Forum Discussion
Ashok_Mohanty
Feb 26, 2020Copper Contributor
Authorize access to web applications using OpenID Connect and Azure Active Directory
I have register my application with AD Tenant with following steps: 1. In the Azure Active Directory left menu, select App Registrations, and then select New registration. 2. Given application name...
- Feb 26, 2020Have you tried going to 'Enterprise Applications', finding your AAD App there and configuring 'User assignment required?' to Yes in Properties?
Thijs Lecomte
Feb 27, 2020Bronze Contributor
Have you configured all the settings in the 'authentication' tab of the app registration?
Ashok_Mohanty
Feb 27, 2020Copper Contributor
Thijs Lecomte I am using Authorize access to web applications using OpenID Connect and Azure Active Directory
https://docs.microsoft.com/en-us/azure/active-directory/azuread-dev/v1-protocols-openid-connect-code
In Authentication section i have set following attributes:
1. Redirect url set properly
2. Implicit grant enabled for Access Tokens and ID Tokens
3. Supported Account Type-
- Accounts in this organizational directory only (PerkinElmer Inc. only - Single tenant
4. Advanced Settings:-
Default Client Type:
Treat application as a public client.
Required for the use of the following flows where a redirect URI is not used: NO
- Thijs LecomteFeb 28, 2020Bronze Contributor
- Ashok_MohantyMar 03, 2020Copper Contributor
The issue resolved now. Thanks for your help.