You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/concept-azure-ad-authorization.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ _[1] security principal: a user/resource group, an application, or a service pri
24
24
25
25
Authentication is necessary to access a Web PubSub resource when using Microsoft Entra ID. This authentication involves two steps:
26
26
27
-
1. First, Azure authenticates the security principal and issues an OAuth 2.0 token.
27
+
1. First, Azure authenticate the security principal and issues an OAuth 2.0 token.
28
28
2. Second, the token is added to the request to the Web PubSub resource. The Web PubSub service uses the token to check if the service principal has the access to the resource.
29
29
30
30
### Client-side authentication while using Microsoft Entra ID
@@ -33,7 +33,7 @@ The negotiation server/Function App shares an access key with the Web PubSub res
33
33
34
34
However, access key is often disabled when using Microsoft Entra ID to improve security.
35
35
36
-
To address this issue, we have developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
36
+
To address this issue, we developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
37
37
38
38
To use this API, the negotiation server must first obtain an **Microsoft Entra Token** from Azure to authenticate itself. The server can then call the Web PubSub Auth API with the **Microsoft Entra Token** to retrieve a **Client Token**. The **Client Token** is then returned to the client, who can use it to connect to the Azure Web PubSub service.
39
39
@@ -45,7 +45,8 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
45
45
46
46
### Resource scope
47
47
48
-
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have. It's recommended to grant the role with the narrowest possible scope. Resources located underneath inherit Azure RBAC roles with broader scopes.
48
+
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have.
49
+
It is recommended to grant the role to the most limited scope. Resources within it will inherit Azure RBAC roles assigned to the scope.
49
50
50
51
You can scope access to Azure Web PubSub resources at the following levels, beginning with the narrowest scope:
51
52
@@ -69,7 +70,7 @@ You can scope access to Azure Web PubSub resources at the following levels, begi
|[Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner)| Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building a upstream server that handles negotiation requests and client events. |
73
+
|[Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner)| Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building an upstream server that handles negotiation requests and client events. |
73
74
| [Web PubSub Service Reader](/azure/role-based-access-control/built-in-roles#web-pubsub-service-reader) | Readonly access to data-plane APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-authorize-from-application.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ The first step is to [Register an application in Microsoft Entra ID](/entra/iden
21
21
22
22
After you register your application, you can find the **Application (client) ID** and **Directory (tenant) ID** values on the application's overview page. These GUIDs can be useful in the following steps.
23
23
24
-

24
+

Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/reference-rest-api-data-plane.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ The credential scope used should be `https://webpubsub.azure.com/.default`.
63
63
64
64
You could also use **Role Based Access Control (RBAC)** to authorize the request from your server to Azure Web PubSub Service.
65
65
66
-
[Learn how to configure Role Based Access Control roles for your resource](./howto-authorize-from-application.md#add-a-role-assignment-in-the-azure-portal)
66
+
[Learn how to add role assignments](./howto-authorize-from-application.md#add-role-assignments-in-the-azure-portal)
0 commit comments