You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -104,6 +104,223 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
104
104
1. Select **Add a client application** and note the App ID.
105
105
106
106
[](media/add-a-client-app.png#lightbox)
107
+
## Register desktop client application for ArcGIS Pro
108
+
109
+
Register a second application (with a distinct name) to represent ArcGIS
110
+
Pro Desktop and configure its API permissions --- ensuring it includes
111
+
access to the web API exposed by the first application.
112
+
113
+
1. Create a second app registration for the ArcGIS Pro desktop client.
114
+
115
+
- Suggested name: ArcGISPro-GeoCatalog-DesktopClient or GeoCatalog-ArcGIS.
116
+
117
+
- Set account type: **Single tenant**.
118
+
119
+
[](media/register-second-app-arcgis-pro-desktop-client.png#lightbox)
120
+
121
+
[](media/new-app-registration-geocatalog-arcgis.png#lightbox)
122
+
123
+
1. Configure the Desktop Client App.
124
+
125
+
Complete the following configuration within the new App registration GeoCatalog-ArcGIS.
126
+
127
+
- For **Authentication**, repeat the same steps as in Step 1:
128
+
129
+
- Add platform: **Web**.
130
+
- Set **Redirect URI**: https://localhost.
131
+
- Add platform: **Mobile and desktop applications**
132
+
- Set **Redirect URI**: arcgis-pro://auth.
133
+
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
134
+
- Select **Save**.
135
+
136
+
-**API Permissions**: Adding Access to the Web API App.
137
+
138
+
- In the **API permissions** tab, select **Add a permission**.
139
+
140
+
- Go to the **APIs my organization uses** tab and search for the **Web
141
+
API app** created in Step 1 (for example, ArcGIS Pro).
142
+
143
+
- Select the app name to open the **Request API Permissions** screen.
144
+
145
+
[](media/request-api-permissions.png#lightbox)
146
+
147
+
- Select both user_authentication and user_impersonation; the delegated permissions defined in the first app.
148
+
149
+
- Select **Add permissions**.
150
+
151
+
[](media/add-api-permissions-arcgis-pro.png#lightbox)
152
+
153
+
- Continue to add the following delegated permissions:
154
+
155
+
-**Azure Storage** > user_impersonation.
156
+
-**Azure Orbital Spatio** > user_impersonation.
157
+
-**Microsoft Graph** > User.Read (This permission is enabled by default).
158
+
- Select **Add permissions**.
159
+
- Select **Grant admin consent**.
160
+
161
+
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
162
+
163
+
[](media/grant-admin-consents-4.png#lightbox)
164
+
## Configure ArcGIS Pro (Desktop) for Microsoft Planetary Computer Pro GeoCatalog access
165
+
166
+
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
167
+
## Add an authentication connection
168
+
169
+
1. Open the **ArcGIS Pro settings** page in one of the following ways:
170
+
171
+
- From an open project, select the **Project** tab on the ribbon.
172
+
- From the start page, select the **Settings** tab.
173
+
174
+
1. In the side menu, select **Options**.
175
+
176
+
1. In the **Options** dialog box, under **Application**, select **Authentication**.
177
+
178
+
1. Select **Add Connection** to add a new authentication connection.
179
+
180
+
1. In the **Add Connection** dialog box:
181
+
182
+
- Enter a **Connection Name**.
183
+
184
+
- For **Type**, select **Microsoft Entra ID**.
185
+
186
+
- Enter your **Entra Domain** and **Client ID**.
187
+
188
+
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
189
+
190
+
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
191
+
192
+
- Add the following **scopes**:
193
+
194
+
-`https://storage.azure.com/.default`
195
+
196
+
-`https://geocatalog.spatio.azure.com/.default`
197
+
198
+
[](media/add-connection.png#lightbox)
199
+
200
+
- Select **OK**.
201
+
202
+
- Sign in through the Authentication dialog and complete the prompts.
203
+
204
+
[](media/sign-in.png#lightbox)
205
+
206
+
> [!TIP]
207
+
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
208
+
209
+
210
+
## Prepare and record GeoCatalog information
211
+
212
+
1. Create an Microsoft Planetary Computer Pro GeoCatalog in your Azure subscription (for example,
213
+
arcgisprogeocatalog), and locate it in the appropriate resource group.
