You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/email/send-email-smtp/smtp-authentication.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,16 +19,16 @@ In this quick start, you learn about how to use an Entra application to create t
19
19
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
20
20
- An Azure Communication Email Resource created and ready with a provisioned domain [Get started with Creating Email Communication Resource](../create-email-communication-resource.md)
21
21
- An active Azure Communication Services Resource connected with Email Domain and a Connection String. [Get started by Connecting Email Resource with a Communication Resource](../connect-email-communication-resource.md)
22
-
-An Entra application with access to the Azure Communication Services Resource. [Register an application with Microsoft Entra ID and create a service principal](/entra/identity-platform/howto-create-service-principal-portal#register-an-application-with-microsoft-entra-id-and-create-a-service-principal)
23
-
- A client secret for the Entra application with access to the Azure Communication Service Resource. [Create a new client secret](/entra/identity-platform/howto-create-service-principal-portal#option-3-create-a-new-client-secret)
22
+
-A Microsoft Entra application with access to the Azure Communication Services Resource. [Register an application with Microsoft Entra ID and create a service principal](/entra/identity-platform/howto-create-service-principal-portal#register-an-application-with-microsoft-entra-id-and-create-a-service-principal)
23
+
- A client secret for the Microsoft Entra application with access to the Azure Communication Service Resource. [Create a new client secret](/entra/identity-platform/howto-create-service-principal-portal#option-3-create-a-new-client-secret)
24
24
25
25
## Using a Microsoft Entra application with access to the Azure Communication Services Resource for SMTP
26
26
27
-
Application developers who build apps that send email using the SMTP protocol need to implement secure, modern authentication. Azure Communication Services does this by leveraging Entra application service principals. Combining the Azure Communication Services Resource and the Entra application service principal's information, the SMTP services undertakes authentication with Entra on the user's behalf to ensure a secure and seamless email transmission.
27
+
Application developers who build apps that send email using the SMTP protocol need to implement secure, modern authentication. Azure Communication Services does this by leveraging Microsoft Entra application service principals. Combining the Azure Communication Services Resource and the Microsoft Entra application service principal's information, the SMTP services undertakes authentication with Microsoft Entra on the user's behalf to ensure a secure and seamless email transmission.
28
28
29
-
### Creating a custom email role for the Entra application
29
+
### Creating a custom email role for the Microsoft Entra application
30
30
31
-
The Entra application must be assigned a role with both the **Microsoft.Communication/CommunicationServices/Read**, **Microsoft.Communication/CommunicationServices/Write**, and the **Microsoft.Communication/EmailServices/write** permissions on the Azure Communication Service Resource. This can be done either by using the **Contributor** role, or by creating a **custom role**. Follow these steps to create a custom role by cloning an existing role.
31
+
The Microsoft Entra application must be assigned a role with both the **Microsoft.Communication/CommunicationServices/Read**, **Microsoft.Communication/CommunicationServices/Write**, and the **Microsoft.Communication/EmailServices/write** permissions on the Azure Communication Service Resource. This can be done either by using the **Contributor** role, or by creating a **custom role**. Follow these steps to create a custom role by cloning an existing role.
32
32
33
33
1. In the portal, a custom role can be created by first navigating to the subscription, resource group, or Azure Communication Service Resource where you want the custom role to be assignable and then open **Access control (IAM)**.
34
34
:::image type="content" source="../media/smtp-custom-role-iam.png" alt-text="Screenshot that shows Access control.":::
@@ -45,9 +45,9 @@ The Entra application must be assigned a role with both the **Microsoft.Communic
45
45
1. Review the permissions for the new role. Click **Review + create** and then **Create** on the next page.
46
46
:::image type="content" source="../media/smtp-custom-role-review.png" alt-text="Screenshot that shows reviewing the new custom role.":::
47
47
48
-
When assigning the Entra application a role for the Azure Communication Services Resource, the new custom role will be available. For more information on creating custom roles, see [Create or update Azure custom roles using the Azure portal](../../../../role-based-access-control/custom-roles-portal.md)
48
+
When assigning the Microsoft Entra application a role for the Azure Communication Services Resource, the new custom role will be available. For more information on creating custom roles, see [Create or update Azure custom roles using the Azure portal](../../../../role-based-access-control/custom-roles-portal.md)
49
49
50
-
### Assigning the custom email role to the Entra application
50
+
### Assigning the custom email role to the Microsoft Entra application
51
51
1. In the portal, navigate to the subscription, resource group, or Azure Communication Service Resource where you want the custom role to be assignable and then open **Access control (IAM)**.
