Skip to content

Commit 8dfd5b2

Browse files
authored
small changes to the azure ad oidc doc (#3013)
* small changes to the azure ad oidc doc * fixed small typos
1 parent 8c104d5 commit 8dfd5b2

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

astro/src/content/docs/_shared/_idp-form-fields.astro

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ const { getStartedHref, getStartedText, idp, linkingStrategy, scopeDefault, scop
1414
</APIField>
1515

1616
{idp !== 'Steam' &&
17-
<APIField name="Client secret" required>The client secret obtained from {idp} used to authenticate the request. See <a href={getStartedHref}>{getStartedText}</a>.</APIField>}
17+
<APIField name="Client secret" required>The client secret obtained from {idp} and used to authenticate the request. See <a href={getStartedHref}>{getStartedText}</a>.</APIField>}
1818

1919
{ idp === 'Steam' &&
2020

astro/src/content/docs/lifecycle/authenticate-users/identity-providers/enterprise/azure-ad-oidc.mdx

+3-3
Original file line numberDiff line numberDiff line change
@@ -50,13 +50,13 @@ To create an Azure AD Identity Provider return to FusionAuth and navigate to <st
5050

5151
This will take you to the `Add OpenID Connect` panel, and you'll fill out the required fields.
5252

53-
You will need to set <InlineField>Client authentication method</InlineField> to `HTTP Basic authentication (client_secret_basic)`.
53+
You will need to set the <InlineField>Client authentication method</InlineField> to `HTTP Basic authentication (client_secret_basic)`.
5454

5555
<InlineField>Client Id</InlineField> and <InlineField>Client secret</InlineField> values reference the previously noted Azure AD Application's `Application (client) ID`, client secret `VALUE`. The <InlineField>Redirect URL</InlineField> is read only and generated for you based upon the URL of FusionAuth, this value should match the one you configured in your Azure application.
5656

57-
Azure AD has implemented a well-known configuration endpoint, FusionAuth will be able to discover the necessary endpoints using a discovery document by entering the Microsoft Authority URL (Issuer) in the <InlineField>Issuer</InlineField> field.
57+
Azure AD has implemented a well-known configuration endpoint, so FusionAuth will be able to discover the necessary endpoints using a discovery document by entering the Microsoft Authority URL in the <InlineField>Issuer</InlineField> field. To see the <InlineField>Issuer</InlineField> field, you may need to toggle <InlineField>Discover endpoints</InlineField>.
5858

59-
The Microsoft URL may diff across national clouds, so you will need to review the Microsoft documentation to ensure you have the correct URL for your region. For the Microsoft global Azure AD service, the URLs are as follows, where `{tenantId}` is the `Directory (tenant) ID` previously noted while creating our Azure AD Application.
59+
The Microsoft URL may differ across national clouds, so you will need to review the Microsoft documentation to ensure you have the correct URL for your region. For the Microsoft global Azure AD service, the URLs are as follows, where `{tenantId}` is the `Directory (tenant) ID` previously noted while creating our Azure AD Application.
6060

6161
- Azure AD v1 `https://login.microsoftonline.com/{tenantId}`
6262
- Azure AD v2 `https://login.microsoftonline.com/{tenantId}/v2.0`

0 commit comments

Comments
 (0)