Skip to content
This repository was archived by the owner on Feb 27, 2021. It is now read-only.

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
hajekj authored Aug 16, 2017
1 parent 9a7e36c commit b0b7940
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,4 +4,5 @@ Originally based on [hajekj/aad-b2b-multitenant](https://github.com/hajekj/aad-b
1. [Create an Azure AD application](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-integrating-applications#adding-an-application) in the [Portal](https://portal.azure.com).
2. Configure application's permissions to have access to *Windows Azure Service Management API* and also *Microsoft Graph* (add permissions to sign-in the user and read user's profile, read basic profiles of users and also access directory as currently signed in user)
3. Get the application's client id, client secret and configure the reply url to *http://localhost:5000/signin-oidc*
4. Replace the client id in the *appsettings.json* and place the client secret into [user secrets](https://docs.microsoft.com/en-us/aspnet/core/security/app-secrets#secret-manager) or environmental variables if deploying to Azure.
4. Replace the client id in the *appsettings.json* and place the client secret into [user secrets](https://docs.microsoft.com/en-us/aspnet/core/security/app-secrets#secret-manager) or environmental variables if deploying to Azure.
5. In order for this to work, due to current Microsoft Graph permission model, administrator in the foreign tenants has to approve the application. Either by simply signing to it and appending `&prompt=admin_consent` to the login URL or through the Azure Portal, in Enterprise Applications by clicking Grant Consent (we will eventually streamline this process to make the onboarding process more easier).

0 comments on commit b0b7940

Please sign in to comment.