Skip to content

Commit 1d92c51

Browse files
committed
sync local and upstream
1 parent 4c08516 commit 1d92c51

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

articles/ai-services/translator/how-to/microsoft-entra-id-auth.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Before you get started, you need an Azure account and an Azure AI services subsc
3434
* An Azure AI Translator resource. Once you have your Azure subscription, create a [Translator single-service global resource](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) in the Azure portal.
3535

3636
> [!IMPORTANT]
37-
> [Regional endpoints](../cognitive-services-custom-subdomains.md#is-there-a-list-of-regional-endpoints) don't support Microsoft Entra authentication.
37+
> [Regional endpoints](../../cognitive-services-custom-subdomains.md#is-there-a-list-of-regional-endpoints) don't support Microsoft Entra authentication.
3838
3939
* curl command line tool installed.
4040

@@ -89,22 +89,22 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
8989

9090
* Enter `Microsoft Entra ID` in the search box at the top of the page.
9191

92-
:::image type="content" source="media/entra-id/azure-portal-search.png" alt-text="Screenshot of the Azure portal search box.":::
92+
:::image type="content" source="../media/entra-id/azure-portal-search.png" alt-text="Screenshot of the Azure portal search box.":::
9393

9494
* Select the `Microsoft Entra ID` service from the drop-down menu.
9595

96-
:::image type="content" source="media/entra-id/portal-search-results.png" alt-text="Screenshot of Microsoft Entra ID search results in the Azure portal.":::
96+
:::image type="content" source="../media/entra-id/portal-search-results.png" alt-text="Screenshot of Microsoft Entra ID search results in the Azure portal.":::
9797

9898
* Selecting `Microsoft Entra ID` opens your organization's overview page in the Azure portal.
9999

100100

101101
* From the left rail menu `Manage` node, select `App registrations`.
102102

103-
:::image type="content" source="media/entra-id/manage-app-registrations.png" alt-text="Screenshot of App registrations selection from the Manage menu.":::
103+
:::image type="content" source="../media/entra-id/manage-app-registrations.png" alt-text="Screenshot of App registrations selection from the Manage menu.":::
104104

105105
* Select `New registration` from the menu at the top of the main window.
106106

107-
:::image type="content" source="media/entra-id/new-registration-selection.png" alt-text="Screenshot of the New registration selection in the main window of the page.":::
107+
:::image type="content" source="../media/entra-id/new-registration-selection.png" alt-text="Screenshot of the New registration selection in the main window of the page.":::
108108

109109
* Complete the application registration fields:<br><br>
110110

@@ -117,7 +117,7 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
117117

118118
* Once registration completes, The app's registration **Overview** pane is displayed. The **Application (client) ID**, also called the `client ID`, value uniquely identifies your application in the Microsoft identity platform.
119119

120-
:::image type="content" source="media/entra-id/app-registration-overview.png" alt-text="Screenshot of the app registration overview page.":::
120+
:::image type="content" source="../media/entra-id/app-registration-overview.png" alt-text="Screenshot of the app registration overview page.":::
121121

122122
* Before you leave the App registration overview page, copy and paste the following values in a secure and convenient location, such as Windows Notepad:
123123

@@ -132,16 +132,16 @@ Client applications utilize credentials to gain access to a web API. These crede
132132

133133
:::row:::
134134
:::column:::
135-
:::image type="content" source="media/entra-id/add-secret.png" alt-text="Screenshot of add secret link in the Azure portal.":::
135+
:::image type="content" source="../media/entra-id/add-secret.png" alt-text="Screenshot of add secret link in the Azure portal.":::
136136
:::column-end:::
137137
:::column:::
138-
:::image type="content" source="media/entra-id/new-client-secret.png" alt-text="Screenshot of new client secret button in the Azure portal.":::
138+
:::image type="content" source="../media/entra-id/new-client-secret.png" alt-text="Screenshot of new client secret button in the Azure portal.":::
139139
:::column-end:::
140140
:::row-end:::
141141

