Skip to content

Commit b828887

Browse files
committed
touchups
1 parent cfe23d4 commit b828887

2 files changed

Lines changed: 12 additions & 14 deletions

File tree

articles/app-service/configure-authentication-provider-google.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To complete the procedure, you must have a Google account that has a verified em
2222
1. Follow the Google documentation at [Get your Google API client ID](https://developers.google.com/identity/gsi/web/guides/get-google-api-clientid) to create a client ID and client secret. You don't need to make any code changes.
2323
- For **Authorized JavaScript Origins**, use `https://<app-name>.azurewebsites.net`, replacing `<app-name>` with the name of your app.
2424
- For **Authorized Redirect URI**, use `https://<app-name>.azurewebsites.net/.auth/login/google/callback`.
25-
1. Make a note of the **App ID** and the **App Secret** values to use later.
25+
1. Make a note of the **App ID** and the **App Secret** values to use in the Azure app configuration.
2626

2727
> [!IMPORTANT]
2828
> The **App Secret** value is an important security credential. Don't share this secret with anyone or distribute it within a client application.
@@ -37,17 +37,15 @@ To complete the procedure, you must have a Google account that has a verified em
3737

3838
1. Enter the **App ID** and **App Secret** values you obtained previously.
3939

40-
1. If this is the first identity provider for the application, the **App Service authentication settings** section appears with settings such as how your application responds to unauthenticated requests. If you already configured a different identity provider for the app, this section doesn't appear.
41-
42-
The default selections redirect all requests to sign in with the new provider. You can customize this behavior now or later.
40+
1. If this is the first identity provider for the application, the **App Service authentication settings** section appears with settings such as how your application responds to unauthenticated requests. If you already configured an identity provider for the app, this section doesn't appear. The default selections redirect all requests to sign in with the new provider. You can customize this behavior now or later.
4341

4442
1. Select **Add**.
4543

4644
On the **Authentication** page, the **Google** provider now appears in the **Identity provider** section. You can edit the provider settings by selecting the pencil icon under **Edit**.
4745

48-
The **Authentication settings** section shows settings such as how the application responds to unauthenticated requests. The default selections redirect all requests to sign in with the new provider. You can edit these settings by selecting **Edit** next to **Authentication settings**. To learn more about the options, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).
46+
The **Authentication settings** section shows settings such as how the application responds to unauthenticated requests. You can edit these settings by selecting **Edit** next to **Authentication settings**. To learn more about the options, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).
4947

50-
The application secret is stored as a slot-sticky [application setting](configure-common.md#configure-app-settings) named `GOOGLE_PROVIDER_AUTHENTICATION_SECRET`. You can see the setting on the **App Settings** tab of your app's **Environment variables** page in the portal. If you want to manage the secret in Azure Key Vault, you can update the setting later to use [Key Vault references](app-service-key-vault-references.md).
48+
The application secret is stored as a slot-sticky [application setting](configure-common.md#configure-app-settings) named `GOOGLE_PROVIDER_AUTHENTICATION_SECRET`. You can see this setting on the **App Settings** tab of your app's **Environment variables** page in the portal. If you want to manage the secret in Azure Key Vault, you can update the setting to use [Key Vault references](app-service-key-vault-references.md).
5149

5250
> [!NOTE]
5351
> To add scopes, define the permissions your application has in the provider's registration portal. The app can request scopes that use these permissions at sign-in time.

articles/app-service/configure-authentication-provider-openid-connect.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,14 @@ You can configure your app to use one or more OIDC providers. You must give each
2020

2121
## <a name="register"> </a>Register your app with the OIDC identity provider
2222

23-
Your provider requires you to register your application by specifying a redirect URI in the form `<app-url>/.auth/login/<provider-name>/callback`. Replace `<app-url>` with your app URL and `<provider-name>` with the friendly name you are giving the OpenID provider in Azure.
23+
Your provider requires you to register your application by specifying a redirect URI in the form `<app-url>/.auth/login/<provider-name>/callback`. In the redirect URI, replace `<app-url>` with your app URL and `<provider-name>` with the friendly name you're giving the OpenID provider in Azure.
2424

