Skip to content

Commit 8bc219b

Browse files
author
Tiago Brenck
authored
Merge pull request #306 from Azure-Samples/tibre/updateMT_Readme
Explanation about guest users on MT apps
2 parents 53a4b0a + a6e79e6 commit 8bc219b

File tree

2 files changed

+8
-0
lines changed

2 files changed

+8
-0
lines changed

Diff for: 2-WebApp-graph-user/2-3-Multi-Tenant/README-National-Cloud.md

+4
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,10 @@ services.AddAuthentication(AzureADDefaults.AuthenticationScheme)
240240

241241
You can read about the various endpoints of the Microsoft Identity Platform [here](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols#endpoints).
242242

243+
#### Implications of signing-in guest users on `/common` endpoint
244+
245+
Please note that if you sign-in guest users at the `/common` endpoint, they will be directed to their home tenant for signing-in. So, if your multi-tenant app cares about applying tenant specific conditional access policies, group assignments or app roles to be applied to the guest users, the app should sign-in the guest user on the **tenanted endpoint** (https://login.microsoftonline.com/{tenantId}) instead of the `/common` endpoint.
246+
243247
### Service principal provisioning for new tenants (onboarding process)
244248

245249
For a multi-tenant app to work across tenants, its service principal will need to be provisioned in the users' tenant. It can either happen when the first user signs in, or most tenant admins only allow a tenant admin to carry out the service principal provisioning. For provisioning, we will be using the [admin consent endpoint](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent) for the onboarding process. The code for this is provided in the `OnboardingController.cs`. The `Onboard` action and corresponding view, simulate the onboarding flow and experience.

Diff for: 2-WebApp-graph-user/2-3-Multi-Tenant/README.md

+4
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,10 @@ services.AddAuthentication(AzureADDefaults.AuthenticationScheme)
216216

217217
You can read about the various endpoints of the Microsoft Identity Platform [here](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols#endpoints).
218218

219+
#### Implications of signing-in guest users on `/common` endpoint
220+
221+
Please note that if you sign-in guest users at the `/common` endpoint, they will be directed to their home tenant for signing-in. So, if your multi-tenant app cares about applying tenant specific conditional access policies, group assignments or app roles to be applied to the guest users, the app should sign-in the guest user on the **tenanted endpoint** (https://login.microsoftonline.com/{tenantId}) instead of the `/common` endpoint.
222+
219223
### Service principal provisioning for new tenants (onboarding process)
220224

221225
For a multi-tenant app to work across tenants, its service principal will need to be provisioned in the users' tenant. It can either happen when the first user signs in, or most tenant admins only allow a tenant admin to carry out the service principal provisioning. For provisioning, we will be using the [admin consent endpoint](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent) for the onboarding process. The code for this is provided in the `OnboardingController.cs`. The `Onboard` action and corresponding view, simulate the onboarding flow and experience.

0 commit comments

Comments
 (0)