Learn how to secure your Azure mobile app by implementing authentication and authorization using Azure Active Directory.
- [Instructor] We can secure our mobile apps using Azure Active Directory just as we did for our web apps, and the process is very similar. I'm within our resource group, AzureMobileApp, and we'll be working with the mobile app we created in a previous lesson. I'm going to go ahead and open the blade for LilMobileApp, and you'll find authentication and authorization under settings. You may have to scroll down a little bit. I'm going to go ahead and open up that blade. By default, our app service authentication is turned off.
Right now, anonymous access is enabled on this app service app. Therefore, users are not prompted for login, but we want to change this and have them authenticate to Azure Active Directory. Therefore I'm going to turn on the service, and to further restrict these users, we're going to force them to authenticate to Azure Active Directory, but you'll notice that we do have other options here as well. We can use Facebook, Google, a Microsoft account, or a Twitter account.
Now we can go ahead and configure Azure Active Directory. We have three choices in our management mode, off, express, and advanced, and to recap the difference between express and advanced, the express mode will create the Azure Active Directory application in the current Azure Active Directory tenant. If the tenant that you sign into is different than the tenant that you wish to use, then you'll need to use the advanced mode and manually configure the settings. For our demonstration we're going to go ahead and use express.
Because we're using express, you'll notice that our active directory is already listed for us and we cannot change that. We can go ahead and create a new Azure Active Directory app, or we can selecting an existing Azure Active Directory app. For our demonstration today, we're going to go ahead and create a new Azure Active Directory app. Our app name is provided for us, we can go ahead and modify this if we wanted to do so. If you wanted to grant graph permissions or grant common data services permissions, you would go ahead and enable those as required. Next, you'll click OK.
One thing I do want to point out here that is somewhat different from our mobile apps, is different from our web apps, is in our mobile apps we need to assure that our custom domains have a corresponding SSL binding and .net version is configured to 4.5, and manage the pipeline mode is set to integrated. What will happen now is I'm going to go ahead and click save but I will have an error. For our demonstration today, we're going to ignore that error but in a production environment, you would definitely be ensuring that you have the requirements to enable authentication and authorization for your mobile app.
Learn the intermediate-level skills needed to design Azure web and mobile apps for any organization, using the Azure Web Apps and Mobile Apps services. Instructor Sharon Bennett, a Microsoft Certified Solutions Expert, covers securing mobile and web apps with Azure Active Directory, creating WebJobs to script tasks such as queue processing and file maintenance, and extending mobile apps with custom code. Plus, learn how to update, back up, and restore your Azure apps.
As an intermediate-level course, an existing understanding of the Azure platform is required. After completing the training, IT professionals will also be better prepared for Azure certification.
- Create Azure web apps
- Create WebJobs
- Using Traffic Manager
- Adding a CDN to web apps
- Updating, backing up, and restoring Azure Web Apps
- Deploying Azure mobile apps