Skip to content

Latest commit

 

History

History
40 lines (25 loc) · 3.07 KB

configure-authentication-user-identities.md

File metadata and controls

40 lines (25 loc) · 3.07 KB
title description ms.topic ms.date
User identities in AuthN/AuthZ
Learn how to access user identities when using the built-in authentication and authorization in App Service.
article
03/29/2021

Work with user identities in Azure App Service authentication

This article shows you how to work with user identities when using the the built-in authentication and authorization in App Service.

Access user claims in app code

For all language frameworks, App Service makes the claims in the incoming token (whether from an authenticated end user or a client application) available to your code by injecting them into the request headers. External requests aren't allowed to set these headers, so they are present only if set by App Service. Some example headers include:

  • X-MS-CLIENT-PRINCIPAL-NAME
  • X-MS-CLIENT-PRINCIPAL-ID

Code that is written in any language or framework can get the information that it needs from these headers.

Note

Different language frameworks may present these headers to the app code in different formats, such as lowercase or title case.

For ASP.NET 4.6 apps, App Service populates ClaimsPrincipal.Current with the authenticated user's claims, so you can follow the standard .NET code pattern, including the [Authorize] attribute. Similarly, for PHP apps, App Service populates the _SERVER['REMOTE_USER'] variable. For Java apps, the claims are accessible from the Tomcat servlet.

For Azure Functions, ClaimsPrincipal.Current is not populated for .NET code, but you can still find the user claims in the request headers, or get the ClaimsPrincipal object from the request context or even through a binding parameter. See working with client identities in Azure Functions for more information.

For .NET Core, Microsoft.Identity.Web supports populating the current user with App Service authentication. To learn more, you can read about it on the Microsoft.Identity.Web wiki, or see it demonstrated in this tutorial for a web app accessing Microsoft Graph.

Note

For claims mapping to work, you must enable the Token store.

Access user claims using the API

If the token store is enabled for your app, you can also obtain additional details on the authenticated user by calling /.auth/me.

Next steps

[!div class="nextstepaction"] Tutorial: Authenticate and authorize users end-to-end