Does OpenID Connect authorization affect API access only or can it replace the use of 'Username and password' as an Identity Provider when accessing developer portal content?
My goal is to replace Username and password with an [company] approved mechanism to authenticate (and so create or invite) a developer such that we're not storing their registration data (name & email address) in Azure. Need to be able to go beyond restricting API access to also restrict access to content in the portal (while working on a POC I'm restricting access to widget content using layer rules with "isAuthenticated" and url rules). It would currently appear that the only way of achieving this currently is using Delegation
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@jamesgallagher-ie Thank you for your feedback! We will investigate and get back to you with our findings.
@jamesgallagher-ie Yes you are correct that OpenID Connect authorization affect API access only.
You have an option to add different Identity providers from the list of options available in the drop-down. However, regarding the scenario you described above, delegation seems to be the option to go for.
Thank you very much for such a quick response