2024-04-27 @ 11:30am
This video seems to be the best explanation (so far) for setting up AAD/Entra ID authX:
https://youtu.be/59YwW8FrLm8?si=vYWrvig_xphhHpef
and
https://www.youtube.com/watch?v=cUcn1gm_f-8&lc=UgzStvstCVYUUgJW8zl4AaABAg
2024-04-27 @ 11:30am
This video seems to be the best explanation (so far) for setting up AAD/Entra ID authX:
https://youtu.be/59YwW8FrLm8?si=vYWrvig_xphhHpef
and
https://www.youtube.com/watch?v=cUcn1gm_f-8&lc=UgzStvstCVYUUgJW8zl4AaABAg
Altering your .NET WebAPI to integrate Azure AD authentication and enriching user claims based on details from an internal API (EIP) involves several detailed steps. Below is a more extensive guide on how to achieve this:
First, ensure your WebAPI is registered in Azure AD:
Development/F-57061/US-63667/T-62825
dotnet user-secrets set eip:clientId 248052cd-239b-4703-aa8f-a7aefcab2f2f dotnet user-secrets set eip:clientSecret baJ8Q~WIGVEdgQbIoZnCHExCl6wdqrl.ngfRrbst dotnet user-secrets set eip:scope api://248052cd-239b-4703-aa8f-a7aefcab2f2f/.default dotnet user-secrets set eip:authUrl https://login.microsoftonline.com/1cabd5e8-e68a-4ad8-9a69-7f5f24e92af2/oauth2/v2.0/token dotnet user-secrets set eip:url https://appgw-ag-uks-eip-tst.uksouth.cloudapp.azure.com
policy/outwardPolicies?policyId=AA03AA524L31 var clientId = Configuration["Authentication:ClientId"];