1. Select on the GeoCatalog. For example, **arcgisprogeocatalog**.
218
+
219
+
1. Record the **GeoCatalog URI**. For example, ```https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com```.
220
+
221
+
[](media/get-geocatalog-uri.png#lightbox)
222
+
223
+
1. Open the link to your GeoCatalog URI in the browser and select on the
224
+
**Collections** button
225
+
226
+
[](media/media-processing-center-pro-collections.png#lightbox)
227
+
228
+
1. Record the **Collection Name**. For example, sentinel-2-l2a-tutorial-1000.
229
+
230
+
1. Construct the **Token API Endpoint** using this pattern: ```<GeoCatalog URI>/sas/token/<Collection Name>?api-version=2025-04-30-preview```
1. In ArcGIS Pro, open the **Create Cloud Storage Connection File** geoprocessing tool to create a new ACS connection file. This tool can be accessed in the main Ribbon on the Analysis Tab. Select the Tools Button, then search for the tool by typing its name.
257
+
258
+
1. Specify a Connection File Location for the ACS file.
259
+
260
+
1. Provide a Connection File Name. For example, **geocatalog_connection.acs**.
261
+
262
+
1. For Service Provider selectAzure.
263
+
264
+
1. For **Authentication**, selectthe name of the auth profile that you created in previous steps.
265
+
266
+
1. For **Access Key ID (Account Name)**, use the **Account Name** value that you recorded earlier: ```<unique-storage>```.
267
+
268
+
1. For **Bucket (Container) Name** use the **Container Name** value that you recorded earlier: ```sentinel-2-l2a-tutorial-1000-<unique-id>```.
269
+
270
+
1. Do not specify a **Folder**.
271
+
272
+
1. Add the provider option **ARC_TOKEN_SERVICE_API** and set the value to your **Token API Endpoint** that you constructed earlier. For example:
## Create a STAC connection to Microsoft Planetary Computer Pro
282
+
283
+
1. Create a new STAC connection in ArcGIS Pro (desktop).
284
+
285
+
> [!TIP]
286
+
> Refer to ArcGIS Pro documentation to [Create a STAC connection](https://pro.arcgis.com/en/pro-app/latest/help/data/imagery/create-a-stac-connection.htm).
287
+
288
+
[  ](media/create-new-stac-connection.png#lightbox)
289
+
290
+
- Provide a name for the STAC Connection: For example, GeoCatalog_Connection.
291
+
292
+
- For Connection use the form```<GeoCatalog URI>/stac```. For example,
- [Create a new GeoCatalog](./deploy-geocatalog-resource.md)
323
+
- [Create a STAC collection](./create-stac-collection.md)
107
324
108
325
# [US Gov](#tab/usgov)
109
326
## Register web API application for ArcGIS Pro
@@ -146,7 +363,7 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
146
363
147
364
1. In the new **Mobile and desktop applications** panel, select*Add URI* to add a second Redirect URI: https://login.microsoftonline.us/common/oauth2/nativeclient
148
365
149
-
[](media/government-mobile-second-redirect..png#lightbox)
366
+
[  ](media/government-mobile-second-redirect.png#lightbox)
150
367
151
368
1. Enable **ID tokens** under **Implicit grant and hybrid flows**.
152
369
@@ -184,67 +401,6 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
184
401
1. Select **Add a client application** and note the App ID.
185
402
186
403
[  ](media/add-a-client-app.png#lightbox)
187
-
188
-
# [Public](#tab/public)
189
-
## Register desktop client application for ArcGIS Pro
190
-
191
-
Register a second application (with a distinct name) to represent ArcGIS
192
-
Pro Desktop and configure its API permissions --- ensuring it includes
193
-
access to the web API exposed by the first application.
194
-
195
-
1. Create a second app registration for the ArcGIS Pro desktop client.
196
-
197
-
- Suggested name: ArcGISPro-GeoCatalog-DesktopClient or GeoCatalog-ArcGIS.
198
-
199
-
- Set account type: **Single tenant**.
200
-
201
-
[](media/register-second-app-arcgis-pro-desktop-client.png#lightbox)
202
-
203
-
[](media/new-app-registration-geocatalog-arcgis.png#lightbox)
204
-
205
-
1. Configure the Desktop Client App.
206
-
207
-
Complete the following configuration within the new App registration GeoCatalog-ArcGIS.
208
-
209
-
- For **Authentication**, repeat the same steps as in Step 1:
210
-
211
-
- Add platform: **Web**.
212
-
- Set **Redirect URI**: https://localhost.
