|
1 | 1 | # Note: If you are using Azure App Service, go to your app's Configuration, |
2 | 2 | # and then set the following values into your app's "Application settings". |
3 | 3 |
|
| 4 | +# The following variables are required for the app to run. |
4 | 5 | CLIENT_ID=<client id> |
5 | 6 | CLIENT_SECRET=<client secret> |
6 | 7 |
|
7 | | -# The AUTHORITY variable expects a full authority URL. |
| 8 | +# This sample can be configured as a Microsoft Entra ID app, |
| 9 | +# a Microsoft Entra External ID app, or a B2C app. |
| 10 | + |
| 11 | +# 1. If you are using a Microsoft Entra ID tenent, |
| 12 | +# configure the AUTHORITY variable as |
| 13 | +# "https://login.microsoftonline.com/TENANT_GUID" |
| 14 | +# or "https://login.microsoftonline.com/subdomain.onmicrosoft.com". |
8 | 15 | # |
9 | | -# If you are using an AAD tenent, configure it as |
10 | | -# "https://login.microsoftonline.com/TENANT_GUID" |
11 | | -# or "https://login.microsoftonline.com/subdomain.onmicrosoft.com". |
| 16 | +# Alternatively, leave it undefined if you are building a multi-tenant AAD app |
| 17 | +# in world-wide cloud |
| 18 | +#AUTHORITY=<authority url> |
12 | 19 | # |
13 | | -# If you are using a CIAM tenant, configure it as "https://subdomain.ciamlogin.com" |
14 | 20 | # |
15 | | -# Alternatively, leave it undefined if you are building a multi-tenant app in world-wide cloud |
| 21 | +# 2. If you are using a Microsoft Entra External ID for customers (CIAM) tenant, |
| 22 | +# configure AUTHORITY as "https://subdomain.ciamlogin.com" |
16 | 23 | #AUTHORITY=<authority url> |
| 24 | +# |
| 25 | +# |
| 26 | +# 3. If you are using a B2C tenant, configure the following variables: |
| 27 | +# Note the B2C_TENANT_NAME shall be the display name such as "contoso" |
| 28 | +# |
| 29 | +#B2C_TENANT_NAME=<tenant name> |
| 30 | +SIGNUPSIGNIN_USER_FLOW=B2C_1_signupsignin1 |
| 31 | +EDITPROFILE_USER_FLOW=B2C_1_profile_editing |
| 32 | +RESETPASSWORD_USER_FLOW=B2C_1_reset_password |
0 commit comments