Skip to content

Commit 60f2437

Browse files
committed
art2-1
1 parent 3c0d345 commit 60f2437

1 file changed

Lines changed: 6 additions & 8 deletions

File tree

articles/container-apps/authentication-openid.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,19 +15,17 @@ This article shows you how to configure Azure Container Apps to use a custom aut
1515

1616
You can configure your app to use one or more OIDC providers. Each must be given a unique alphanumeric name in the configuration, and only one can serve as the default redirect target.
1717

18-
## <a name="openid-register"> </a>Register your application with the identity provider
18+
## Register your application with the identity provider
1919

2020
Your provider requires you to register the details of your application with it. One of these steps involves specifying a redirect URI. This redirect URI is of the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete these steps.
2121

2222
> [!NOTE]
23-
> Some providers may require additional steps for their configuration and how to use the values they provide. For example, Apple provides a private key which is not itself used as the OIDC client secret, and you instead must use it craft a JWT which is treated as the secret you provide in your app config (see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens))
24-
>
23+
> Some providers require further steps for their configuration and different guidance on how to use the values they provide. For example, Apple provides a private key, which isn't used as the OIDC client secret. Instead, you must use it to craft a JSON Web Token (JWT), which is treated as the secret you provide in your app config. For more information, see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens).
2524
2625
You need to collect a **client ID** and **client secret** for your application.
2726

2827
> [!IMPORTANT]
29-
> The client secret is a critical security credential. Do not share this secret with anyone or distribute it within a client application.
30-
>
28+
> The client secret is a critical security credential. Don't share this secret with anyone or distribute it within a client application.
3129
3230
Additionally, you need the OpenID Connect metadata for the provider. This information is often exposed via a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's Issuer URL suffixed with `/.well-known/openid-configuration`. Make sure to gather this configuration URL.
3331

@@ -38,7 +36,7 @@ If you're unable to use a configuration metadata document, you need to gather th
3836
- The [OAuth 2.0 Token endpoint](https://tools.ietf.org/html/rfc6749#section-3.2) (sometimes shown as `token_endpoint`)
3937
- The URL of the [OAuth 2.0 JSON Web Key Set](https://tools.ietf.org/html/rfc8414#section-2) document (sometimes shown as `jwks_uri`)
4038

41-
## <a name="openid-configure"> </a>Add provider information to your application
39+
## Add provider information to your application
4240

4341
1. Sign in to the [Azure portal] and navigate to your app.
4442

@@ -60,8 +58,8 @@ If you're unable to use a configuration metadata document, you need to gather th
6058

6159
Use the following guides for details on working with authenticated users.
6260

63-
* [Customize sign-in and sign-out](authentication.md#customize-sign-in-and-sign-out)
64-
* [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
61+
- [Customize sign-in and sign out](authentication.md#customize-sign-in-and-sign-out)
62+
- [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
6563

6664
## Next steps
6765

0 commit comments

Comments
 (0)