Skip to content

Commit 052f8f5

Browse files
Merge pull request #22 from microsoft/docs-deploy-instructions
Docs deploy instructions
2 parents 9041574 + 1092e00 commit 052f8f5

13 files changed

+146
-2
lines changed

docs/ConfigureAppAuthentication.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This document provides step-by-step instructions to configure Azure App Registra
44

55
## Prerequisites
66

7-
- Access to **Azure Active Directory (Azure AD)**
7+
- Access to **Microsoft Entra ID**
88
- Necessary permissions to create and manage **App Registrations**
99

1010
## Step 1: Add Authentication Provider
@@ -19,7 +19,12 @@ We will add Microsoft Entra ID as an authentication provider to API and Web Appl
1919
- Select **Microsoft** and set **Client secret expiration**, then click **Add** button.
2020
![add_auth_provider_web_2](./Images/add_auth_provider_web_2.png)
2121

22-
2. Add Authentication Provider in API Service
22+
> **Note:** If you encounter the following error message indicating that your organization's policy prohibits the automatic use of secrets, please refer to our [Manual App Registration Configuration](./ManualAppRegistrationConfiguration.md) for detailed manual setup instructions.
23+
> ![add_auth_provider_web_3](./Images/add_auth_provider_web_3.png)
24+
25+
26+
27+
1. Add Authentication Provider in API Service
2328

2429
- Go to deployed Container App and select `ca-cps-<randomname>-api` and click **Add Identity Provider** button in Authentication.
2530
![add_auth_provider_api_1](./Images/add_auth_provider_api_1.png)
@@ -58,6 +63,10 @@ We will add Microsoft Entra ID as an authentication provider to API and Web Appl
5863
- Grant admin consent to permissions.
5964
![configure_app_registration_web_8](./Images/configure_app_registration_web_8.png)
6065

66+
> ⚠️ **Granting Admin Consent:** If you don't have permission or aren't able to grant admin consent for the API permissions, please follow one of the steps below:<br/><br/>_Option 1 - Reach out to your Tenant Administrator:_ Contact your administrator to let them know your Application Registration ID and what permissions you woud like to have them consent and approve.<br/><br/>_Option 2 - Internal Microsoft Employees Only:_ Please refer to these detailed instructions on the admin consent granting process: [https://aka.ms/AzAdminConsentWiki](https://aka.ms/AzAdminConsentWiki)
67+
68+
69+
6170
3. Grab Scope Name for Impersonation
6271

6372
- Select **Expose an API** in the left menu. Copy the Scope name, then paste it in some temporary place.
280 KB
Loading
110 KB
Loading
49.8 KB
Loading
103 KB
Loading
88.2 KB
Loading
66.7 KB
Loading
49.8 KB
Loading
103 KB
Loading
88.6 KB
Loading

0 commit comments

Comments
 (0)