Skip to content

Commit 571d7e4

Browse files
authored
update
1 parent 8615362 commit 571d7e4

File tree

3 files changed

+16
-16
lines changed

3 files changed

+16
-16
lines changed

articles/azure-signalr/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,9 @@
141141
href: signalr-howto-authorize-application.md
142142
- name: Authorize from managed identity
143143
href: signalr-howto-authorize-managed-identity.md
144-
- name: Disable local authentication.
144+
- name: Configure cross tenant authroization
145+
href: signalr-howto-authorize-cross-tenant.md
146+
- name: Disable local authentication
145147
href: howto-disable-local-auth.md
146148
- name: Custom domain
147149
href: howto-custom-domain.md

articles/azure-signalr/signalr-howto-authorize-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -195,6 +195,6 @@ In the Azure portal, add settings as follows:
195195
See the following related articles:
196196

197197
- [Microsoft Entra ID for Azure SignalR Service](signalr-concept-authorize-azure-active-directory.md)
198-
- [Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources](./signalr-howto-authorize-managed-identity.md).
198+
- [Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources](./signalr-howto-authorize-managed-identity.md)
199199
- [How to configure cross tenant authorization with Microsoft Entra](signalr-howto-authorize-cross-tenant.md)
200-
- [How to disable local authentication](./howto-disable-local-auth.md)
200+
- [How to disable local authentication](./howto-disable-local-auth.md)

articles/azure-signalr/signalr-howto-authorize-cross-tenant.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -20,20 +20,20 @@ This doc help you create an application in `tenantA` and use it to connect to a
2020

2121
## Register a multitenant application in tenant A
2222

23-
The first step is to create a multitenant application.
24-
25-
> In the case that you've already have a single tenant application.
26-
>
27-
> [Convert single-tenant app to multitenant on Microsoft Entra ID](/entra/identity-platform/howto-convert-app-to-be-multi-tenant)
23+
The first step is to create a multitenant application, see:
2824

2925
[Quickstart: Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app)
3026

27+
In the case that you've already have a single tenant application.
28+
29+
[Convert single-tenant app to multitenant on Microsoft Entra ID](/entra/identity-platform/howto-convert-app-to-be-multi-tenant)
30+
3131
There are four account types:
3232

33-
1. Accounts in this organizational directory
34-
2. Accounts in any organizational directory
35-
3. Accounts in any organizational directory and personal Microsoft accounts
36-
4. Personal Microsoft accounts
33+
- Accounts in this organizational directory
34+
- Accounts in any organizational directory
35+
- Accounts in any organizational directory and personal Microsoft accounts
36+
- Personal Microsoft accounts
3737

3838
Be sure to select either type 2 or type 3 when creating the application.
3939

@@ -75,7 +75,7 @@ We strongly recommend you to use the first 2 ways to make cross tenant requests.
7575

7676
- `tenantId` should be the ID of your **Tenant B**.
7777
- `clientId` in both tenants are equal.
78-
- `clientSecret` and `clientCert` should be configured in **Tenant A**, see [Add credentials](/entra/identity-platform/quickstart-register-app?tabs=certificate%2Cexpose-a-web-api#add-credentials)
78+
- `clientSecret` and `clientCert` should be configured in **Tenant A**, see [Add credentials](/entra/identity-platform/quickstart-register-app?tabs=certificate%2Cexpose-a-web-api#add-credentials).
7979

8080
If you aren't sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant)
8181

@@ -181,12 +181,10 @@ Your goal is to get a token with following claims. Use [jwt.io](https://jwt.io/)
181181

182182
Has to be `https://signalr.azure.com/.default` to access SignalR resources.
183183
184-
Good luck :)
185-
186184
## Next steps
187185

188186
See the following related articles:
189187

190188
- [Microsoft Entra ID for Azure SignalR Service](signalr-concept-authorize-azure-active-directory.md)
191189
- [Authorize requests to Azure SignalR Service resources with Microsoft Entra applications](signalr-howto-authorize-application.md)
192-
- [Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources](./signalr-howto-authorize-managed-identity.md).
190+
- [Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources](./signalr-howto-authorize-managed-identity.md)

0 commit comments

Comments
 (0)