You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/translator/how-to/microsoft-entra-id-auth.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Before you get started, you need an Azure account and an Azure AI services subsc
34
34
* An Azure AI Translator resource. Once you have your Azure subscription, create a [Translator single-service global resource](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) in the Azure portal.
35
35
36
36
> [!IMPORTANT]
37
-
> [Regional endpoints](../cognitive-services-custom-subdomains.md#is-there-a-list-of-regional-endpoints) don't support Microsoft Entra authentication.
37
+
> [Regional endpoints](../../cognitive-services-custom-subdomains.md#is-there-a-list-of-regional-endpoints) don't support Microsoft Entra authentication.
38
38
39
39
* curl command line tool installed.
40
40
@@ -89,22 +89,22 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
89
89
90
90
* Enter `Microsoft Entra ID` in the search box at the top of the page.
91
91
92
-
:::image type="content" source="media/entra-id/azure-portal-search.png" alt-text="Screenshot of the Azure portal search box.":::
92
+
:::image type="content" source="../media/entra-id/azure-portal-search.png" alt-text="Screenshot of the Azure portal search box.":::
93
93
94
94
* Select the `Microsoft Entra ID` service from the drop-down menu.
95
95
96
-
:::image type="content" source="media/entra-id/portal-search-results.png" alt-text="Screenshot of Microsoft Entra ID search results in the Azure portal.":::
96
+
:::image type="content" source="../media/entra-id/portal-search-results.png" alt-text="Screenshot of Microsoft Entra ID search results in the Azure portal.":::
97
97
98
98
* Selecting `Microsoft Entra ID` opens your organization's overview page in the Azure portal.
99
99
100
100
101
101
* From the left rail menu `Manage` node, select `App registrations`.
102
102
103
-
:::image type="content" source="media/entra-id/manage-app-registrations.png" alt-text="Screenshot of App registrations selection from the Manage menu.":::
103
+
:::image type="content" source="../media/entra-id/manage-app-registrations.png" alt-text="Screenshot of App registrations selection from the Manage menu.":::
104
104
105
105
* Select `New registration` from the menu at the top of the main window.
106
106
107
-
:::image type="content" source="media/entra-id/new-registration-selection.png" alt-text="Screenshot of the New registration selection in the main window of the page.":::
107
+
:::image type="content" source="../media/entra-id/new-registration-selection.png" alt-text="Screenshot of the New registration selection in the main window of the page.":::
108
108
109
109
* Complete the application registration fields:<br><br>
110
110
@@ -117,7 +117,7 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
117
117
118
118
* Once registration completes, The app's registration **Overview** pane is displayed. The **Application (client) ID**, also called the `client ID`, value uniquely identifies your application in the Microsoft identity platform.
119
119
120
-
:::image type="content" source="media/entra-id/app-registration-overview.png" alt-text="Screenshot of the app registration overview page.":::
120
+
:::image type="content" source="../media/entra-id/app-registration-overview.png" alt-text="Screenshot of the app registration overview page.":::
121
121
122
122
* Before you leave the App registration overview page, copy and paste the following values in a secure and convenient location, such as Windows Notepad:
123
123
@@ -132,16 +132,16 @@ Client applications utilize credentials to gain access to a web API. These crede
132
132
133
133
:::row:::
134
134
:::column:::
135
-
:::image type="content" source="media/entra-id/add-secret.png" alt-text="Screenshot of add secret link in the Azure portal.":::
135
+
:::image type="content" source="../media/entra-id/add-secret.png" alt-text="Screenshot of add secret link in the Azure portal.":::
136
136
:::column-end:::
137
137
:::column:::
138
-
:::image type="content" source="media/entra-id/new-client-secret.png" alt-text="Screenshot of new client secret button in the Azure portal.":::
138
+
:::image type="content" source="../media/entra-id/new-client-secret.png" alt-text="Screenshot of new client secret button in the Azure portal.":::
139
139
:::column-end:::
140
140
:::row-end:::
141
141
142
142
* In the **`Add a client secret`** window, add a description, set an expiry period, and then select the **`Add`** button.