213
-
- Add platform: **Mobile and desktop applications**
214
-
- Set **Redirect URI**: arcgis-pro://auth.
215
-
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
216
-
- Select **Save**.
217
-
218
-
-**API Permissions**: Adding Access to the Web API App.
219
-
220
-
- In the **API permissions** tab, select **Add a permission**.
221
-
222
-
- Go to the **APIs my organization uses** tab and search for the **Web
223
-
API app** created in Step 1 (for example, ArcGIS Pro).
224
-
225
-
- Select the app name to open the **Request API Permissions** screen.
226
-
227
-
[](media/request-api-permissions.png#lightbox)
228
-
229
-
- Select both user_authentication and user_impersonation; the delegated permissions defined in the first app.
230
-
231
-
- Select **Add permissions**.
232
-
233
-
[](media/add-api-permissions-arcgis-pro.png#lightbox)
234
-
235
-
- Continue to add the following delegated permissions:
236
-
237
-
-**Azure Storage** > user_impersonation.
238
-
-**Azure Orbital Spatio** > user_impersonation.
239
-
-**Microsoft Graph** > User.Read (This permission is enabled by default).
240
-
- Select **Add permissions**.
241
-
- Select **Grant admin consent**.
242
-
243
-
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
244
-
245
-
[](media/grant-admin-consents-4.png#lightbox)
246
-
247
-
# [US Gov](#tab/usgov)
248
404
## Register desktop client application for ArcGIS Pro
249
405
250
406
Register a second application (with a distinct name) to represent ArcGIS
@@ -303,55 +459,9 @@ access to the web API exposed by the first application.
303
459
[  ](media/app-selection-on-request-api-permissions-screen.png#lightbox)
304
460
305
461
[  ](media/grant-admin-consents-4.png#lightbox)
306
-
307
462
## Configure ArcGIS Pro (Desktop) for Microsoft Planetary Computer Pro GeoCatalog access
308
463
309
464
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
310
-
311
-
# [Public](#tab/public)
312
-
## Add an authentication connection
313
-
314
-
1. Open the **ArcGIS Pro settings** page in one of the following ways:
315
-
316
-
- From an open project, select the **Project** tab on the ribbon.
317
-
- From the start page, select the **Settings** tab.
318
-
319
-
1. In the side menu, select **Options**.
320
-
321
-
1. In the **Options** dialog box, under **Application**, select **Authentication**.
322
-
323
-
1. Select **Add Connection** to add a new authentication connection.
324
-
325
-
1. In the **Add Connection** dialog box:
326
-
327
-
- Enter a **Connection Name**.
328
-
329
-
- For **Type**, select **Microsoft Entra ID**.
330
-
331
-
- Enter your **Entra Domain** and **Client ID**.
332
-
333
-
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
334
-
335
-
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
336
-
337
-
- Add the following **scopes**:
338
-
339
-
-`https://storage.azure.com/.default`
340
-
341
-
-`https://geocatalog.spatio.azure.com/.default`
342
-
343
-
[](media/add-connection.png#lightbox)
344
-
345
-
- Select **OK**.
346
-
347
-
- Sign in through the Authentication dialog and complete the prompts.
348
-
349
-
[](media/sign-in.png#lightbox)
350
-
351
-
> [!TIP]
352
-
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
353
-
354
-
# [US Gov](#tab/usgov)
355
465
## Add an authentication connection
356
466
357
467
1. Open the **ArcGIS Pro settings** page in one of the following ways:
@@ -395,6 +505,8 @@ This section outlines how to configure authentication and data access in the **A
395
505
> [!TIP]
396
506
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
397
507
508
+
509
+
398
510
## Prepare and record GeoCatalog information
399
511
400
512
1. Create an Microsoft Planetary Computer Pro GeoCatalog in your Azure subscription (for example,
@@ -439,7 +551,6 @@ This section outlines how to configure authentication and data access in the **A
1. In ArcGIS Pro, open the **Create Cloud Storage Connection File** geoprocessing tool to create a new ACS connection file. This tool can be accessed in the main Ribbon on the Analysis Tab. Select the Tools Button, then search for the tool by typing its name.
@@ -467,7 +578,6 @@ This section outlines how to configure authentication and data access in the **A
467
578
1. Add the provider option **ARC_TOKEN_OPTION_NAME** and set the value **to AZURE_STORAGE_SAS_TOKEN**.
0 commit comments