52
52
:::image type="content" source="../media/smtp-custom-role-iam.png" alt-text="Screenshot that shows Access control.":::
53
53
1. Click **+Add** and then select **Add role assignment**.
@@ -56,39 +56,39 @@ When assigning the Entra application a role for the Azure Communication Services
56
56
:::image type="content" source="../media/email-smtp-select-custom-role.png" alt-text="Screenshot that shows selecting the custom role.":::
57
57
1. On the **Members** tab, choose **User, group, or service principal** and then click **+Select members**.
58
58
:::image type="content" source="../media/email-smtp-select-members.png" alt-text="Screenshot that shows choosing select members.":::
59
-
1. Use the search box to find the **Entra** application that you'll use for authentication and select it. Then click **Select**.
60
-
:::image type="content" source="../media/email-smtp-select-entra.png" alt-text="Screenshot that shows selecting the Entra application.":::
59
+
1. Use the search box to find the **Microsoft Entra** application that you'll use for authentication and select it. Then click **Select**.
60
+
:::image type="content" source="../media/email-smtp-select-entra.png" alt-text="Screenshot that shows selecting the Microsoft Entra application.":::
61
61
1. After confirming the selection, click **Next**.
62
62
:::image type="content" source="../media/email-smtp-select-review.png" alt-text="Screenshot that shows reviewing the assignment.":::
63
63
1. After confirming the scope and members, click **Review + assign**.
64
64
:::image type="content" source="../media/email-smtp-select-assign.png" alt-text="Screenshot that shows assigning the custom role.":::
65
65
66
-
### Creating the SMTP credentials from the Entra application information.
66
+
### Creating the SMTP credentials from the Microsoft Entra application information.
67
67
#### SMTP Authentication Username
68
-
Azure Communication Services allows the credentials for an Entra application to be used as the SMTP username and password. The username consists of the following three parts and can be pipe or dot delimited.
68
+
Azure Communication Services allows the credentials for a Microsoft Entra application to be used as the SMTP username and password. The username consists of the following three parts and can be pipe or dot delimited.
69
69
1. The Azure Communication Service Resource name.
70
70
:::image type="content" source="../media/email-smtp-resource-name.png" alt-text="Screenshot that shows finding the resource name.":::
71
-
1. The Entra Application ID.
72
-
:::image type="content" source="../media/email-smtp-entra-details.png" alt-text="Screenshot that shows finding the Entra Application ID.":::
73
-
1. The Entra Tenant ID.
74
-
:::image type="content" source="../media/email-smtp-entra-tenant.png" alt-text="Screenshot that shows finding the Entra Tenant ID.":::
71
+
1. The Microsoft Entra Application ID.
72
+
:::image type="content" source="../media/email-smtp-entra-details.png" alt-text="Screenshot that shows finding the Microsoft Entra Application ID.":::
73
+
1. The Microsoft Entra Tenant ID.
74
+
:::image type="content" source="../media/email-smtp-entra-tenant.png" alt-text="Screenshot that shows finding the Microsoft Entra Tenant ID.":::
75
75
76
76
**Dot-delimited Format:**
77
77
```
78
-
username: <Azure Communication Services Resource name>.<Entra Application ID>.<Entra Tenant ID>
The password is one of the Entra application's client secrets.
87
-
:::image type="content" source="../media/email-smtp-entra-secret.png" alt-text="Screenshot that shows finding the Entra client secret.":::
86
+
The password is one of the Microsoft Entra application's client secrets.
87
+
:::image type="content" source="../media/email-smtp-entra-secret.png" alt-text="Screenshot that shows finding the Microsoft Entra client secret.":::
88
88
89
89
### Requirements for SMTP AUTH client submission
90
90
91
-
-**Authentication**: Username and password authentication is supported using Entra application details as the credentials. The Azure Communication Services SMTP service will use the Entra application details to get an access token on behalf of the user and use that to submit the email. Because the Entra token isn't cached, access can be revoked immediately by either changing the Entra application client secret or by changing the access controls for the Azure Communication Services Resource.
91
+
-**Authentication**: Username and password authentication is supported using the Microsoft Entra application details as the credentials. The Azure Communication Services SMTP service will use the Microsoft Entra application details to get an access token on behalf of the user and use that to submit the email. Because the Microsoft Entra token isn't cached, access can be revoked immediately by either changing the Microsoft Entra application client secret or by changing the access controls for the Azure Communication Services Resource.
92
92
-**Azure Communication Service**: An Azure Communication Services Resource with a connected Azure Communication Email Resource and domain is required.
93
93
-**Transport Layer Security (TLS)**: Your device must be able to use TLS version 1.2 and above.
94
94
-**Port**: Port 587 is required and must be unblocked on your network. Some network firewalls or ISPs block ports because that's the port that email servers use to send mail.
@@ -103,4 +103,4 @@ Enter the following settings directly on your device or in the application as th
103
103
|Server / smart host | smtp.azurecomm.net |
104
104
|Port |Port 587|
105
105
|TLS / StartTLS | Enabled|
106
-
|Username and password | Enter the Entra application credentials from an application with access to the Azure Communication Services Resource |
106
+
|Username and password | Enter the Microsoft Entra application credentials from an application with access to the Azure Communication Services Resource |
0 commit comments