Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updated text to reflect current EntraID portal value #2634

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions power-platform/admin/programmability-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ This article provides an overview of the authentication setup for the various pr
For an overview of general Microsoft Entra client application creation, visit [Quickstart: Register an application with the Microsoft identity platform](/azure/active-directory/develop/quickstart-register-app). However, for Microsoft Power Platform, there are some specifics worth mentioning in the sections below.

### Authentication advanced settings
In the Azure portal, navigate to your newly created client application and select the **Manage - Authentication** tab. Under the **Advanced Settings** section, set the **Public Client** switch to **Yes**. This will ensure you can obtain a JSON Web Token (JWT) using simple username and password authentication. This type of authentication is required for interactive applications you might build and for registering a Service Principal entry in Microsoft Power Platform.
In the Azure portal, navigate to your newly created client application and select the **Manage - Authentication** tab. Under the **Advanced Settings** section, set the **Allow public client flows** switch to **Yes**. This will ensure you can obtain a JSON Web Token (JWT) using simple username and password authentication. This type of authentication is required for interactive applications you might build and for registering a Service Principal entry in Microsoft Power Platform.

### API permissions
In the Azure portal, navigate to the **Manage - API Permissions** tab. Under the **Configure permissions** section, select **Add a Permission**. On the dialog window that opens, select the **APIs my organization uses** tab, and then search for **Power Apps Service** (or **PowerApps service**). You might see several entries with a name similar to this, so ensure you use the one with the GUID **475226c6-020e-4fb2-8a90-7a972cbfc1d4**. Include all of the Delegated Permissions such as the **User permissions - Access the Power Apps Service API** option.
Expand Down Expand Up @@ -86,4 +86,4 @@ Use the **access_token** value in subsequent calls to the Power Platform API usi


### See also
[Preview: Creating a service principal application via API](powerplatform-api-create-service-principal.md)
[Preview: Creating a service principal application via API](powerplatform-api-create-service-principal.md)
Loading