Forum Discussion
Authorize access to web applications using OpenID Connect and Azure Active Directory
- Feb 26, 2020Have you tried going to 'Enterprise Applications', finding your AAD App there and configuring 'User assignment required?' to Yes in Properties?
- Ashok_MohantyFeb 27, 2020Copper Contributor
Thijs Lecomte Thank you so much for your help. It worked for me. But facing another issue. I can see my app in Azure application list. https://account.activedirectory.windowsazure.com/r#/applications. But when i am clicking on my app, its throwing the following error " You cannot access this application because it has been misconfigured. Contact your IT department and include the following information: Undefined Sign-On URL for application" But when i am trying my website url in browser it is working perfectly fine.
- Thijs LecomteFeb 27, 2020Bronze ContributorHave you configured all the settings in the 'authentication' tab of the app registration?
- Ashok_MohantyFeb 27, 2020Copper Contributor
Thijs Lecomte I am using Authorize access to web applications using OpenID Connect and Azure Active Directory
https://docs.microsoft.com/en-us/azure/active-directory/azuread-dev/v1-protocols-openid-connect-code
In Authentication section i have set following attributes:
1. Redirect url set properly
2. Implicit grant enabled for Access Tokens and ID Tokens
3. Supported Account Type-
- Accounts in this organizational directory only (PerkinElmer Inc. only - Single tenant
4. Advanced Settings:-
Default Client Type:
Treat application as a public client.
Required for the use of the following flows where a redirect URI is not used: NO