Skip to content

Commit 0237e26

Browse files
committed
edits
1 parent b88d2c3 commit 0237e26

File tree

2 files changed

+19
-19
lines changed

2 files changed

+19
-19
lines changed

articles/azure-web-pubsub/howto-use-managed-identity.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ ms.author: lianwei
1010

1111
# Use a managed identity
1212

13-
This article shows you how to create and use a managed identity for Azure Web PubSub.
13+
This article shows you how to create and use a managed identity in Azure Web PubSub.
1414

1515
> [!IMPORTANT]
1616
> Azure Web PubSub can support only one managed identity. You can add *either* a system-assigned identity or a user-assigned identity.
1717
1818
## Add a system-assigned identity
1919

20-
To set up a managed identity in the Azure portal, create an Azure Web PubSub instance, and then enable the feature.
20+
To set up a managed identity in the Azure portal, create an Azure Web PubSub instance, and then turn on the feature.
2121

2222
1. In the Azure portal, create a Web PubSub resource. Go to the resource in the portal.
2323

@@ -41,13 +41,13 @@ To create a Web PubSub resource by using a user-assigned identity, create the id
4141

4242
1. Search for the identity that you created and select it. Select **Add**.
4343

44-
:::image type="content" source="media/howto-use-managed-identity/user-identity-portal.png" alt-text="Screenshot that shows adding a user-assigned identity in the Azure portal":::
44+
:::image type="content" source="media/howto-use-managed-identity/user-identity-portal.png" alt-text="Screenshot that shows adding a user-assigned identity in the Azure portal.":::
4545

4646
## Use a managed identity in client events scenarios
4747

48-
Azure Web PubSub is a fully managed service, so you can't use a managed identity to manually get tokens. Instead, when Web PubSub sends events to an event handler, it uses the managed identity to get an access token. The service then sets the access token in the `Authorization` header in the HTTP request.
48+
Azure Web PubSub is a fully managed service, so you can't use a managed identity to manually get tokens. Instead, when Web PubSub sends events to an event handler, it uses the managed identity to get an access token. The service then sets the access token in the `Authorization` header of the HTTP request.
4949

50-
### Managed identity authentication in event handler settings
50+
### Set up managed identity authentication for an event handler
5151

5252
1. Add a system-assigned identity or a user-assigned identity.
5353

@@ -63,11 +63,11 @@ Azure Web PubSub is a fully managed service, so you can't use a managed identity
6363
- Use the Application ID URI of the service principal.
6464

6565
> [!IMPORTANT]
66-
> Using an empty resource actually acquires a token target for Microsoft Graph. Currently, Microsoft Graph enables token encryption, so it's not supported for an application to authenticate the token other than with Microsoft Graph. You should always create a service principal to represent your upstream target. Set **Application ID** or **Application ID URI** for the service principal you created.
66+
> Using an empty resource actually acquires a token target for Microsoft Graph. Currently, Microsoft Graph enables token encryption, so it's not supported for an application to authenticate the token other than with Microsoft Graph. You should always create a service principal to represent your upstream target. Set the **Application ID** or **Application ID URI** value for the service principal you created.
6767
6868
#### Authentication in an Azure Functions app
6969

70-
You can easily set access validation for a Functions app without code changes.
70+
You can easily set access validation for a Functions app without making code changes.
7171

7272
1. In the Azure portal, go to the Functions app.
7373
1. On the left menu, select **Authentication**.
@@ -89,11 +89,11 @@ If you're not using the Web Apps feature of Azure App Service or Azure Functions
8989

9090
The token in the `Authorization` header is a [Microsoft identity platform access token](../active-directory/develop/access-tokens.md).
9191

92-
To validate access tokens, your app should also validate the audience and the signing tokens. Signing tokens must be validated against the values in the OpenID discovery document. For example, see the [tenant-independent version of the document](https://login.microsoftonline.com/common/.well-known/openid-configuration).
92+
To validate an access token, your app should also validate the audience and the signing token. Signing tokens must be validated against the values in the OpenID discovery document. For an example, see the [tenant-independent version of the document](https://login.microsoftonline.com/common/.well-known/openid-configuration).
9393

