You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/translator/how-to/microsoft-entra-id-auth.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,11 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
128
128
129
129
Client applications utilize credentials to gain access to a web API. These credentials enable the application to authenticate independently, eliminating the need for user interaction, such as key entry, during runtime. Your application's client secret (application password) is a string that the application uses to prove its identity when requesting a token.
130
130
131
-
* From the main page window, select **`Add a certificate or secret`** then select **`New client secret`**.
131
+
1. Select the Overview page from the left navigation menu.
132
+
133
+
:::image type="content" source="../media/entra-id/application-overview.png" alt-text="Screenshot of the app registration overview page in the Azure portal.":::
134
+
135
+
* Select **`Add a certificate or secret`** then select **`New client secret`**.
132
136
133
137
:::row:::
134
138
:::column:::
@@ -145,9 +149,11 @@ Client applications utilize credentials to gain access to a web API. These crede
145
149
146
150
* Copy and paste the client secret **`Value`** in the same secure location as the `Application (client) ID` and `Directory (tenant) ID`, such as Windows Notepad. Client secret values can only be viewed immediately after creation. Be sure to save the secret before leaving the page.
147
151
152
+
:::image type="content" source="../media/entra-id/client-secret-value.png" alt-text="Screenshot of the client secret value location for a registered app in the Azure portal.":::
153
+
148
154
## Add API permissions
149
155
150
-
Next, let's add a permission that allows the application to access the Cognitive Services API as a user.
156
+
Next, let's add a permission that allows the application to access the Cognitive Services APIs, including Azure AI Translator, as a user.
151
157
152
158
* In the left navigation menu, navigate to **`API permissions`** then select **`Add a permission`** from the main window.
153
159
@@ -163,29 +169,29 @@ Next, let's add a permission that allows the application to access the Cognitive
163
169
* Mark the **`Access Cognitive Services API as organization users`** checkbox.
164
170
* Select **`Add permissions`**.
165
171
166
-
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
172
+
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
167
173
168
-
Congratulations! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see*[Azure role-based access control](/azure/role-based-access-control/overview)
174
+
That's it! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see*[Azure role-based access control](/azure/role-based-access-control/overview)
169
175
170
-
## Assign the Cognitive Services Data Reader role to Translator resource
176
+
## Assign the Cognitive Services User role to Azure AI Translator resource
171
177
172
-
Role-based access control (Azure `RBAC`) is a security principal that enables you to control access to Azure resources. You can use `RBAC` to grant access to any resource that supports Microsoft Entra authentication, in our case, your Translator instance. To grant your Microsoft Entra ID application access to your Translator resource, assign an Azure role using [Azure role-based access control (`Azure RBAC`)](/azure/role-based-access-control/overview).
178
+
Role-based access control (Azure `RBAC`) is a security principal that enables you to control access to Azure resources. You can use `RBAC` to grant access to any resource that supports Microsoft Entra authentication, in our case, your Azure AI Translator instance. To grant your Microsoft Entra ID application access to your Translator resource, assign an Azure role using [Azure role-based access control (`Azure RBAC`)](/azure/role-based-access-control/overview).
173
179
174
-
*In the Azure portal, navigate to your Translator resource.
180
+
*Staying in the Azure portal, navigate to your Azure AI Translator global resource.
175
181
176
182
* In the left menu, select **`Access control (IAM)`**.
177
183
178
184
* Select **`Add role assignment`** from the main window.
179
185
180
186
:::image type="content" source="../media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
181
187
182
-
* In the role dropdown menu, select **`Cognitive Services Data Reader`** and select the **`Next`** button.
188
+
* In the left navigation name menu, select **`Cognitive Services User`** and select the **`Next`** button.
183
189
184
190
* On the `Add role assignment page`, assign access to **`User, group, or service principal`** .
185
191
186
192
* Choose **`Select members`**.
187
193
188
-
* In the window that opens, type the name of your registered app in the search box (for example, azure-ai-auth-app). Select the application and choose the `Select` button.
194
+
* In the window that opens, type the name of your registered app in the search box (for example, text-translation-app). Select your application and choose the `Select` button.
189
195
190
196
* Complete the assignment process by selecting the `Review + assign` button.
191
197
@@ -315,4 +321,4 @@ curl -X POST "https://{your-custom-domain}.cognitiveservices.azure.com/translato
315
321
316
322
Replace {your-custom-domain} with the value form the Azure portal and {access-token} with the token obtained from the previous step, [obtain an access token](#obtain-an-access-token-with-oauth-client-credentials-flow).
317
323
318
-
That's it! You now know how to use Microsoft Entra ID to authenticate requests to your Azure API.
324
+
Congratulations! You now know how to use Microsoft Entra ID to authenticate requests to your Azure API.
0 commit comments