Skip to content

Commit 4cb0d6b

Browse files
authored
Merge pull request #225650 from tamram/tamram23-0130
add dev center auth articles to TOC
2 parents b067dc0 + 225232b commit 4cb0d6b

File tree

59 files changed

+496
-1015
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+496
-1015
lines changed

articles/active-directory/develop/scenario-web-app-call-api-call-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ public async Task<IActionResult> Profile()
150150
> [!NOTE]
151151
> You can use the same principle to call any web API.
152152
>
153-
> Most Azure web APIs provide an SDK that simplifies calling the API as is the case for Microsoft Graph. See, for instance, [Create a web application that authorizes access to Blob storage with Azure AD](../../storage/common/storage-auth-aad-app.md?tabs=dotnet&toc=%2fazure%2fstorage%2fblobs%2ftoc.json) for an example of a web app using Microsoft.Identity.Web and using the Azure Storage SDK.
153+
> Most Azure web APIs provide an SDK that simplifies calling the API as is the case for Microsoft Graph.
154154
155155
# [Java](#tab/java)
156156

articles/data-factory/connector-azure-blob-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ For general information about Azure Storage service principal authentication, se
238238

239239
To use service principal authentication, follow these steps:
240240

241-
1. Register an application entity in Azure Active Directory (Azure AD) by following [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of these values, which you use to define the linked service:
241+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
242242

243243
- Application ID
244244
- Application key

articles/data-factory/connector-azure-cosmos-db.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ The Azure Cosmos DB for NoSQL connector supports the following authentication ty
145145
146146
To use service principal authentication, follow these steps.
147147

148-
1. Register an application entity in Azure Active Directory (Azure AD) by following the steps in [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of the following values, which you use to define the linked service:
148+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
149149

150150
- Application ID
151151
- Application key

articles/data-factory/connector-azure-data-explorer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The Azure Data Explorer connector supports the following authentication types. S
8888

8989
To use service principal authentication, follow these steps to get a service principal and to grant permissions:
9090

91-
1. Register an application entity in Azure Active Directory by following the steps in [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of the following values, which you use to define the linked service:
91+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
9292

9393
- Application ID
9494
- Application key

articles/data-factory/connector-azure-data-lake-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ To use storage account key authentication, the following properties are supporte
129129

130130
To use service principal authentication, follow these steps.
131131

132-
1. Register an application entity in Azure Active Directory (Azure AD) by following the steps in [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of the following values, which you use to define the linked service:
132+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
133133

134134
- Application ID
135135
- Application key

articles/data-factory/connector-dynamics-ax.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ The following sections provide details about properties you can use to define Da
6969

7070
To use service principal authentication, follow these steps:
7171

72-
1. Register an application entity in Azure Active Directory (Azure AD) by following [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of the following values, which you use to define the linked service:
72+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
7373

7474
- Application ID
7575
- Application key

articles/data-factory/connector-sharepoint-online-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Specifically, this SharePoint List Online connector uses service principal authe
3838

3939
The SharePoint List Online connector uses service principal authentication to connect to SharePoint. Follow these steps to set it up:
4040

41-
1. Register an application entity in Azure Active Directory (Azure AD) by following [Register your application with an Azure AD tenant](../storage/common/storage-auth-aad-app.md#register-your-application-with-an-azure-ad-tenant). Make note of the following values, which you use to define the linked service:
41+
1. Register an application with the Microsoft Identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
4242

4343
- Application ID
4444
- Application key

articles/hdinsight/domain-joined/identity-broker.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -115,11 +115,11 @@ To troubleshoot authentication issues, see [this guide](./domain-joined-authenti
115115

116116
## Clients using OAuth to connect to an HDInsight gateway with HDInsight ID Broker
117117

118-
In the HDInsight ID Broker setup, custom apps and clients that connect to the gateway can be updated to acquire the required OAuth token first. Follow the steps in [this document](../../storage/common/storage-auth-aad-app.md) to acquire the token with the following information:
118+
In the HDInsight ID Broker setup, custom apps and clients that connect to the gateway can be updated to acquire the required OAuth token first. For more information, see [How to authenticate .NET applications with Azure services](/dotnet/azure/sdk/authentication). The key values required for authorizing access to an HDInsight gateway are:
119119

120-
* OAuth resource uri: `https://hib.azurehdinsight.net`
121-
* AppId: 7865c1d2-f040-46cc-875f-831a1ef6a28a
122-
* Permission: (name: Cluster.ReadWrite, id: 8f89faa0-ffef-4007-974d-4989b39ad77d)
120+
* OAuth resource uri: `https://hib.azurehdinsight.net`
121+
* AppId: 7865c1d2-f040-46cc-875f-831a1ef6a28a
122+
* Permission: (name: Cluster.ReadWrite, id: 8f89faa0-ffef-4007-974d-4989b39ad77d)
123123

124124
After you acquire the OAuth token, use it in the authorization header of the HTTP request to the cluster gateway (for example, https://\<clustername\>-int.azurehdinsight.net). A sample curl command to Apache Livy API might look like this example:
125125

articles/service-fabric/how-to-managed-cluster-app-deployment-template.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -39,25 +39,24 @@ Then, you create a Resource Manager template, update the parameters file with ap
3939

