You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -258,20 +258,24 @@ New-AzRoleAssignment `
258
258
1. Create an [app registration](https://learn.microsoft.com/entra/identity-platform/quickstart-register-app#register-an-application) in Microsoft Entra ID for your Azure App Web App.
259
259
260
260
In the Redirect URIs section, select Web for platform and type the URI in the following format: "https://<webapp_name>.azurewebsites.net/.auth/login/aad/callback"
261
-
1. Click on _Authentication_ and under _Implicit grant and hybrid flows_, enable ID tokens to allow OpenID Connect user sign-ins from App Service. Select Save.
261
+
2. Click on _Authentication_ and under _Implicit grant and hybrid flows_, enable ID tokens to allow OpenID Connect user sign-ins from App Service. Select Save.
262
262
263
263

264
264
265
-
1. From the left navigation, select Expose an API > Add > Save.
265
+
3. From the left navigation, select Expose an API > Add > Save.
266
266
267
267

268
268
269
269

270
270
271
-
1. Click on _Add a scope_ and provide the values as the screenshot.
271
+
4. Click on _Add a scope_ and provide the values as the screenshot.
272
272
273
273

274
274
275
+
5. From the left navigation, select Manifest and set "groupMembershipClaims" to "SecurityGroup".
276
+
277
+

278
+
275
279
**:keyboard: Use PowerShell:**
276
280
277
281
```powershell
@@ -312,6 +316,7 @@ $body = @"
312
316
"identifierUris" : [
313
317
"api://$webAppSPAppId"
314
318
],
319
+
"groupMembershipClaims" : "SecurityGroup",
315
320
"api": {
316
321
"oauth2PermissionScopes": [
317
322
{
@@ -423,9 +428,9 @@ gh api -X PUT /repos/$GitHubOrg/$GitHubRepository/actions/permissions/workflow -
423
428
424
429

425
430
426
-
1. Run the _DeployAzGovVizAccelerator_ workflow to initialize the accelerator, deploy the Azure Web App and configure Microsoft Entra authentication for it.
431
+
2. Run the _DeployAzGovVizAccelerator_ workflow to initialize the accelerator, deploy the Azure Web App and configure Microsoft Entra authentication for it. By default, the web app is accessible to any authenticated user in the current tenant. To limit access to certain users, provide the ObjectId of an Entra ID group.
427
432
428
-

433
+

429
434
430
435

431
436
@@ -445,7 +450,7 @@ gh api -X PUT /repos/$GitHubOrg/$GitHubRepository/actions/permissions/workflow -
445
450
446
451

447
452
448
-
1. Then, run the _DeployAzGovViz_ workflow to deploy AzGovViz and publish it to the Azure Web App
453
+
3. Then, run the _DeployAzGovViz_ workflow to deploy AzGovViz and publish it to the Azure Web App
0 commit comments