You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-authorize-from-application.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,22 +22,22 @@ The first step is to register an Azure application.
22
22
1. On the left menu under **Manage**, select **App registrations**.
23
23
1. Select **New registration**.
24
24
25
-

25
+
:::image type="content" source="media/howto-authorize-from-application/register-an-application.png" alt-text="Screenshot that shows registering an application.":::
26
26
27
27
1. For **Name**, enter a name to use for your application.
28
28
1. Select **Register** to confirm the register.
29
29
30
30
When your application is registered, go to the application overview to view the values for **Application (client) ID** and **Directory (tenant) ID**. You use these values in the following sections.
31
31
32
-

32
+
:::image type="content" source="media/howto-authorize-from-application/application-overview.png" alt-text="Screenshot that shows an application.":::
33
33
34
34
For more information about registering an application, see the quickstart [Register an application by using the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
35
35
36
36
## Add credentials
37
37
38
38
You can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
39
39
40
-
### Client secret
40
+
### Add a client secret
41
41
42
42
The application requires a client secret for a client to prove its identity when it requests a token.
43
43
@@ -46,18 +46,19 @@ To create a client secret:
46
46
1. On the left menu under **Manage**, select **Certificates & secrets**.
47
47
1. On the **Client secrets** tab, select **New client secret**.
48
48
49
-

49
+
:::image type="content" source="media/howto-authorize-from-application/new-client-secret.png" alt-text="Screenshot that shows creating a client secret.":::
50
+
50
51
1. Enter a description for the client secret, and then choose an expire time for the secret.
51
52
1. Copy the value of the client secret, and then paste it to a secure location to save for later use.
52
53
53
54
> [!NOTE]
54
55
> The secret is visible only when you create the secret. You can't view the client secret in the portal later.
55
56
56
-
### Certificate
57
+
### Add a certificate
57
58
58
59
You can also upload a certificate instead of creating a client secret.
59
60
60
-

61
+
:::image type="content" source="media/howto-authorize-from-application/upload-certificate.png" alt-text="Screenshot that shows uploading a certificate.":::
61
62
62
63
For more information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
63
64
@@ -76,15 +77,15 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
76
77
77
78
The following screenshot shows an example of the Access control (IAM) pane for a Web PubSub resource:
78
79
79
-

80
+
:::image type="content" source="media/howto-authorize-from-application/access-control.png" alt-text="Screenshot that shows an example of the Access control (IAM) pane.":::
80
81
81
82
1. Select **Add** > **Add role assignment**.
82
83
83
84
1. Select the **Roles** tab, and then select **Web PubSub Service Owner**.
84
85
85
86
1. Select **Next**.
86
87
87
-

88
+
:::image type="content" source="media/howto-authorize-from-application/add-role-assignment.png" alt-text="Screenshot that shows adding a role assignment.":::
88
89
89
90
1. Select the **Members** tab. Under **Assign access to**, select **User, group, or service principal**.
90
91
@@ -96,7 +97,7 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
96
97
97
98
1. Select **Next**.
98
99
99
-

100
+
:::image type="content" source="media/howto-authorize-from-application/assign-role-to-service-principals.png" alt-text="Screenshot that shows assigning a role to service principals.":::
100
101
101
102
1. Select **Review + assign** to confirm the change.
102
103
@@ -124,7 +125,7 @@ To learn more about how to assign and manage Azure role assignments, see these a
124
125
1. For **Key**, select **Content-Type**.
125
126
1. For **Value**, enter `application/x-www-form-urlencoded`.
126
127
127
-

128
+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman.png" alt-text="Screenshot that shows information on the Basic tab when you use Postman to get the token.":::
128
129
129
130
1. Select the **Body** tab.
130
131
1. Select the body type **x-www-form-urlencoded**.
@@ -135,11 +136,11 @@ To learn more about how to assign and manage Azure role assignments, see these a
135
136
1. Select **client_secret**, and then paste the value of client secret you saved.
136
137
1. Select **resource**, and then enter `https://webpubsub.azure.com` for the value.
137
138
138
-

139
+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman-body.png" alt-text="Screenshot that shows the Body tab parameters when you use Postman to get the token.":::
139
140
140
141
1. Select **Send** to send the request to get the token. The value for `access_token` is the access token.
141
142
142
-

143
+
:::image type="content" source="media/howto-authorize-from-application/get-azure-ad-token-using-postman-response.png" alt-text="Screenshot that shows the response token when you use Postman to get the token.":::
143
144
144
145
## Code samples that use Microsoft Entra authorization
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-authorize-from-managed-identity.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,8 @@ In this section, you set up a system-assigned managed identity on a virtual mach
24
24
1. Under **Settings**, select **Identity**.
25
25
1. On the **System assigned** tab, set **Status** to **On**.
26
26
27
-

27
+
:::image type="content" source="media/howto-authorize-from-managed-identity/identity-virtual-machine.png" alt-text="Screenshot that shows creating a system identity for a virtual machine.":::
28
+
28
29
1. Select **Save** to confirm the change.
29
30
30
31
### Create a user-assigned managed identity
@@ -58,15 +59,15 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
58
59
59
60
The following screenshot shows an example of the Access control (IAM) pane for a Web PubSub resource:
60
61
61
-

62
+
:::image type="content" source="media/howto-authorize-from-managed-identity/access-control.png" alt-text="Screenshot that shows an example of the Access control (IAM) pane.":::
62
63
63
64
1. Select **Add** > **Add role assignment**.
64
65
65
66
1. Select the **Roles** tab, and then select **Web PubSub Service Owner**.
66
67
67
68
1. Select **Next**.
68
69
69
-

70
+
:::image type="content" source="media/howto-authorize-from-managed-identity/add-role-assignment.png" alt-text="Screenshot that shows adding a role assignment.":::
70
71
71
72
1. Select the **Members** tab. Under **Assign access to**, select **Managed identity**.
72
73
@@ -80,7 +81,7 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
80
81
81
82
1. Select **Next**.
82
83
83
-

84
+
:::image type="content" source="media/howto-authorize-from-managed-identity/assign-role-to-managed-identities.png" alt-text="Screenshot that shows assigning a role to managed identities.":::
84
85
85
86
1. Select **Review + assign** to confirm the change.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-shared-private-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ This outbound method is subject to the following requirements:
22
22
23
23
- The network endpoint must be deployed by using Azure App Service or Azure Functions.
24
24
- The Web PubSub resource must be on the Standard tier or the Premium tier.
25
-
- An Azure App Service or an Azure Functions resource must be created by choosing a specific SKU for the resource. For more information, see [Use Private Endpoints for Azure Web App](../app-service/networking/private-endpoint.md).
25
+
- An Azure App Service or an Azure Functions resource must be created by choosing a specific tier to create the resource. For more information, see [Use private endpoints for Azure Web App](../app-service/networking/private-endpoint.md).
26
26
27
27
Private endpoints of secured resources that are created by using Azure Web PubSub APIs are called *shared private link resources*. You're "sharing" access to a resource, such as an Azure Functions resource, that is integrated with [Azure Private Link](https://azure.microsoft.com/services/private-link/). These private endpoints are created inside the Web PubSub service execution environment and aren't directly visible to you.
0 commit comments