From 2511f1cd7588983b9d17f0dab18870d20d3fd5f1 Mon Sep 17 00:00:00 2001 From: Joel Speed Date: Fri, 12 Apr 2019 11:08:26 +0200 Subject: [PATCH] Update README.md Co-Authored-By: martin-loetzsch --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8c9d56c..94f6202 100644 --- a/README.md +++ b/README.md @@ -96,7 +96,7 @@ Note: The user is checked against the group members list on initial authenticati ### Azure Auth Provider -1. Add an application: go to [https://portal.azure.com](https://portal.azure.com), choose "Azure Active Directory" in the left menu, select "App registrations" and then click on "New app registration". +1. Add an application: go to [https://portal.azure.com](https://portal.azure.com), choose **"Azure Active Directory"** in the left menu, select **"App registrations"** and then click on **"New app registration"**. 2. Pick a name and choose "Webapp / API" as application type. Use `https://internal.yourcompany.com` as Sign-on URL. Click "Create". 3. On the "Settings" / "Properties" page of the app, pick a logo and select "Multi-tenanted" if you want to allow users from multiple organizations to access your app. Note down the application ID. Click "Save". 4. On the "Settings" / "Required Permissions" page of the app, click on "Windows Azure Active Directory" and then on "Access the directory as the signed in user". Hit "Save" and then then on "Grant permissions" (you might need another admin to do this).