Web App Auth Settings Args
Configuration settings for the Azure App Service Authentication / Authorization feature. Azure REST API version: 2022-09-01. Prior API version in Azure Native 1.x: 2020-12-01. Other available API versions: 2020-10-01.
Example Usage
Update Auth Settings
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var webAppAuthSettings = new AzureNative.Web.WebAppAuthSettings("webAppAuthSettings", new()
{
AllowedExternalRedirectUrls = new[]
{
"sitef6141.customdomain.net",
"sitef6141.customdomain.info",
},
ClientId = "42d795a9-8abb-4d06-8534-39528af40f8e.apps.googleusercontent.com",
DefaultProvider = AzureNative.Web.BuiltInAuthenticationProvider.Google,
Enabled = true,
Name = "sitef6141",
ResourceGroupName = "testrg123",
RuntimeVersion = "~1",
TokenRefreshExtensionHours = 120,
TokenStoreEnabled = true,
UnauthenticatedClientAction = AzureNative.Web.UnauthenticatedClientAction.RedirectToLoginPage,
});
});
package main
import (
"github.com/pulumi/pulumi-azure-native-sdk/web/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := web.NewWebAppAuthSettings(ctx, "webAppAuthSettings", &web.WebAppAuthSettingsArgs{
AllowedExternalRedirectUrls: pulumi.StringArray{
pulumi.String("sitef6141.customdomain.net"),
pulumi.String("sitef6141.customdomain.info"),
},
ClientId: pulumi.String("42d795a9-8abb-4d06-8534-39528af40f8e.apps.googleusercontent.com"),
DefaultProvider: web.BuiltInAuthenticationProviderGoogle,
Enabled: pulumi.Bool(true),
Name: pulumi.String("sitef6141"),
ResourceGroupName: pulumi.String("testrg123"),
RuntimeVersion: pulumi.String("~1"),
TokenRefreshExtensionHours: pulumi.Float64(120),
TokenStoreEnabled: pulumi.Bool(true),
UnauthenticatedClientAction: web.UnauthenticatedClientActionRedirectToLoginPage,
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.web.WebAppAuthSettings;
import com.pulumi.azurenative.web.WebAppAuthSettingsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var webAppAuthSettings = new WebAppAuthSettings("webAppAuthSettings", WebAppAuthSettingsArgs.builder()
.allowedExternalRedirectUrls(
"sitef6141.customdomain.net",
"sitef6141.customdomain.info")
.clientId("42d795a9-8abb-4d06-8534-39528af40f8e.apps.googleusercontent.com")
.defaultProvider("Google")
.enabled(true)
.name("sitef6141")
.resourceGroupName("testrg123")
.runtimeVersion("~1")
.tokenRefreshExtensionHours(120)
.tokenStoreEnabled(true)
.unauthenticatedClientAction("RedirectToLoginPage")
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:web:WebAppAuthSettings authsettings /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/config/authsettings
Constructors
Functions
Properties
External URLs that can be redirected to as part of logging in or logging out of the app. Note that the query string part of the URL is ignored. This is an advanced setting typically only needed by Windows Store application backends. Note that URLs within the current domain are always implicitly allowed.
The Client ID of this relying party application, known as the client_id. This setting is required for enabling OpenID Connection authentication with Azure Active Directory or other 3rd party OpenID Connect providers. More information on OpenID Connect: http://openid.net/specs/openid-connect-core-1_0.html
The Client Secret of this relying party application (in Azure Active Directory, this is also referred to as the Key). This setting is optional. If no client secret is configured, the OpenID Connect implicit auth flow is used to authenticate end users. Otherwise, the OpenID Connect Authorization Code Flow is used to authenticate end users. More information on OpenID Connect: http://openid.net/specs/openid-connect-core-1_0.html
The OpenID Connect Issuer URI that represents the entity which issues access tokens for this application. When using Azure Active Directory, this value is the URI of the directory tenant, e.g. https://sts.windows.net/{tenant-guid}/. This URI is a case-sensitive identifier for the token issuer. More information on OpenID Connect Discovery: http://openid.net/specs/openid-connect-discovery-1_0.html