I'm facing a strange request.
We have an ASP CLASSIC application, and there is the need to make it run under Azure, with Active Directory authentication.
Is this even possible?
Any suggestion is appreciated
SOLUTION:
Using the editor in the App Service, and upload all the files of the ASP website
Enable Authentication through Microsoft Provider in the app service
On Azure Active Directory, in the Registered App, is possible to create groups and add user to be enabled to access the website
Related
Is it possible to remote-connect to an Azure App Service running on Windows with my IIS Manager?
This seems to have been possible according to this blog post by clicking in IIS Manager File -> Connect to a site.
I refer to the steps mentioned in the link shared by you and in the last step I got an error below.
I did some research on it and it looks like managing the App Service from IIS is not supported anymore. I have not got any official link but the below links might give you some information on it.
Microsoft.Web.Configuration.AppHostFileProvider not found after configured Remote IIS Administration for Microsoft Azure Web App
Can no longer manage any Web Apps with IIS Remote Manager - Could not load file or assembly - AppHostFileProvider
I'm not sure for what purpose why you want to. My thoughts is you shouldn't be doing that as it defeat the purpose of PaaS services. Cannot access the iis layer in app service however you can still configure in web.config of your web app.
we want to use azure web apps not only for production but also for pre-production sites. These sites should be accessible only for Users in our Azure AD or even better only users with specific roles in the Azure AD. Or as a workaround some form of authentification without changing the code of the App. Since the App should be available public in some point of time.
At the moment these web servers are hosted in our internal network so they are only accessible through vpn or on site.
How can I secure a pre-production web app?
I tried the built in authentifcation with AD but I can't authorize a specific AD Role or AD Directory without changing the application it self.
What would be perfect for us would be a simple Basic Auth on the web app which I understand is also not possible without changing the App.
Anyone facing the same problem?
Maybe there is a design pattern for this? Or some Gateway to handle this?
Any hints would help,
Thanks
Stefan
Follow this article which shows how to configure Azure App Service to use Azure Active Directory (Azure AD) as an authentication provider.
Some best practices when setting up your app and authentication:
Give each App Service app its own permissions and consent.
Configure each App Service app with its own registration.
Avoid permission sharing between environments by using separate app
registrations for separate deployment slots. When testing new
code, this practice can help prevent issues from affecting the
production app.
https://learn.microsoft.com/en-us/azure/app-service/configure-authentication-provider-aad
I have a .NET MVC 4 application with .net framework 4.6.1 with forms authentication enabled. Is it possible to have this hosted in Azure app services. I am not finding an option in app services to have forms authentication enabled and getting the attached message when I navigate to the website.
I have the application taking me to the login page on a local server with IIS however not being able to make it work in App services. Any help would be appreciated.
Thanks.
I was able to get this working by fixing a connection string which was causing an error however the message for default document not set in azure may have been misleading.
We have a Asp.Core Application hosted by App Service and we enable Azure Active Directory for the Authentication.
Do you know why after authentication we have this error :
You do not have permission to view this directory or page. azure asp core
Thank you
Make sure you can access the website without enabling Azure Active Directory. If you can, check the redirect url.
It should be
https://xxx.azurewebsites.net/.auth/login/aad/callback
Can you set up a nodejs based web site with single sign-on Windows Active Directory authentication for users?
I found this for setting up Windows Azure AD, but I am talking about an intranet site that would be hosted on a windows server and accessed by AD users on the intranet.
Yes, absolutely. Checkout https://github.com/auth0/passport-windowsauth which has IIS authentication support for Windows-based LDAP profiles.