Forum Discussion
Ashok_Mohanty
Feb 26, 2020Copper Contributor
Authorize access to web applications using OpenID Connect and Azure Active Directory
I have register my application with AD Tenant with following steps: 1. In the Azure Active Directory left menu, select App Registrations, and then select New registration. 2. Given application name...
- Feb 26, 2020Have you tried going to 'Enterprise Applications', finding your AAD App there and configuring 'User assignment required?' to Yes in Properties?
Ashok_Mohanty
Feb 28, 2020Copper Contributor
Thijs Lecomte I am using Authorize access to web applications using OpenID Connect and Azure Active Directory
https://docs.microsoft.com/en-us/azure/active-directory/azuread-dev/v1-protocols-openid-connect-code
In Authentication section i have set following attributes:
1. Redirect url set properly
2. Implicit grant enabled for Access Tokens and ID Tokens
3. Supported Account Type-
- Accounts in this organizational directory only (PerkinElmer Inc. only - Single tenant
4. Advanced Settings:-
Default Client Type:
Treat application as a public client.
Required for the use of the following flows where a redirect URI is not used: NO
Thijs Lecomte
Feb 28, 2020Bronze Contributor
- Ashok_MohantyMar 03, 2020Copper Contributor
The issue resolved now. Thanks for your help.