Skip to content

Commit 4d71cac

Browse files
committed
penultimate edits
1 parent c32fd80 commit 4d71cac

8 files changed

+19
-17
lines changed

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,22 +22,22 @@ The first step is to register an Azure application.
2222
1. On the left menu under **Manage**, select **App registrations**.
2323
1. Select **New registration**.
2424

25-
![Screenshot that shows registering an application.](./media/howto-authorize-from-application/register-an-application.png)
25+
:::image type="content" source="media/howto-authorize-from-application/register-an-application.png" alt-text="Screenshot that shows registering an application.":::
2626

2727
1. For **Name**, enter a name to use for your application.
2828
1. Select **Register** to confirm the register.
2929

3030
When your application is registered, go to the application overview to view the values for **Application (client) ID** and **Directory (tenant) ID**. You use these values in the following sections.
3131

32-
![Screenshot that shows an application.](./media/howto-authorize-from-application/application-overview.png)
32+
:::image type="content" source="media/howto-authorize-from-application/application-overview.png" alt-text="Screenshot that shows an application.":::
3333

3434
For more information about registering an application, see the quickstart [Register an application by using the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
3535

3636
## Add credentials
3737

3838
You can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
3939

40-
### Client secret
40+
### Add a client secret
4141

4242
The application requires a client secret for a client to prove its identity when it requests a token.
4343

@@ -46,18 +46,19 @@ To create a client secret:
4646
1. On the left menu under **Manage**, select **Certificates & secrets**.
4747
1. On the **Client secrets** tab, select **New client secret**.
4848

49-
![Screenshot that shows creating a client secret.](./media/howto-authorize-from-application/new-client-secret.png)
49+
:::image type="content" source="media/howto-authorize-from-application/new-client-secret.png" alt-text="Screenshot that shows creating a client secret.":::
50+
5051
1. Enter a description for the client secret, and then choose an expire time for the secret.
5152
1. Copy the value of the client secret, and then paste it to a secure location to save for later use.
5253

5354
> [!NOTE]
5455
> The secret is visible only when you create the secret. You can't view the client secret in the portal later.
5556
56-
### Certificate
57+
### Add a certificate
5758

5859
You can also upload a certificate instead of creating a client secret.
5960

60-
![Screenshot that shows uploading a certificate.](./media/howto-authorize-from-application/upload-certificate.png)
61+
:::image type="content" source="media/howto-authorize-from-application/upload-certificate.png" alt-text="Screenshot that shows uploading a certificate.":::
6162

6263
For more information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
6364

@@ -76,15 +77,15 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
7677

7778
The following screenshot shows an example of the Access control (IAM) pane for a Web PubSub resource:
7879

79-
![Screenshot that shows an example of the Access control (IAM) pane.](./media/howto-authorize-from-application/access-control.png)
80+
:::image type="content" source="media/howto-authorize-from-application/access-control.png" alt-text="Screenshot that shows an example of the Access control (IAM) pane.":::
8081

8182
1. Select **Add** > **Add role assignment**.
8283

8384
1. Select the **Roles** tab, and then select **Web PubSub Service Owner**.
8485

8586
1. Select **Next**.
8687

87-
![Screenshot that shows adding a role assignment.](./media/howto-authorize-from-application/add-role-assignment.png)
88+
:::image type="content" source="media/howto-authorize-from-application/add-role-assignment.png" alt-text="Screenshot that shows adding a role assignment.":::
8889

8990
1. Select the **Members** tab. Under **Assign access to**, select **User, group, or service principal**.
9091

@@ -96,7 +97,7 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
9697

9798
1. Select **Next**.
9899

99-
![Screenshot that shows assigning a role to service principals.](./media/howto-authorize-from-application/assign-role-to-service-principals.png)
100+
:::image type="content" source="media/howto-authorize-from-application/assign-role-to-service-principals.png" alt-text="Screenshot that shows assigning a role to service principals.":::
100101

101102
1. Select **Review + assign** to confirm the change.
102103

@@ -124,7 +125,7 @@ To learn more about how to assign and manage Azure role assignments, see these a
124125
1. For **Key**, select **Content-Type**.
125126
1. For **Value**, enter `application/x-www-form-urlencoded`.
126127

127-
![Screenshot that shows information on the Basic tab when you use Postman to get the token.](./media/howto-authorize-from-application/get-azure-ad-token-using-postman.png)
128+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman.png" alt-text="Screenshot that shows information on the Basic tab when you use Postman to get the token.":::
128129

