You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-secure-spa-users.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: How to secure a single page application with user sign-in
3
3
titleSuffix: Azure Maps
4
-
description: How to configure a single page application which supports Azure AD single-sign-on with Azure Maps Web SDK.
4
+
description: How to configure a single page application that supports Azure AD single-sign-on with Azure Maps Web SDK.
5
5
author: eriklindeman
6
6
ms.author: eriklind
7
7
ms.date: 06/12/2020
@@ -13,7 +13,7 @@ ms.custom: devx-track-js
13
13
14
14
# Secure a single page application with user sign-in
15
15
16
-
The following guide pertains to an application which is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
16
+
The following guide pertains to an application that is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
:::image type="content" source="./media/how-to-manage-authentication/app-registration.png" alt-text="Screenshot showing the new registration page in the App registrations blade in Azure Active Directory.":::
28
27
29
-
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI which will represent the url which Azure AD will issue the token and is the url where the map control is hosted. For a detailed sample please see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
28
+
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI that represents the url which Azure AD issues the token and is the url where the map control is hosted. For a detailed sample, see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
30
29
31
30
3. To assign delegated API permissions to Azure Maps, go to the application. Then under **App registrations**, select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
32
31
33
-
> [!div class="mx-imgBorder"]
34
-
> 
32
+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="Screenshot showing a list of APIs my organization uses.":::
35
33
36
34
4. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
37
35
38
-
> [!div class="mx-imgBorder"]
39
-
> 
36
+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="Screenshot showing the request app API permissions screen.":::
40
37
41
38
5. Enable `oauth2AllowImplicitFlow`. To enable it, in the **Manifest** section of your app registration, set `oauth2AllowImplicitFlow` to `true`.
42
39
@@ -62,7 +59,7 @@ Create the web application in Azure AD for users to sign in. The web application
62
59
```
63
60
64
61
7. Configure Azure role-based access control (Azure RBAC) for users or groups. See the [following sections to enable Azure RBAC](#grant-role-based-access-for-users-to-azure-maps).
65
-
62
+
66
63
[!INCLUDE [grant role access to users](./includes/grant-rbac-users.md)]
0 commit comments