Now we are going to add our frontend application as a trusted app for our backend. Call it “read”, and just fill in all the required fields with “read” (maybe write an actual description). If you have not created an Application ID URI, it will be autogenerated for you. Go to Expose an API in the sidebar and press add a scope. Navigate back to app registrations and click on your backend application. Now we need to add a scope of permissions to our API. Copy your frontend’s client ID, you will need later The redirect URI value must match with the domain where your frontend application is located(eg. In this example we are authenticating a Django Rest Framework token through a single page application(SPA). Just like we did with our backend application in step 1, we have to register a new app for our frontend. Step 3 - Register and configure an Azure AD frontend application ¶ It will be become hidden after a short time, so be sure to note this quickly. This is only used by you, to help keep track of in case you make more client secrets.Ĭopy your secret (value). Your application will use this to prove its identity when requesting a token. Next we need to generate a Client_Secret. This is how your Django project finds the right Azure application. Here you need to note down your Client_ID. When done registering, you will be redirected to your applications overview. The Redirect URI value must match with the domain where your Django application is located( eg. Here you need to add allowed redirect URIs.What type of accounts can access your application.Navigate to App Registrations, then click New registration in the upper left hand corner. Note down your Tenant_ID as you will need it later. Open the Azure Active Directory dashboard. Step 1 - Register a backend application ¶Īfter signing in to Azure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |