Skip to content

Commit e6a3631

Browse files
authored
Merge pull request #3621 from MicrosoftDocs/portals-2069325
Portals auth update - 2069325
2 parents e3ae123 + 9529c0d commit e6a3631

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

powerapps-docs/maker/portals/configure/configure-openid-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To configure OpenID Connect provider:
7676
| Client ID | The ID of the application created with the identity provider and to be used with the portal. |
7777
| Redirect URL | The ___location where the identity provider will send the authentication response. <br> Example: `https://contoso-portal.powerappsportals.com/signin-openid_1` <br> **Note**: If you're using the default portal URL, you can copy and paste the **Reply URL** as shown in *Create and configure OpenID Connect provider* settings. If you're using a custom ___domain name, enter the URL manually. However, ensure that the value enter here is exactly the same as the **Redirect URI** value for the application in the identity provider configuration (such as Azure portal). |
7878
| Metadata address | The discovery endpoint for obtaining metadata. Common format: [Authority URL]/.well-known/openid-configuration. <br> Example (Azure AD) : `https://login.microsoftonline.com/7e6ea6c7-a751-4b0d-bbb0-8cf17fe85dbb/v2.0/.well-known/openid-configuration` |
79-
| Scope | A space-separated list of scopes to request via the OpenID Connect scope parameter. <br> Default value: `openid` <br> Example: `openid profile email` |
79+
| Scope | A space-separated list of scopes to request via the OpenID Connect scope parameter. <br> Default value: `openid` <br> Example (Azure AD) : `openid profile email` <br> More information: [Configure additional claims when using OpenID Connect for portals with Azure AD](configure-openid-settings.md#configure-additional-claims) |
8080
| Response type | The value for the OpenID Connect 'response_type' parameter. <br> Possible values: <ul> <li> `code` </li> <li> `code id_token` </li><li> `id_token` </li><li> `id_token token` </li><li> `code id_token token` </li> </ul> <br> Default: `code id_token` |
8181
| Client secret | The client secret value from the provider application. It may also be referred to as an "App Secret" or "Consumer Secret". This setting is required if the selected response type is “code”. |
8282
| Response mode | The value for the OpenID Connect “response_mode” parameter. The value should be “query” if the selected response type is “code”. Default value: ‘form_post’. |

powerapps-docs/maker/portals/configure/configure-openid-settings.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,14 +67,12 @@ To configure Azure AD as the OpenID Connect provider using Implicit Grant flow:
6767

6868
1. In the left menu, under **Manage**, select **Authentication**.
6969

70+
![Enable implicit grant flow with ID tokens](media/authentication/id-tokens-openid.png "Enable implicit grant flow with ID tokens")
71+
7072
1. Under **Implicit grant**, select **ID tokens** check box.
7173

7274
1. Select **Save**.
7375

74-
![Enable implicit grant flow with ID tokens](media/authentication/id-tokens-openid.png "Enable implicit grant flow with ID tokens")
75-
76-
1. Keep the Azure portal open, and switch to the OpenID Connect configuration for Power Apps portals for the next steps.
77-
7876
1. In this step, enter the site settings for the portal configuration.
7977

8078
![Configure OpenID Connect site settings](media/authentication/openid-site-settings-1.png "Configure OpenID Connect site settings")
@@ -133,7 +131,7 @@ To configure Azure AD as the OpenID Connect provider using Implicit Grant flow:
133131

134132
1. Select **Close**.
135133

136-
### Configure additional claims
134+
## Configure additional claims
137135

138136
To configure additional claims, such as using first name, or last name:
139137

0 commit comments

Comments
 (0)