129130
1. Select the **Body** tab.
130131
1. Select the body type **x-www-form-urlencoded**.
@@ -135,11 +136,11 @@ To learn more about how to assign and manage Azure role assignments, see these a
135136
1. Select **client_secret**, and then paste the value of client secret you saved.
136137
1. Select **resource**, and then enter `https://webpubsub.azure.com` for the value.
137138

138-
![Screenshot that shows the Body tab parameters when you use Postman to get the token.](./media/howto-authorize-from-application/get-azure-ad-token-using-postman-body.png)
139+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman-body.png" alt-text="Screenshot that shows the Body tab parameters when you use Postman to get the token.":::
139140

140141
1. Select **Send** to send the request to get the token. The value for `access_token` is the access token.
141142

142-
![Screenshot that shows the response token when you use Postman to get the token.](./media/howto-authorize-from-application/get-azure-ad-token-using-postman-response.png)
143+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman-response.png" alt-text="Screenshot that shows the response token when you use Postman to get the token.":::
143144

144145
## Code samples that use Microsoft Entra authorization
145146

articles/azure-web-pubsub/howto-authorize-from-managed-identity.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ In this section, you set up a system-assigned managed identity on a virtual mach
2424
1. Under **Settings**, select **Identity**.
2525
1. On the **System assigned** tab, set **Status** to **On**.
2626

27-
![Screenshot that shows creating a system identity for a virtual machine.](./media/howto-authorize-from-managed-identity/identity-virtual-machine.png)
27+
:::image type="content" source="media/howto-authorize-from-managed-identity/identity-virtual-machine.png" alt-text="Screenshot that shows creating a system identity for a virtual machine.":::
28+
2829
1. Select **Save** to confirm the change.
2930

3031
### Create a user-assigned managed identity
@@ -58,15 +59,15 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
5859

5960
The following screenshot shows an example of the Access control (IAM) pane for a Web PubSub resource:
6061

61-
![Screenshot that shows an example of the Access control (IAM) pane.](./media/howto-authorize-from-managed-identity/access-control.png)
62+
:::image type="content" source="media/howto-authorize-from-managed-identity/access-control.png" alt-text="Screenshot that shows an example of the Access control (IAM) pane.":::
6263

6364
1. Select **Add** > **Add role assignment**.
6465

6566
1. Select the **Roles** tab, and then select **Web PubSub Service Owner**.
6667

6768
1. Select **Next**.
6869

69-
![Screenshot that shows adding a role assignment.](./media/howto-authorize-from-managed-identity/add-role-assignment.png)
70+
:::image type="content" source="media/howto-authorize-from-managed-identity/add-role-assignment.png" alt-text="Screenshot that shows adding a role assignment.":::
7071

7172
1. Select the **Members** tab. Under **Assign access to**, select **Managed identity**.
7273

@@ -80,7 +81,7 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
8081

8182
1. Select **Next**.
8283

83-
![Screenshot that shows assigning a role to managed identities.](./media/howto-authorize-from-managed-identity/assign-role-to-managed-identities.png)
84+
:::image type="content" source="media/howto-authorize-from-managed-identity/assign-role-to-managed-identities.png" alt-text="Screenshot that shows assigning a role to managed identities.":::
8485

8586
1. Select **Review + assign** to confirm the change.
8687

articles/azure-web-pubsub/howto-secure-shared-private-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This outbound method is subject to the following requirements:
2222

2323
- The network endpoint must be deployed by using Azure App Service or Azure Functions.
2424
- The Web PubSub resource must be on the Standard tier or the Premium tier.
25-
- An Azure App Service or an Azure Functions resource must be created by choosing a specific SKU for the resource. For more information, see [Use Private Endpoints for Azure Web App](../app-service/networking/private-endpoint.md).
25+
- An Azure App Service or an Azure Functions resource must be created by choosing a specific tier to create the resource. For more information, see [Use private endpoints for Azure Web App](../app-service/networking/private-endpoint.md).
2626

2727
Private endpoints of secured resources that are created by using Azure Web PubSub APIs are called *shared private link resources*. You're "sharing" access to a resource, such as an Azure Functions resource, that is integrated with [Azure Private Link](https://azure.microsoft.com/services/private-link/). These private endpoints are created inside the Web PubSub service execution environment and aren't directly visible to you.
2828

-10.6 KB
Loading
21.4 KB
Loading
-9.37 KB
Loading
-8.1 KB
Loading
-9.35 KB
Loading

0 commit comments

Comments
 (0)