. Your JWT validation configuration is now attached to a secure HTTPS listener and routing rule.
113
+
1. Link this rule to your JWT validation configuration.
114
+
115
+
Your JWT validation configuration is now attached to a secure HTTPS listener and routing rule.
116
116
117
117
## Send a JWT access token with every request to the secure application
118
118
119
-
To securely access an application protected by Application Gateway, the client must first obtain a JWT access token from the Microsoft Entra ID token endpoint. The client then includes this token in the authorization header (for example, Authorization: Bearer TOKEN) on every request it sends to Application Gateway. Application Gateway validates the token before forwarding the request to the backend application, ensuring that only authenticated and authorized traffic reaches the secure application.
119
+
To securely access an application that Application Gateway helps protect, the client must first obtain a JWT access token from the Microsoft Entra ID token endpoint. The client then includes this token in the authorization header (for example, `Authorization: Bearer TOKEN`) on every request that it sends to Application Gateway.
120
+
121
+
Application Gateway validates the token before forwarding the request to the backend application. This validation ensures that only authenticated and authorized traffic reaches the secure application.
120
122
121
-
Learn more about[Access tokens in the Microsoft identity platform](/entra/identity-platform/access-tokens).
123
+
For more information, see[Access tokens in the Microsoft identity platform](/entra/identity-platform/access-tokens).
0 commit comments