142142
* In the **`Add a client secret`** window, add a description, set an expiry period, and then select the **`Add`** button.
143143

144-
:::image type="content" source="media/entra-id/add-new-client-secret.png" alt-text="Screenshot of the Add a client secret setup window.":::
144+
:::image type="content" source="../media/entra-id/add-new-client-secret.png" alt-text="Screenshot of the Add a client secret setup window.":::
145145

146146
* Copy and paste the client secret **`Value`** in the same secure location as the `Application (client) ID` and `Directory (tenant) ID`, such as Windows Notepad. Client secret values can only be viewed immediately after creation. Be sure to save the secret before leaving the page.
147147

@@ -151,19 +151,19 @@ Next, let's add a permission that allows the application to access the Cognitive
151151

152152
* In the left navigation menu, navigate to **`API permissions`** then select **`Add a permission`** from the main window.
153153

154-
:::image type="content" source="media/entra-id/add-api-permissions.png" alt-text="Screenshot of API permissions view in the Azure portal.":::
154+
:::image type="content" source="../media/entra-id/add-api-permissions.png" alt-text="Screenshot of API permissions view in the Azure portal.":::
155155

156156
* From the new window that appears select **`APIs my organization uses`** and then type **`Microsoft Cognitive Services`** in the search bar.
157157

158-
:::image type="content" source="media/entra-id/request-api-permissions.png" alt-text="Screenshot of the Request API permissions search window":::
158+
:::image type="content" source="../media/entra-id/request-api-permissions.png" alt-text="Screenshot of the Request API permissions search window":::
159159

160160
* Select **`Microsoft Cognitive Services`** from the search results.
161161

162162
* In the new window, under **`Permissions`**, select **`Delegated permissions`**.
163163
* Mark the **`Access Cognitive Services API as organization users`** checkbox.
164164
* Select **`Add permissions`**.
165165

166-
:::image type="content" source="media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
166+
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
167167

168168
Congratulations! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see* [Azure role-based access control](/azure/role-based-access-control/overview)
169169

@@ -177,7 +177,7 @@ Role-based access control (Azure `RBAC`) is a security principal that enables yo
177177

178178
* Select **`Add role assignment`** from the main window.
179179

180-
:::image type="content" source="media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
180+
:::image type="content" source="../media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
181181

182182
* In the role dropdown menu, select **`Cognitive Services Data Reader`** and select the **`Next`** button.
183183

@@ -191,10 +191,10 @@ Role-based access control (Azure `RBAC`) is a security principal that enables yo
191191

192192
:::row:::
193193
:::column:::
194-
:::image type="content" source="media/entra-id/add-members.png" alt-text="Screenshot of add role assignment members window.":::
194+
:::image type="content" source="../media/entra-id/add-members.png" alt-text="Screenshot of add role assignment members window.":::
195195
:::column-end:::
196196
:::column:::
197-
:::image type="content" source="media/entra-id/select-members.png" alt-text="Screenshot of select members window in the Azure portal.":::
197+
:::image type="content" source="../media/entra-id/select-members.png" alt-text="Screenshot of select members window in the Azure portal.":::
198198
:::column-end:::
199199
:::row-end:::
200200

@@ -267,7 +267,7 @@ To make a valid REST API request, the following values are required:
267267
* Resource ID format:
268268
`/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.CognitiveServices/accounts/<resourceName>/`
269269

270-
:::image type="content" source="media/managed-identities/resource-id-property.png" alt-text="Screenshot of Resource ID value location in the Azure portal.":::
270+
:::image type="content" source="../media/managed-identities/resource-id-property.png" alt-text="Screenshot of Resource ID value location in the Azure portal.":::
271271

272272
* Replace {your-resource-ID} with the value from the Azure portal and {access-token} with the value obtained from the previous step: [obtain an access token](#obtain-an-access-token-with-oauth-client-credentials-flow).
273273

0 commit comments

Comments
 (0)