2525
> [!NOTE]
2626
> The OpenID provider name can't contain a hyphen `-`, because an App Service application setting is created based on this name, and application settings don't support hyphens. You can use an underscore `_` instead.
2727
28-
When you register your app, you need to collect a *client ID* and a *client secret* for your application. Your app needs to provide the client secret if you want users to acquire access tokens using the interactive authorization code flow. If you don't want to acquire access tokens, you don't need to use a secret.
28+
When you register your app, you need to collect a *client ID* and a *client secret* for your application. Make a note of these values to use in the Azure app configuration.
29+
30+
Your app needs to provide the client secret if you want users to acquire access tokens using the interactive authorization code flow. If you don't want to acquire access tokens, you don't need to use a secret.
2931

3032
> [!IMPORTANT]
3133
> The client secret value is an important security credential. Don't share this secret with anyone or distribute it within a client application.
@@ -34,7 +36,7 @@ Each identity provider should provide instructions on how to complete the regist
3436

3537
You also need the provider's OIDC metadata. This metadata is often exposed in a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig) that you can get at the path formed by appending `/.well-known/openid-configuration` to the provider's issuer URL.
3638

37-
If you can't use a configuration metadata document, get the following values separately:
39+
If you can't access a configuration metadata document, get the following values separately:
3840

3941
- The issuer URL, sometimes shown as `issuer`.
4042
- The [OAuth 2.0 authorization endpoint](https://tools.ietf.org/html/rfc6749#section-3.1), sometimes shown as `authorization_endpoint`.
@@ -59,17 +61,15 @@ To configure the OpenID Connect provider in Azure, follow these steps:
5961

6062
1. Under **App registration**, provide the values you collected earlier for **Client ID** and **Client secret**.
6163

62-
1. If this is the first identity provider for the application, the **App Service authentication settings** section appears with settings such as how your application responds to unauthenticated requests. If you already configured an identity provider for the app, this section doesn't appear.
63-
64-
The default selections redirect all requests to sign in with the new provider. You can customize this behavior now or later.
64+
1. If this is the first identity provider for the application, the **App Service authentication settings** section appears with settings such as how your application responds to unauthenticated requests. If you already configured an identity provider for the app, this section doesn't appear. The default selections redirect all requests to sign in with the new provider. You can customize this behavior now or later.
6565

6666
1. Select **Add** to finish setting up the identity provider.
6767

6868
On the **Authentication** page, the OIDC provider friendly name appended with **(custom provider)** now appears in the **Identity provider** section. You can edit the settings by selecting the provider's pencil icon under **Edit**.
6969

70-
The **Authentication settings** section shows settings such as how the application responds to unauthenticated requests. The default selections redirect all requests to sign in with the new provider. You can edit these settings by selecting **Edit** next to **Authentication settings**. To learn more about the options, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).
70+
The **Authentication settings** section shows settings such as how the application responds to unauthenticated requests. You can edit these settings by selecting **Edit** next to **Authentication settings**. To learn more about the options, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).
7171

72-
The application secret is stored as a slot-sticky [application setting](configure-common.md#configure-app-settings) named `<friendly_name>_AUTHENTICATION_SECRET`. You can see the setting on the **App Settings** tab of your app's **Environment variables** page in the portal. If you want to manage the secret in Azure Key Vault, you can edit the setting to use [Key Vault references](app-service-key-vault-references.md).
72+
The application secret is stored as a slot-sticky [application setting](configure-common.md#configure-app-settings) named `<oidc_friendly_name>_AUTHENTICATION_SECRET`. You can see the setting on the **App Settings** tab of your app's **Environment variables** page in the portal. If you want to manage the secret in Azure Key Vault, you can edit the setting to use [Key Vault references](app-service-key-vault-references.md).
7373

7474
>[!NOTE]
7575
>To add scopes, define the permissions your application has in the provider's registration portal. The app can request scopes that use these permissions at sign-in time.

0 commit comments

Comments
 (0)