94-
The Microsoft Entra middleware has built-in capabilities for validating access tokens. You can browse our [samples](../active-directory/develop/sample-v2-code.md) to find one in the language that you want to use.
94+
Microsoft Entra middleware has built-in capabilities for validating access tokens. You can browse our [samples](../active-directory/develop/sample-v2-code.md) to find one that's written in the language you want to use.
9595

96-
We provide libraries and code samples that show you how to handle token validation. There are also several open-source partner libraries available for JSON Web Token (JWT) validation. There's at least one option for almost every platform and language. For more information about Microsoft Entra authorization libraries and code samples, see [Microsoft identity platform authentication libraries](../active-directory/develop/reference-v2-libraries.md).
96+
We provide libraries and code samples that show you how to handle token validation. Several open-source partner libraries also are available for JSON Web Token (JWT) validation. There's at least one option for almost every platform and language. For more information about Microsoft Entra authorization libraries and code samples, see [Microsoft identity platform authentication libraries](../active-directory/develop/reference-v2-libraries.md).
9797

9898
If the event handler hosts in Azure Functions or Web Apps, an easy way is to [configure Microsoft Entra sign-in](../app-service/configure-authentication-provider-aad.md).
9999

@@ -103,7 +103,7 @@ Web PubSub can access a key vault to get a secret by using a managed identity.
103103

104104
1. Add a system-assigned identity or a user-assigned identity for Azure Web PubSub.
105105

106-
1. In the key vault, grant secret read permissions for the managed identity via access policies. For more information, see [Assign a key vault access policy by using the Azure portal](/azure/key-vault/general/assign-access-policy-portal).
106+
1. In the key vault, grant secret read permissions for the managed identity by using access policies. For more information, see [Assign a key vault access policy in the Azure portal](/azure/key-vault/general/assign-access-policy-portal).
107107

108108
Currently, this feature can be used in the following scenario:
109109

articles/azure-web-pubsub/toc.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -84,33 +84,33 @@
8484
href: howto-monitor-data-reference.md
8585
- name: Secure
8686
items:
87-
- name: Protect the access key
87+
- name: Rotate access keys
8888
href: howto-secure-rotate-access-key.md
89-
- name: Application firewall
89+
- name: Set up an application firewall
9090
href: howto-configure-application-firewall.md
91-
- name: Use Azure Service Tags
91+
- name: Use service tags to control access
9292
href: howto-service-tags.md
93-
- name: Use Azure private endpoints
93+
- name: Use secure private endpoints
9494
href: howto-secure-private-endpoints.md
9595
- name: Manage network access control
9696
href: howto-secure-network-access-control.md
9797
- name: Secure outbound traffic through shared private endpoints
9898
href: howto-secure-shared-private-endpoints.md
99-
- name: Access Key Vault through shared private endpoints
99+
- name: Access a key vault through shared private endpoints
100100
href: howto-secure-shared-private-endpoints-key-vault.md
101101
- name: Use a managed identity
102102
href: howto-use-managed-identity.md
103103
- name: Configure Microsoft Entra authorizations
104104
items:
105-
- name: Authorize from Azure applications
105+
- name: Authorize from an Azure application
106106
href: howto-authorize-from-application.md
107-
- name: Authorize from managed identities
107+
- name: Authorize from a managed identity
108108
href: howto-authorize-from-managed-identity.md
109109
- name: Disable local authentication
110110
href: howto-disable-local-auth.md
111111
- name: Configure client certificate authentication
112112
href: howto-client-certificate.md
113-
- name: Custom domain
113+
- name: Add a custom domain
114114
href: howto-custom-domain.md
115115
- name: Scale and geo-replicate
116116
items:

0 commit comments

Comments
 (0)