You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/authentication-openid.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,19 +15,17 @@ This article shows you how to configure Azure Container Apps to use a custom aut
15
15
16
16
You can configure your app to use one or more OIDC providers. Each must be given a unique alphanumeric name in the configuration, and only one can serve as the default redirect target.
17
17
18
-
## <aname="openid-register"> </a>Register your application with the identity provider
18
+
## Register your application with the identity provider
19
19
20
20
Your provider requires you to register the details of your application with it. One of these steps involves specifying a redirect URI. This redirect URI is of the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete these steps.
21
21
22
22
> [!NOTE]
23
-
> Some providers may require additional steps for their configuration and how to use the values they provide. For example, Apple provides a private key which is not itself used as the OIDC client secret, and you instead must use it craft a JWT which is treated as the secret you provide in your app config (see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens))
24
-
>
23
+
> Some providers require further steps for their configuration and different guidance on how to use the values they provide. For example, Apple provides a private key, which isn't used as the OIDC client secret. Instead, you must use it to craft a JSON Web Token (JWT), which is treated as the secret you provide in your app config. For more information, see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens).
25
24
26
25
You need to collect a **client ID** and **client secret** for your application.
27
26
28
27
> [!IMPORTANT]
29
-
> The client secret is a critical security credential. Do not share this secret with anyone or distribute it within a client application.
30
-
>
28
+
> The client secret is a critical security credential. Don't share this secret with anyone or distribute it within a client application.
31
29
32
30
Additionally, you need the OpenID Connect metadata for the provider. This information is often exposed via a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's Issuer URL suffixed with `/.well-known/openid-configuration`. Make sure to gather this configuration URL.
33
31
@@ -38,7 +36,7 @@ If you're unable to use a configuration metadata document, you need to gather th
38
36
- The [OAuth 2.0 Token endpoint](https://tools.ietf.org/html/rfc6749#section-3.2) (sometimes shown as `token_endpoint`)
39
37
- The URL of the [OAuth 2.0 JSON Web Key Set](https://tools.ietf.org/html/rfc8414#section-2) document (sometimes shown as `jwks_uri`)
40
38
41
-
## <aname="openid-configure"> </a>Add provider information to your application
39
+
## Add provider information to your application
42
40
43
41
1. Sign in to the [Azure portal] and navigate to your app.
44
42
@@ -60,8 +58,8 @@ If you're unable to use a configuration metadata document, you need to gather th
60
58
61
59
Use the following guides for details on working with authenticated users.
62
60
63
-
*[Customize sign-in and sign-out](authentication.md#customize-sign-in-and-sign-out)
64
-
*[Access user claims in application code](authentication.md#access-user-claims-in-application-code)
61
+
-[Customize sign-in and signout](authentication.md#customize-sign-in-and-sign-out)
62
+
-[Access user claims in application code](authentication.md#access-user-claims-in-application-code)
0 commit comments