4040
### Create a storage account
4141

42-
To deploy an application from a Resource Manager template, you must have a storage account. The storage account is used to stage the application image.
42+
To deploy an application from a Resource Manager template, you must have a storage account. The storage account is used to stage the application image.
4343

44-
You can reuse an existing storage account or you can create a new storage account for staging your applications. If you use an existing storage account, you can skip this step.
44+
You can reuse an existing storage account or you can create a new storage account for staging your applications. If you use an existing storage account, you can skip this step.
4545

4646
![Create a storage account][CreateStorageAccount]
4747

48-
### Configure your storage account
49-
50-
After the storage account is created, you create a blob container where the applications can be staged. In the Azure portal, go to the Azure Storage account where you want to store your applications. Select **Blobs** > **Add Container**.
48+
> [!CAUTION]
49+
> Anonymous public access to blob data in your storage account presents a security risk. When you create a storage account, we recommend that you disable anonymous public access to blob data at the account level, by setting the **AllowBlobPublicAccess** property to **false**. For more information, see [Remediate anonymous public read access to blob data (Azure Resource Manager deployments)](../storage/blobs/anonymous-read-access-prevent.md).
5150
52-
Resources in your cluster can be secured by setting the public access level to **private**. You can grant access in multiple ways:
51+
### Configure your storage account
5352

54-
* Authorize access to blobs and queues by using [Azure Active Directory](../storage/common/storage-auth-aad-app.md).
55-
* Grant access to Azure blob and queue data by using [Azure RBAC in the Azure portal](../storage/blobs/assign-azure-role-data-access.md).
56-
* Delegate access by using a [shared access signature](/rest/api/storageservices/delegate-access-with-shared-access-signature).
53+
After the storage account is created, you create a blob container where the applications can be staged. In the Azure portal, go to the Azure Storage account where you want to store your applications. Select **Blobs** > **Add Container**.
5754

58-
The example in the following screenshot uses anonymous read access for blobs.
55+
You can grant access to the container in one of the following ways:
5956

60-
![Create blob][CreateBlob]
57+
* You can assign an Azure RBAC role that grants permissions to the container to a security principal, so that that security principal can access data in the container via Azure AD authorization. For more information, see [Authorize access to blobs using Azure Active Directory](../storage/blobs/authorize-access-azure-active-directory.md).
58+
* You can delegate access to the container with a shared access signature to grant a client access to blobs in the container for a limited period of time and with specific permissions. For more information, see [Grant limited access to Azure Storage resources using shared access signatures (SAS)](../storage/common/storage-sas-overview.md).
59+
* You can use the account access keys to authorize access to blob data. This approach is the least secure and so is not recommended.
6160

6261
### Stage the application in your storage account
6362

articles/storage/.openpublishing.redirection.storage.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,11 @@
180180
"redirect_url": "/azure/storage/blobs/sas-service-create",
181181
"redirect_document_id": true
182182
},
183+
{
184+
"source_path_from_root": "/articles/storage/blobs/sas-service-create.md",
185+
"redirect_url": "/azure/storage/blobs/sas-service-create-dotnet",
186+
"redirect_document_id": true
187+
},
183188
{
184189
"source_path_from_root": "/articles/storage/blobs/storage-blob-snapshots.md",
185190
"redirect_url": "/azure/storage/blobs/snapshots-overview",
@@ -410,6 +415,11 @@
410415
"redirect_url": "/azure/storage/blobs/encryption-customer-provided-keys",
411416
"redirect_document_id": true
412417
},
418+
{
419+
"source_path_from_root": "/articles/storage/common/identity-library-acquire-token.md",
420+
"redirect_url": "/azure/storage/blobs/authorize-access-azure-active-directory",
421+
"redirect_document_id": false
422+
},
413423
{
414424
"source_path_from_root": "/articles/storage/common/manage-account-default-access-tier.md",
415425
"redirect_url": "/azure/storage/blobs/access-tiers-online-manage",
@@ -460,6 +470,26 @@
460470
"redirect_url": "/azure/storage/blobs/authorize-managed-identity",
461471
"redirect_document_id": false
462472
},
473+
{
474+
"source_path_from_root": "/articles/storage/blobs/authorize-managed-identity.md",
475+
"redirect_url": "/azure/storage/blobs/authorize-access-azure-active-directory",
476+
"redirect_document_id": false
477+
},
478+
{
479+
"source_path_from_root": "/articles/storage/queues/authorize-managed-identity.md",
480+
"redirect_url": "/azure/storage/queues/authorize-access-azure-active-directory",
481+
"redirect_document_id": false
482+
},
483+
{
484+
"source_path_from_root": "/articles/storage/tables/authorize-managed-identity.md",
485+
"redirect_url": "/azure/storage/tables/authorize-access-azure-active-directory",
486+
"redirect_document_id": false
487+
},
488+
{
489+
"source_path_from_root": "/articles/storage/common/storage-auth-aad-app.md",
490+
"redirect_url": "/azure/storage/blobs/authorize-access-azure-active-directory",
491+
"redirect_document_id": false
492+
},
463493
{
464494
"source_path_from_root": "/articles/storage/common/storage-auth-aad-rbac-cli.md",
465495
"redirect_url": "/azure/storage/blobs/assign-azure-role-data-access",

0 commit comments

Comments
 (0)