Skip to content

Commit 14200ac

Browse files
authored
Merge pull request #108401 from stevemunk/how-to-secure-spa-users
How to secure SPQ users: Improved grammar and updated image file links.
2 parents 622c147 + d948d14 commit 14200ac

File tree

1 file changed

+7
-10
lines changed

1 file changed

+7
-10
lines changed

articles/azure-maps/how-to-secure-spa-users.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to secure a single page application with user sign-in
33
titleSuffix: Azure Maps
4-
description: How to configure a single page application which supports Azure AD single-sign-on with Azure Maps Web SDK.
4+
description: How to configure a single page application that supports Azure AD single-sign-on with Azure Maps Web SDK.
55
author: eriklindeman
66
ms.author: eriklind
77
ms.date: 06/12/2020
@@ -13,7 +13,7 @@ ms.custom: devx-track-js
1313

1414
# Secure a single page application with user sign-in
1515

16-
The following guide pertains to an application which is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
16+
The following guide pertains to an application that is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
1717

1818
[!INCLUDE [authentication details](./includes/view-authentication-details.md)]
1919

@@ -23,20 +23,17 @@ Create the web application in Azure AD for users to sign in. The web application
2323

2424
1. In the Azure portal, in the list of Azure services, select **Azure Active Directory** > **App registrations** > **New registration**.
2525

26-
> [!div class="mx-imgBorder"]
27-
> ![App registration](./media/how-to-manage-authentication/app-registration.png)
26+
:::image type="content" source="./media/how-to-manage-authentication/app-registration.png" alt-text="Screenshot showing the new registration page in the App registrations blade in Azure Active Directory.":::
2827

29-
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI which will represent the url which Azure AD will issue the token and is the url where the map control is hosted. For a detailed sample please see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
28+
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI that represents the url which Azure AD issues the token and is the url where the map control is hosted. For a detailed sample, see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
3029

3130
3. To assign delegated API permissions to Azure Maps, go to the application. Then under **App registrations**, select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
3231

33-
> [!div class="mx-imgBorder"]
34-
> ![Add app API permissions](./media/how-to-manage-authentication/app-permissions.png)
32+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="Screenshot showing a list of APIs my organization uses.":::
3533

3634
4. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
3735

38-
> [!div class="mx-imgBorder"]
39-
> ![Select app API permissions](./media/how-to-manage-authentication/select-app-permissions.png)
36+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="Screenshot showing the request app API permissions screen.":::
4037

4138
5. Enable `oauth2AllowImplicitFlow`. To enable it, in the **Manifest** section of your app registration, set `oauth2AllowImplicitFlow` to `true`.
4239

@@ -62,7 +59,7 @@ Create the web application in Azure AD for users to sign in. The web application
6259
```
6360

6461
7. Configure Azure role-based access control (Azure RBAC) for users or groups. See the [following sections to enable Azure RBAC](#grant-role-based-access-for-users-to-azure-maps).
65-
62+
6663
[!INCLUDE [grant role access to users](./includes/grant-rbac-users.md)]
6764

6865
## Next steps

0 commit comments

Comments
 (0)