Skip to content

Commit 2a163ee

Browse files
committed
fixed docs warnings
1 parent 9068725 commit 2a163ee

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

articles/communication-services/concepts/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,4 +90,4 @@ The user identity is intended to act as a primary key for logs and metrics colle
9090
9191
## Related articles
9292

93-
- [Learn about client and server architecture](../concepts/identity-model.md#client-server-architecture)
93+
- [Learn about client and server architecture](../concepts/identity-model.md#client-server-architecture-for-the-bring-your-own-identity-byoi-model)

articles/communication-services/concepts/identity-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Azure App Service or Azure Functions are two alternatives for operating the iden
125125
## Microsoft Entra ID: Integrating with Entra ID
126126
[!INCLUDE [Public Preview Disclaimer](../includes/public-preview-include.md)]
127127

128-
Azure Communication Services now supports Microsoft Entra ID authentication, allowing you to access Azure Communication Services resources directly with Entra ID users. This new support for Entra ID authentication eliminates the need to develop or operate your own identity management or authorization proxy service mentioned in the section [Client-server architecture](#client-server-architecture).
128+
Azure Communication Services now supports Microsoft Entra ID authentication, allowing you to access Azure Communication Services resources directly with Entra ID users. This new support for Entra ID authentication eliminates the need to develop or operate your own identity management or authorization proxy service mentioned in the section [Client-server architecture](#client-server-architecture-for-the-bring-your-own-identity-byoi-model).
129129

130130
The following sections will guide you through the essential aspects of Microsoft Entra ID integration:
131131

articles/communication-services/quickstarts/identity/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: mode-other, devx-track-azurecli, devx-track-extended-java, devx-track
1818

1919
Access tokens enable Azure Communication Services SDKs to [authenticate](../../concepts/authentication.md) directly against Azure Communication Services as a particular identity. You need to create access tokens for end users if you want them to join a call or chat thread within your application.
2020

21-
This article describes how to use the Azure Communication Services SDKs to create identities and manage your access tokens. For production use cases, we recommend that you generate access tokens on a server-side service as described in [Client and server architecture](../../concepts/identity-model.md#client-server-architecture).
21+
This article describes how to use the Azure Communication Services SDKs to create identities and manage your access tokens. For production use cases, we recommend that you generate access tokens on a server-side service as described in [Client and server architecture](../../concepts/identity-model.md#client-server-architecture-for-the-bring-your-own-identity-byoi-model).
2222

2323
::: zone pivot="platform-azcli"
2424
[!INCLUDE [Azure CLI](./includes/access-tokens/access-token-az-cli.md)]
@@ -75,5 +75,5 @@ To learn more about how to send an email using the Azure Communication Services
7575

7676
- [Learn about authentication](../../concepts/authentication.md)
7777
- [Add chat to your app](../chat/get-started.md)
78-
- [Learn about client and server architecture](../../concepts/identity-model.md#client-server-architecture)
78+
- [Learn about client and server architecture](../../concepts/identity-model.md#client-server-architecture-for-the-bring-your-own-identity-byoi-model)
7979
- [Deploy trusted authentication service hero sample](../../samples/trusted-auth-sample.md)

articles/communication-services/quickstarts/identity/entra-id-authentication-integration.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: aigerimb
99
ms.date: 05/06/2025
1010
ms.topic: quickstart
1111
ms.service: azure-communication-services
12-
ms.subservice: acs-entra-id-authentication
12+
ms.subservice: identity
1313
ms.reviewer: dominikme, dariac, sanchezjuan
1414
zone_pivot_groups: acs-js-csharp-java-python
1515
ms.custom: mode-other, devx-track-extended-java, devx-track-js, devx-track-python, has-azure-ad-ps-ref
@@ -22,8 +22,8 @@ This quickstart demonstrates how to use the Communication Services Common SDK al
2222

2323
## Prerequisites
2424
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25-
- An active Azure Communication Services resource and endpoint URI. For more information, see [Create an Azure Communication Services resource](./create-communication-resource.md).
26-
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](./entra/fundamentals/whatis).
25+
- An active Azure Communication Services resource and endpoint URI. For more information, see [Create an Azure Communication Services resource](../create-communication-resource.md).
26+
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](../../../entra/fundamentals/whatis).
2727

2828
## Introduction
2929

@@ -39,7 +39,7 @@ The Administrator role has extended permissions in Microsoft Entra ID. Members o
3939

4040
1. The Contoso Administrator create a service principal for Communication Services Clients application in Contoso Microsoft Entra ID tenant. This step is required to allow the Contoso application to access Communication Services Clients application API permissions.
4141
1. The Contoso Administrator creates or selects an existing *application* in Microsoft Entra ID. The property *Supported account types* defines whether users from various tenants can authenticate to the application. The property *Redirect URI* redirects a successful authentication request to the Contoso *client application*.
42-
1. The Contoso Administrator adds required API permissions from Communication Services Clients application. For the all list of the permissions, see [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id).
42+
1. The Contoso Administrator adds required API permissions from Communication Services Clients application. For the all list of the permissions, see [Access tokens with Microsoft Entra ID](../../concepts/identity-model.md#access-tokens-with-microsoft-entra-id).
4343
1. The Contoso Administrator creates or selects existing communication services. The Contoso Administrator grants Fabrikam Entra ID users access to Contoso Azure Communication Services resource. Azure Communication Services Common SDK will be used for Microsoft Entra ID user authentication and in the background seamlessly obtain an Azure Communication Services access token for Microsoft Entra ID user.
4444
1. The Fabrikam Administrator grants admin consent for the required Communication Services Clients application API permissions to the Contoso application.
4545

@@ -49,7 +49,7 @@ The Administrator role has extended permissions in Microsoft Entra ID. Members o
4949
To enable the Contoso application to access Azure Communication Services Clients application API permissions, the Contoso Administrator must create a service principal for Azure Communication Services Clients application in the Contoso Microsoft Entra ID tenant.
5050
The Contoso Administrator can create a service principal in Contoso tenant by one of the following methods:
5151

52-
- Use the [Microsoft Graph REST API](./graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http#request) to run the following request:
52+
- Use the [Microsoft Graph REST API](../../../graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http#request) to run the following request:
5353

5454
```http
5555
POST https://graph.microsoft.com/v1.0/servicePrincipals
@@ -60,9 +60,9 @@ Content-Type: application/json
6060
}
6161
```
6262

63-
This request can also be executed in [Graph Explorer](./graph/graph-explorer/graph-explorer-overview). Make sure to include your full tenant domain in the URL `https://developer.microsoft.com/graph/graph-explorer?tenant={tenant domain}`, sign in,and provide consent for `Application.ReadWrite.All` permission.
63+
This request can also be executed in [Graph Explorer](../../../graph/graph-explorer/graph-explorer-overview). Make sure to include your full tenant domain in the URL `https://developer.microsoft.com/graph/graph-explorer?tenant={tenant domain}`, sign in,and provide consent for `Application.ReadWrite.All` permission.
6464

65-
- Use the [Azure CLI](./cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create) to run the following command:
65+
- Use the [Azure CLI](../../../cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create) to run the following command:
6666

6767
```azurecli-interactive
6868
az ad sp create --id 2a04943b-b6a7-4f65-8786-2bb6131b59f6
@@ -98,9 +98,9 @@ The application must declare Azure Communication Services Clients to have access
9898

9999
The Azure Communication Services resource is used to authenticate all requests from Microsoft Entra ID users and to grant them access to the resource.
100100

101-
If you want to create a new Communication Services resource, see [Create and manage Communication Services resources](./create-communication-resource.md).
101+
If you want to create a new Communication Services resource, see [Create and manage Communication Services resources](../create-communication-resource.md).
102102

103-
The Contoso administrator can provide Fabrikam Entra ID users with access to the Contoso Azure Communication Services resource through the Azure portal or by using the [Entra ID Assignment REST API](./rest/api/communication/identity/entra-id-assignment).
103+
The Contoso administrator can provide Fabrikam Entra ID users with access to the Contoso Azure Communication Services resource through the Azure portal or by using the [Entra ID Assignment REST API](../../../rest/api/communication/identity/entra-id-assignment).
104104

105105
In the Azure portal follow these steps:
106106
1. Navigate to your Communication Services resource.
@@ -122,11 +122,11 @@ The following roles can provide consent on behalf of a company:
122122
- Application admin
123123
- Cloud application admin
124124

125-
If you want to check roles in Azure portal, see [List Azure role assignments](../../role-based-access-control/role-assignments-list-portal.yml).
125+
If you want to check roles in Azure portal, see [List Azure role assignments](../../../role-based-access-control/role-assignments-list-portal.yml).
126126

127127
To construct an Administrator consent URL, the Fabrikam Microsoft Entra Administrator does the following steps:
128128

129-
1. In the URL *https://login.microsoftonline.com/{Tenant_ID}/adminconsent?client_id={Application_ID}*, the Administrator replaces {Tenant_ID} with the Fabrikam [Tenant ID](../concepts/troubleshooting-info.md#get-a-directory-id), and replaces {Application_ID} with the Contoso [Application ID](../concepts/troubleshooting-info.md#get-an-application-id).
129+
1. In the URL *https://login.microsoftonline.com/{Tenant_ID}/adminconsent?client_id={Application_ID}*, the Administrator replaces {Tenant_ID} with the Fabrikam [Tenant ID](../concepts/troubleshooting-info.md#get-a-directory-id), and replaces {Application_ID} with the Contoso [Application ID](../../concepts/troubleshooting-info.md#get-an-application-id).
130130
1. The Administrator logs in and grants permissions on behalf of the organization.
131131

132132
The service principal of the Contoso application in the Fabrikam tenant is created if consent is granted. The Fabrikam Administrator can review the consent in Microsoft Entra ID by doing the following steps:

0 commit comments

Comments
 (0)