Skip to content

Commit 31afe0a

Browse files
Merge pull request #252686 from cilwerner/patch-23
Adding clarity to client secret terminology
2 parents 198afc4 + cbd5b72 commit 31afe0a

File tree

7 files changed

+17
-17
lines changed

7 files changed

+17
-17
lines changed

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -120,17 +120,17 @@ To upload the certificate:
120120

121121
After registering the certificate with your application in the application registration portal, enable the [confidential client application](authentication-flows-app-scenarios.md#single-page-public-client-and-confidential-client-applications) code to use the certificate.
122122

123-
### Option 3: Create a new application secret
123+
### Option 3: Create a new client secret
124124

125-
If you choose not to use a certificate, you can create a new application secret.
125+
If you choose not to use a certificate, you can create a new client secret.
126126

127127
1. Browse to **Identity** > **Applications** > **App registrations**, then select your application.
128128
1. Select **Certificates & secrets**.
129129
1. Select **Client secrets**, and then Select **New client secret**.
130130
1. Provide a description of the secret, and a duration.
131131
1. Select **Add**.
132132

133-
Once you've saved the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You'll provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
133+
Once you've saved the client secret, the value of the client secret is displayed. This is only displayed once, so copy this value and store it where your application can retrieve it, usually where your application keeps values like `clientId`, or `authoruty` in the source code. You'll provide the secret value along with with the application's client ID to sign in as the application.
134134

135135
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Screenshot showing the client secret.":::
136136

@@ -142,7 +142,7 @@ To configure access policies:
142142

143143
1. Sign in to the [Azure portal](https://portal.azure.com).
144144
1. Select your key vault and select **Access policies**.
145-
1. Select **Add access policy**, then select the key, secret, and certificate permissions you want to grant your application. Select the service principal you created previously.
145+
1. Select **Add access policy**, then select the key, secret, and certificate permissions you want to grant your application. Select the service principal you created previously.
146146
1. Select **Add** to add the access policy.
147147
1. **Save**.
148148

articles/api-management/self-hosted-gateway-enable-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Assign the API Management Configuration API Access Validator Service Role to the
111111

112112
Create a new Azure AD app. For steps, see [Create an Azure Active Directory application and service principal that can access resources](../active-directory/develop/howto-create-service-principal-portal.md). This app will be used by the self-hosted gateway to authenticate to the API Management instance.
113113

114-
* Generate a [client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret)
114+
* Generate a [client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret)
115115
* Take note of the following application values for use in the next section when deploying the self-hosted gateway: application (client) ID, directory (tenant) ID, and client secret
116116

117117
#### Step 2: Assign API Management Gateway Configuration Reader Service Role

articles/container-registry/container-registry-troubleshoot-login.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Related links:
111111
* [Login with repository-scoped token](container-registry-repository-scoped-permissions.md)
112112
* [Add or remove Azure role assignments using the Azure portal](../role-based-access-control/role-assignments-portal.md)
113113
* [Use the portal to create an Azure AD application and service principal that can access resources](../active-directory/develop/howto-create-service-principal-portal.md)
114-
* [Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret)
114+
* [Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret)
115115
* [Azure AD authentication and authorization codes](../active-directory/develop/reference-aadsts-error-codes.md)
116116

117117
### Check that credentials aren't expired
@@ -147,4 +147,4 @@ If you don't resolve your problem here, see the following options.
147147
* [Troubleshoot registry performance](container-registry-troubleshoot-performance.md)
148148
* [Community support](https://azure.microsoft.com/support/community/) options
149149
* [Microsoft Q&A](/answers/products/)
150-
* [Open a support ticket](https://azure.microsoft.com/support/create-ticket/) - based on information you provide, a quick diagnostic might be run for authentication failures in your registry
150+
* [Open a support ticket](https://azure.microsoft.com/support/create-ticket/) - based on information you provide, a quick diagnostic might be run for authentication failures in your registry