143
143
144
-
:::image type="content" source="media/entra-id/add-new-client-secret.png" alt-text="Screenshot of the Add a client secret setup window.":::
144
+
:::image type="content" source="../media/entra-id/add-new-client-secret.png" alt-text="Screenshot of the Add a client secret setup window.":::
145
145
146
146
* Copy and paste the client secret **`Value`** in the same secure location as the `Application (client) ID` and `Directory (tenant) ID`, such as Windows Notepad. Client secret values can only be viewed immediately after creation. Be sure to save the secret before leaving the page.
147
147
@@ -151,19 +151,19 @@ Next, let's add a permission that allows the application to access the Cognitive
151
151
152
152
* In the left navigation menu, navigate to **`API permissions`** then select **`Add a permission`** from the main window.
153
153
154
-
:::image type="content" source="media/entra-id/add-api-permissions.png" alt-text="Screenshot of API permissions view in the Azure portal.":::
154
+
:::image type="content" source="../media/entra-id/add-api-permissions.png" alt-text="Screenshot of API permissions view in the Azure portal.":::
155
155
156
156
* From the new window that appears select **`APIs my organization uses`** and then type **`Microsoft Cognitive Services`** in the search bar.
157
157
158
-
:::image type="content" source="media/entra-id/request-api-permissions.png" alt-text="Screenshot of the Request API permissions search window":::
158
+
:::image type="content" source="../media/entra-id/request-api-permissions.png" alt-text="Screenshot of the Request API permissions search window":::
159
159
160
160
* Select **`Microsoft Cognitive Services`** from the search results.
161
161
162
162
* In the new window, under **`Permissions`**, select **`Delegated permissions`**.
163
163
* Mark the **`Access Cognitive Services API as organization users`** checkbox.
164
164
* Select **`Add permissions`**.
165
165
166
-
:::image type="content" source="media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
166
+
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
167
167
168
168
Congratulations! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see*[Azure role-based access control](/azure/role-based-access-control/overview)
169
169
@@ -177,7 +177,7 @@ Role-based access control (Azure `RBAC`) is a security principal that enables yo
177
177
178
178
* Select **`Add role assignment`** from the main window.
179
179
180
-
:::image type="content" source="media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
180
+
:::image type="content" source="../media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
181
181
182
182
* In the role dropdown menu, select **`Cognitive Services Data Reader`** and select the **`Next`** button.
183
183
@@ -191,10 +191,10 @@ Role-based access control (Azure `RBAC`) is a security principal that enables yo
191
191
192
192
:::row:::
193
193
:::column:::
194
-
:::image type="content" source="media/entra-id/add-members.png" alt-text="Screenshot of add role assignment members window.":::
194
+
:::image type="content" source="../media/entra-id/add-members.png" alt-text="Screenshot of add role assignment members window.":::
195
195
:::column-end:::
196
196
:::column:::
197
-
:::image type="content" source="media/entra-id/select-members.png" alt-text="Screenshot of select members window in the Azure portal.":::
197
+
:::image type="content" source="../media/entra-id/select-members.png" alt-text="Screenshot of select members window in the Azure portal.":::
198
198
:::column-end:::
199
199
:::row-end:::
200
200
@@ -267,7 +267,7 @@ To make a valid REST API request, the following values are required:
:::image type="content" source="media/managed-identities/resource-id-property.png" alt-text="Screenshot of Resource ID value location in the Azure portal.":::
270
+
:::image type="content" source="../media/managed-identities/resource-id-property.png" alt-text="Screenshot of Resource ID value location in the Azure portal.":::
271
271
272
272
* Replace {your-resource-ID} with the value from the Azure portal and {access-token} with the value obtained from the previous step: [obtain an access token](#obtain-an-access-token-with-oauth-client-credentials-flow).
0 commit comments