You are now ready to use Google for authentication in your app. The app can request scopes at login time which leverage these permissions. > For adding scope: You can define what permissions your application has in the provider's registration portal. To learn more about these options, see Authentication flow. You can change customize this behavior now or adjust these settings later from the main Authentication screen by choosing Edit next to Authentication settings. These options determine how your application responds to unauthenticated requests, and the default selections will redirect all requests to log in with this new provider. Otherwise, you may move on to the next step. If this is the first identity provider configured for the application, you will also be prompted with an App Service authentication settings section. You can update that setting later to use Key Vault references if you wish to manage the secret in Azure Key Vault. The secret will be stored as a slot-sticky application setting named GOOGLE_PROVIDER_AUTHENTICATION_SECRET. Paste in the App ID and App Secret values that you obtained previously. Select Google in the identity provider dropdown. Select Authentication in the menu on the left. Sign in to the Azure portal and navigate to your app. Do not share this secret with anyone or distribute it within a client application.Īdd Google information to your application The App secret is an important security credential.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |