Skip to content

Commit bc37c60

Browse files
committed
yay!
1 parent 1d92c51 commit bc37c60

File tree

4 files changed

+16
-10
lines changed

4 files changed

+16
-10
lines changed

articles/ai-services/translator/entra/identity-platform/quickstart-register-app

Whitespace-only changes.

articles/ai-services/translator/how-to/microsoft-entra-id-auth.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,11 @@ To use Microsoft Entra authentication, key-based (local) authentication must be
128128

129129
Client applications utilize credentials to gain access to a web API. These credentials enable the application to authenticate independently, eliminating the need for user interaction, such as key entry, during runtime. Your application's client secret (application password) is a string that the application uses to prove its identity when requesting a token.
130130

131-
* From the main page window, select **`Add a certificate or secret`** then select **`New client secret`**.
131+
1. Select the Overview page from the left navigation menu.
132+
133+
:::image type="content" source="../media/entra-id/application-overview.png" alt-text="Screenshot of the app registration overview page in the Azure portal.":::
134+
135+
* Select **`Add a certificate or secret`** then select **`New client secret`**.
132136

133137
:::row:::
134138
:::column:::
@@ -145,9 +149,11 @@ Client applications utilize credentials to gain access to a web API. These crede
145149

146150
* Copy and paste the client secret **`Value`** in the same secure location as the `Application (client) ID` and `Directory (tenant) ID`, such as Windows Notepad. Client secret values can only be viewed immediately after creation. Be sure to save the secret before leaving the page.
147151

152+
:::image type="content" source="../media/entra-id/client-secret-value.png" alt-text="Screenshot of the client secret value location for a registered app in the Azure portal.":::
153+
148154
## Add API permissions
149155

150-
Next, let's add a permission that allows the application to access the Cognitive Services API as a user.
156+
Next, let's add a permission that allows the application to access the Cognitive Services APIs, including Azure AI Translator, as a user.
151157

152158
* In the left navigation menu, navigate to **`API permissions`** then select **`Add a permission`** from the main window.
153159

@@ -163,29 +169,29 @@ Next, let's add a permission that allows the application to access the Cognitive
163169
* Mark the **`Access Cognitive Services API as organization users`** checkbox.
164170
* Select **`Add permissions`**.
165171

166-
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
172+
:::image type="content" source="../media/entra-id/add-permissions.png" alt-text="Screenshot of the Azure Cognitive Services application permissions window.":::
167173

168-
Congratulations! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see* [Azure role-based access control](/azure/role-based-access-control/overview)
174+
That's it! The setup for your Microsoft Entra ID application is complete. Next, your Translator resource needs to grant your app access by adding a role assignment to your app specifically for the Translator resource. For more information, *see* [Azure role-based access control](/azure/role-based-access-control/overview)
169175

170-
## Assign the Cognitive Services Data Reader role to Translator resource
176+
## Assign the Cognitive Services User role to Azure AI Translator resource
171177

172-
Role-based access control (Azure `RBAC`) is a security principal that enables you to control access to Azure resources. You can use `RBAC` to grant access to any resource that supports Microsoft Entra authentication, in our case, your Translator instance. To grant your Microsoft Entra ID application access to your Translator resource, assign an Azure role using [Azure role-based access control (`Azure RBAC`)](/azure/role-based-access-control/overview).
178+
Role-based access control (Azure `RBAC`) is a security principal that enables you to control access to Azure resources. You can use `RBAC` to grant access to any resource that supports Microsoft Entra authentication, in our case, your Azure AI Translator instance. To grant your Microsoft Entra ID application access to your Translator resource, assign an Azure role using [Azure role-based access control (`Azure RBAC`)](/azure/role-based-access-control/overview).
173179

174-
* In the Azure portal, navigate to your Translator resource.
180+
* Staying in the Azure portal, navigate to your Azure AI Translator global resource.
175181

176182
* In the left menu, select **`Access control (IAM)`**.
177183

178184
* Select **`Add role assignment`** from the main window.
179185

180186
:::image type="content" source="../media/entra-id/add-role-assignment.png" alt-text="Screenshot of the Access control window.":::
181187

182-
* In the role dropdown menu, select **`Cognitive Services Data Reader`** and select the **`Next`** button.
188+
* In the left navigation name menu, select **`Cognitive Services User`** and select the **`Next`** button.
183189

184190
* On the `Add role assignment page`, assign access to **`User, group, or service principal`** .
185191

186192
* Choose **`Select members`**.
187193

188-
* In the window that opens, type the name of your registered app in the search box (for example, azure-ai-auth-app). Select the application and choose the `Select` button.
194+
* In the window that opens, type the name of your registered app in the search box (for example, text-translation-app). Select your application and choose the `Select` button.
189195

190196
* Complete the assignment process by selecting the `Review + assign` button.
191197

@@ -315,4 +321,4 @@ curl -X POST "https://{your-custom-domain}.cognitiveservices.azure.com/translato
315321

316322
Replace {your-custom-domain} with the value form the Azure portal and {access-token} with the token obtained from the previous step, [obtain an access token](#obtain-an-access-token-with-oauth-client-credentials-flow).
317323

318-
That's it! You now know how to use Microsoft Entra ID to authenticate requests to your Azure API.
324+
Congratulations! You now know how to use Microsoft Entra ID to authenticate requests to your Azure API.
151 KB
Loading
37.6 KB
Loading

0 commit comments

Comments
 (0)