Skip to content

Commit ecb5d29

Browse files
authored
Revert configuration key to original key name (#33874)
1 parent d4d3760 commit ecb5d29

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

aspnetcore/blazor/security/blazor-web-app-with-oidc.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,15 +62,15 @@ This section explains how to configure the sample app.
6262

6363
[!INCLUDE[](~/blazor/security/includes/secure-authentication-flows.md)]
6464

65-
For local development testing, use the [Secret Manager tool](xref:security/app-secrets) to store the server app's client secret under the configuration key `MicrosoftOidc:ClientSecret`.
65+
For local development testing, use the [Secret Manager tool](xref:security/app-secrets) to store the server app's client secret under the configuration key `Authentication:Schemes:MicrosoftOidc:ClientSecret`.
6666

6767
> [!NOTE]
6868
> If the app uses Microsoft Entra ID or Azure AD B2C, create a client secret in the app's registration in the Entra or Azure portal (**Manage** > **Certificates & secrets** > **New client secret**). Use the **Value** of the new secret in the following guidance.
6969
7070
Execute the following command in a command shell from the server project's directory, such as the Developer PowerShell command shell in Visual Studio. The `{SECRET}` placeholder is the client secret obtained from the app's registration:
7171

7272
```dotnetcli
73-
dotnet user-secrets set "MicrosoftOidc:ClientSecret" "{SECRET}"
73+
dotnet user-secrets set "Authentication:Schemes:MicrosoftOidc:ClientSecret" "{SECRET}"
7474
```
7575

7676
If using Visual Studio, you can confirm the secret is set by right-clicking the server project in **Solution Explorer** and selecting **Manage User Secrets**.
@@ -308,15 +308,15 @@ This section explains how to configure the sample app.
308308

309309
[!INCLUDE[](~/blazor/security/includes/secure-authentication-flows.md)]
310310

311-
For local development testing, use the [Secret Manager tool](xref:security/app-secrets) to store the server app's client secret under the configuration key `MicrosoftOidc:ClientSecret`.
311+
For local development testing, use the [Secret Manager tool](xref:security/app-secrets) to store the server app's client secret under the configuration key `Authentication:Schemes:MicrosoftOidc:ClientSecret`.
312312

313313
> [!NOTE]
314314
> If the app uses Microsoft Entra ID or Azure AD B2C, create a client secret in the app's registration in the Entra or Azure portal (**Manage** > **Certificates & secrets** > **New client secret**). Use the **Value** of the new secret in the following guidance.
315315
316316
Execute the following command in a command shell from the server project's directory, such as the Developer PowerShell command shell in Visual Studio. The `{SECRET}` placeholder is the client secret obtained from the app's registration:
317317

318318
```dotnetcli
319-
dotnet user-secrets set "MicrosoftOidc:ClientSecret" "{SECRET}"
319+
dotnet user-secrets set "Authentication:Schemes:MicrosoftOidc:ClientSecret" "{SECRET}"
320320
```
321321

322322
If using Visual Studio, you can confirm the secret is set by right-clicking the server project in **Solution Explorer** and selecting **Manage User Secrets**.

0 commit comments

Comments
 (0)