Skip to content

Commit 0fd9aac

Browse files
committed
Fixes to address learn-build-service-prod warnings and suggestions
1 parent 7229845 commit 0fd9aac

File tree

3 files changed

+16
-12
lines changed

3 files changed

+16
-12
lines changed

articles/planetary-computer/create-connection-arc-gis-pro.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,9 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
2727
> [!TIP]
2828
> Before you begin, review [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app) for background information on app registration.
2929
30+
# [Public](#tab/public)
3031
## Register web API application for ArcGIS Pro
31-
### [Public](#tab/public)
32+
3233
1. Open the Azure Portal and go to **Microsoft Entra ID**.
3334

3435
[ ![Screenshot showing a user selecting Microsoft Entra ID from Azure portal.](media/microsoft-entra-id.png) ](media/microsoft-entra-id.png#lightbox)
@@ -104,7 +105,8 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
104105

105106
[ ![Screenshot showing how to add a client app.](media/add-a-client-app.png) ](media/add-a-client-app.png#lightbox)
106107

107-
### [US Gov](#tab/usgov)
108+
# [US Gov](#tab/usgov)
109+
## Register web API application for ArcGIS Pro
108110
1. Open the Azure Portal and go to **Microsoft Entra ID**.
109111

110112
[ ![Screenshot showing a user selecting Microsoft Entra ID from Azure portal.](media/microsoft-entra-id.png) ](media/microsoft-entra-id.png#lightbox)
@@ -140,11 +142,11 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
140142

141143
1. Set **Custom Redirect URI**: arcgis-pro://auth.
142144

143-
[ ![Screenshot showing configure desktop device.](media/usgov-mobile-redirect-1.png) ](media/usgov-mobile-redirect-1.png#lightbox)
145+
[ ![Screenshot showing configure desktop plus device with a redirect URI.](media/government-mobile-first-redirect.png) ](media/government-mobile-first-redirect.png#lightbox)
144146

145147
1. In the new **Mobile and desktop applications** panel, select *Add URI* to add a second Redirect URI: https://login.microsoftonline.us/common/oauth2/nativeclient
146148

147-
[ ![Screenshot showing configure desktop device.](media/usgov-mobile-redirect-2.png) ](media/usgov-mobile-redirect-2.png#lightbox)
149+
[ ![Screenshot showing the addition of a second Redirect URI.](media/government-mobile-second-redirect..png) ](media/government-mobile-second-redirect..png#lightbox)
148150

149151
1. Enable **ID tokens** under **Implicit grant and hybrid flows**.
150152

@@ -168,7 +170,7 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
168170

169171
- Add **App ID URI**.
170172

171-
[ ![Screenshot showing how to add the app id URI .](media/add-app-id-uri.png) ](media/add-app-id-uri.png#lightbox)
173+
[ ![Screenshot showing how to add the app id URI.](media/add-app-id-uri.png) ](media/add-app-id-uri.png#lightbox)
172174

173175
1. Define scopes:
174176

@@ -183,8 +185,8 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
183185

184186
[ ![Screenshot showing how to add a client app.](media/add-a-client-app.png) ](media/add-a-client-app.png#lightbox)
185187

188+
# [Public](#tab/public)
186189
## Register desktop client application for ArcGIS Pro
187-
### [Public](#tab/public)
188190

189191
Register a second application (with a distinct name) to represent ArcGIS
190192
Pro Desktop and configure its API permissions --- ensuring it includes
@@ -242,7 +244,8 @@ access to the web API exposed by the first application.
242244

243245
[ ![Screenshot showing grant admin consents (4).](media/grant-admin-consents-4.png) ](media/grant-admin-consents-4.png#lightbox)
244246

245-
### [US Gov](#tab/usgov)
247+
# [US Gov](#tab/usgov)
248+
## Register desktop client application for ArcGIS Pro
246249

247250
Register a second application (with a distinct name) to represent ArcGIS
248251
Pro Desktop and configure its API permissions --- ensuring it includes
@@ -305,8 +308,8 @@ access to the web API exposed by the first application.
305308

306309
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
307310

311+
# [Public](#tab/public)
308312
## Add an authentication connection
309-
### [Public](#tab/public)
310313

311314
1. Open the **ArcGIS Pro settings** page in one of the following ways:
312315

@@ -348,7 +351,8 @@ This section outlines how to configure authentication and data access in the **A
348351
> [!TIP]
349352
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
350353
351-
### [US Gov](#tab/usgov)
354+
# [US Gov](#tab/usgov)
355+
## Add an authentication connection
352356

353357
1. Open the **ArcGIS Pro settings** page in one of the following ways:
354358

@@ -400,7 +404,7 @@ This section outlines how to configure authentication and data access in the **A
400404

401405
1. Select on the GeoCatalog. For example, **arcgisprogeocatalog**.
402406

403-
1. Record the **GeoCatalog URI**. For example, **https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com**.
407+
1. Record the **GeoCatalog URI**. For example, ```https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com```.
404408

405409
[ ![Screenshot showing how to retrieve the GeoCatalog URI.](media/get-geocatalog-uri.png) ](media/get-geocatalog-uri.png#lightbox)
406410

@@ -448,9 +452,9 @@ This section outlines how to configure authentication and data access in the **A
448452

449453
1. For **Authentication**, select the name of the auth profile that you created in previous steps.
450454

451-
1. For **Access Key ID (Account Name)**, use the **Account Name** value that you recorded earlier: <unique-storage>.
455+
1. For **Access Key ID (Account Name)**, use the **Account Name** value that you recorded earlier: ```<unique-storage>```.
452456

453-
1. For **Bucket (Container) Name** use the **Container Name** value that you recorded earlier: sentinel-2-l2a-tutorial-1000-<unique-id>.
457+
1. For **Bucket (Container) Name** use the **Container Name** value that you recorded earlier: ```sentinel-2-l2a-tutorial-1000-<unique-id>```.
454458

455459
1. Do not specify a **Folder**.
456460

0 commit comments

Comments
 (0)