articles/machine-learning/how-to-authenticate-batch-endpoint.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ In this case, we want to execute a batch endpoint using a service principal alre
134134
135135
# [Azure CLI](#tab/cli)
136136
137-
1. Create a secret to use for authentication as explained at [Option 32: Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
137+
1. Create a secret to use for authentication as explained at [Option 32: Create a new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret).
138138
1. To authenticate using a service principal, use the following command. For more details see [Sign in with Azure CLI](/cli/azure/authenticate-azure-cli).
139139
140140
```azurecli
@@ -149,7 +149,7 @@ In this case, we want to execute a batch endpoint using a service principal alre
149149
150150
# [Python](#tab/sdk)
151151
152-
1. Create a secret to use for authentication as explained at [Option 3: Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
152+
1. Create a secret to use for authentication as explained at [Option 3: Create a new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret).
153153
1. To authenticate using a service principal, indicate the tenant ID, client ID and client secret of the service principal using environment variables as demonstrated:
154154
155155
```python
@@ -178,7 +178,7 @@ In this case, we want to execute a batch endpoint using a service principal alre
178178
179179
# [REST](#tab/rest)
180180
181-
1. Create a secret to use for authentication as explained at [Option 3: Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
181+
1. Create a secret to use for authentication as explained at [Option 3: Create a new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret).
182182
183183
1. Use the login service from Azure to get an authorization token. Authorization tokens are issued to a particular scope. The resource type for Azure Machine Learning is `https://ml.azure.com`. The request would look as follows:
184184

articles/machine-learning/how-to-use-batch-azure-data-factory.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,9 @@ You can use a service principal or a [managed identity](../active-directory/mana
5454
# [Using a Service Principal](#tab/sp)
5555

5656
1. Create a service principal following the steps at [Register an application with Azure AD and create a service principal](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal).
57-
1. Create a secret to use for authentication as explained at [Option 3: Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
58-
1. Take note of the `client secret` generated.
59-
1. Take note of the `client ID` and the `tenant id` as explained at [Get tenant and app ID values for signing in](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
57+
1. Create a secret to use for authentication as explained at [Option 3: Create a new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret).
58+
1. Take note of the client secret **Value** that is generated. This is only displayed once.
59+
1. Take note of the `client ID` and the `tenant id` in the **Overview** pane of the application.
6060
1. Grant access for the service principal you created to your workspace as explained at [Grant access](../role-based-access-control/quickstart-assign-role-user-portal.md#grant-access). In this example the service principal will require:
6161

6262
1. Permission in the workspace to read batch deployments and perform actions over them.

articles/machine-learning/how-to-use-event-grid-batch.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ Azure Logic Apps can invoke the REST APIs of batch endpoints by using the [HTTP]
5050
We recommend to using a service principal for authentication and interaction with batch endpoints in this scenario.
5151

5252
1. Create a service principal following the steps at [Register an application with Azure AD and create a service principal](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal).
53-
1. Create a secret to use for authentication as explained at [Option 3: Create a new application secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
54-
1. Take note of the `client secret` generated.
55-
1. Take note of the `client ID` and the `tenant id` as explained at [Get tenant and app ID values for signing in](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret).
53+
1. Create a secret to use for authentication as explained at [Option 3: Create a new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret).
54+
1. Take note of the client secret **Value** that is generated. This is only displayed once.
55+
1. Take note of the `client ID` and the `tenant id` in the **Overview** pane of the application.
5656
1. Grant access for the service principal you created to your workspace as explained at [Grant access](../role-based-access-control/quickstart-assign-role-user-portal.md#grant-access). In this example the service principal will require:
5757

5858
1. Permission in the workspace to read batch deployments and perform actions over them.

articles/migrate/onboard-to-azure-arc-with-azure-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Once the vCenter Server discovery has been completed, software inventory (discov
9292
The following inputs are required:
9393
- **Directory (tenant) ID** - The [unique identifier (GUID)](../active-directory/develop/howto-create-service-principal-portal.md#sign-in-to-the-application) that represents your dedicated instance of Azure AD.
9494
- **Application (client) ID** - The [unique identifier (GUID)](../active-directory/develop/howto-create-service-principal-portal.md#sign-in-to-the-application) that represents the application ID of the service principal.
95-
- **Service principal secret (application secret)** - The [client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-application-secret) for password-based authentication.
95+
- **Service principal secret (application secret)** - The [client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret) for password-based authentication.
9696

9797
5. _Optional_: Provide the **proxy server IP address** or the name and **port number** if your discovered servers require a proxy server to connect to the Internet. Enter the value in the format `http://<proxyURL>:<proxyport>`. This proxy server used by the discovered servers can be different from the proxy server required by the appliance server to connect to the Internet (provided in the prerequisites section in the appliance configuration manager).
9898

0 commit comments

Comments
 (0)