Skip to content

Commit 5ce9169

Browse files
authored
update
1 parent 5d4d2f1 commit 5ce9169

File tree

3 files changed

+7
-6
lines changed

3 files changed

+7
-6
lines changed

articles/azure-web-pubsub/concept-azure-ad-authorization.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ _[1] security principal: a user/resource group, an application, or a service pri
2424

2525
Authentication is necessary to access a Web PubSub resource when using Microsoft Entra ID. This authentication involves two steps:
2626

27-
1. First, Azure authenticates the security principal and issues an OAuth 2.0 token.
27+
1. First, Azure authenticate the security principal and issues an OAuth 2.0 token.
2828
2. Second, the token is added to the request to the Web PubSub resource. The Web PubSub service uses the token to check if the service principal has the access to the resource.
2929

3030
### Client-side authentication while using Microsoft Entra ID
@@ -33,7 +33,7 @@ The negotiation server/Function App shares an access key with the Web PubSub res
3333

3434
However, access key is often disabled when using Microsoft Entra ID to improve security.
3535

36-
To address this issue, we have developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
36+
To address this issue, we developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
3737

3838
To use this API, the negotiation server must first obtain an **Microsoft Entra Token** from Azure to authenticate itself. The server can then call the Web PubSub Auth API with the **Microsoft Entra Token** to retrieve a **Client Token**. The **Client Token** is then returned to the client, who can use it to connect to the Azure Web PubSub service.
3939

@@ -45,7 +45,8 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
4545

4646
### Resource scope
4747

48-
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have. It's recommended to grant the role with the narrowest possible scope. Resources located underneath inherit Azure RBAC roles with broader scopes.
48+
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have.
49+
It is recommended to grant the role to the most limited scope. Resources within it will inherit Azure RBAC roles assigned to the scope.
4950

5051
You can scope access to Azure Web PubSub resources at the following levels, beginning with the narrowest scope:
5152

@@ -69,7 +70,7 @@ You can scope access to Azure Web PubSub resources at the following levels, begi
6970

7071
| Role | Description | Use case |
7172
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
72-
| [Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner) | Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building a upstream server that handles negotiation requests and client events. |
73+
| [Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner) | Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building an upstream server that handles negotiation requests and client events. |
7374
| [Web PubSub Service Reader](/azure/role-based-access-control/built-in-roles#web-pubsub-service-reader) | Readonly access to data-plane APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
7475

7576

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The first step is to [Register an application in Microsoft Entra ID](/entra/iden
2121

2222
After you register your application, you can find the **Application (client) ID** and **Directory (tenant) ID** values on the application's overview page. These GUIDs can be useful in the following steps.
2323

24-
![Screenshot of overview information for a registered application.](./media/signalr-howto-authorize-application/application-overview.png)
24+
![Screenshot of overview information for a registered application.](./media/howto-authorize-from-application/application-overview.png)
2525

2626
## Add credentials
2727

articles/azure-web-pubsub/reference-rest-api-data-plane.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The credential scope used should be `https://webpubsub.azure.com/.default`.
6363

6464
You could also use **Role Based Access Control (RBAC)** to authorize the request from your server to Azure Web PubSub Service.
6565

66-
[Learn how to configure Role Based Access Control roles for your resource](./howto-authorize-from-application.md#add-a-role-assignment-in-the-azure-portal)
66+
[Learn how to add role assignments](./howto-authorize-from-application.md#add-role-assignments-in-the-azure-portal)
6767

6868
## APIs
6969

0 commit comments

Comments
 (0)