Skip to content

Commit 5d4d2f1

Browse files
authored
update auth docs for wps
1 parent 960e3ec commit 5d4d2f1

6 files changed

+109
-206
lines changed

articles/azure-signalr/signalr-howto-authorize-application.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra applications
3-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra applications.
3+
description: This article provides information about authorizing requests to Azure SignalR Service resources with Microsoft Entra applications.
44
author: terencefan
55
ms.author: tefa
66
ms.date: 03/14/2023
@@ -14,7 +14,7 @@ ms.custom: subject-rbac-steps
1414

1515
Azure SignalR Service supports Microsoft Entra ID for authorizing requests with [Microsoft Entra applications](/entra/identity-platform/app-objects-and-service-principals).
1616

17-
This article shows how to configure your Azure SignalR Service resource and codes to authorize requests to the resource from a Microsoft Entra application.
17+
This article explains how to set up your resource and code to authenticate requests to the resource using a Microsoft Entra application.
1818

1919
## Register an application in Microsoft Entra ID
2020

@@ -32,7 +32,6 @@ After registering an app, you can add **certificates, client secrets (a string),
3232
- [Add a client secret](/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
3333
- [Add a federated credential](/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
3434

35-
3635
## Add role assignments in the Azure portal
3736

3837
[!INCLUDE [add role assignments](includes/signalr-add-role-assignments.md)]

articles/azure-signalr/signalr-howto-authorize-managed-identity.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,28 @@
11
---
22
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra managed identities
3-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra managed identities.
3+
description: This article provides information about authorizing requests to Azure SignalR resources with Managed identities for Azure resources.
44
author: terencefan
55
ms.author: tefa
6-
ms.date: 03/14/2025
6+
ms.date: 03/11/2025
77
ms.service: azure-signalr-service
88
ms.topic: how-to
99
ms.devlang: csharp
1010
ms.custom: subject-rbac-steps
1111
---
1212

13-
# Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources
13+
# Authorize requests to Azure SignalR resources with Managed identities for Azure resources
1414

1515
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
1616

17-
This article shows how to configure your Azure SignalR Service resource and code to authorize requests to the resource from a managed identity.
17+
This article explains how to set up your resource and code to authorize requests to the resource using a managed identity.
1818

1919
## Configure managed identities
2020

2121
The first step is to configure managed identities on your app or virtual machine.
2222

2323
- [Configure managed identities for App Service and Azure Functions](/azure/app-service/overview-managed-identity)
24-
- [Configure managed identities for Azure resources on a virtual machine (VM)](/entra/identity/managed-identities-azure-resources/tutorial-windows-vm-access)
24+
- [Configure managed identities on Azure virtual machines (VMs)](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities)
25+
- [Configure managed identities for Azure resources on a virtual machine scale set](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities-scale-sets)
2526

2627
## Add role assignments in the Azure portal
2728

articles/azure-web-pubsub/concept-azure-ad-authorization.md

Lines changed: 13 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -67,36 +67,27 @@ You can scope access to Azure Web PubSub resources at the following levels, begi
6767

6868
## Azure built-in roles for Web PubSub resources
6969

70-
- `Web PubSub Service Owner`
70+
| Role | Description | Use case |
71+
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
72+
| [Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner) | Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building a upstream server that handles negotiation requests and client events. |
73+
| [Web PubSub Service Reader](/azure/role-based-access-control/built-in-roles#web-pubsub-service-reader) | Readonly access to data-plane APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
7174

72-
Full access to data-plane permissions, including read/write REST APIs and Auth APIs.
7375

74-
This role is the most common used for building an upstream server.
76+
Learn how to create a custom role if the built-in roles do not meet your requirements.
7577

76-
- `Web PubSub Service Reader`
77-
78-
Use to grant read-only REST APIs permissions to Web PubSub resources.
79-
80-
It's used when you'd like to write a monitoring tool that calling **ONLY** Web PubSub data-plane **READONLY** REST APIs.
78+
[Azure custom roles: Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
8179

8280
## Next steps
8381

84-
To learn how to create an Azure application and use Microsoft Entra authorization, see
85-
86-
- [Authorize request to Web PubSub resources with Microsoft Entra ID from applications](howto-authorize-from-application.md)
87-
88-
To learn how to configure a managed identity and use Microsoft Entra auth, see
89-
90-
- [Authorize request to Web PubSub resources with Microsoft Entra ID from managed identities](howto-authorize-from-managed-identity.md)
91-
92-
To learn more about roles and role assignments, see
82+
To learn how to use Microsoft Entra authentication with role-based access control, see
9383

94-
- [What is Azure role-based access control](../role-based-access-control/overview.md)
84+
- [Authorize requests to Azure Web PubSub resources with Microsoft Entra applications](howto-authorize-from-application.md)
85+
- [Authorize requests to Azure Web PubSub resources with Managed identities for Azure resources](howto-authorize-from-managed-identity.md)
9586

96-
To learn how to create custom roles, see
87+
To learn more about roles-based access control, see
9788

98-
- [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
89+
- [What is Azure role-based access control](../role-based-access-control/overview.md)
9990

100-
To learn how to use only Microsoft Entra authorization, see
91+
To learn how to disable the connection string and use only Microsoft Entra authentication, see
10192

102-
- [Disable local authentication](./howto-disable-local-auth.md)
93+
- [How to disable local authentication](./howto-disable-local-auth.md)

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 17 additions & 93 deletions
Original file line numberDiff line numberDiff line change
@@ -1,119 +1,43 @@
11
---
22
title: Authorize an application request by using Microsoft Entra ID
3-
description: Learn how to authorize an application request to Web PubSub resources by using Microsoft Entra ID.
3+
description: This article provides information about authorizing requests to Azure Web PubSub resources with Microsoft Entra applications.
44
author: terencefan
55
ms.author: tefa
6-
ms.date: 10/12/2024
6+
ms.date: 03/11/2025
77
ms.service: azure-web-pubsub
88
ms.topic: conceptual
99
---
1010

11-
# Authorize an application request by using Microsoft Entra ID
11+
# Authorize requests to Azure Web PubSub resources with Microsoft Entra applications
1212

13-
Azure Web PubSub supports Microsoft Entra ID for authorizing requests from [applications](../active-directory/develop/app-objects-and-service-principals.md).
13+
Azure Web PubSub Service supports Microsoft Entra ID for authorizing requests with [Microsoft Entra applications](/entra/identity-platform/app-objects-and-service-principals).
1414

15-
This article shows you how to configure your Web PubSub resource and code to authorize a request to a Web PubSub resource from an Azure application.
1615

17-
## Register an application
16+
This article explains how to set up your resource and code to authenticate requests to the resource using a Microsoft Entra application.
1817

19-
The first step is to register an Azure application.
18+
## Register an application in Microsoft Entra ID
2019

21-
1. In the [Azure portal](https://portal.azure.com/), search for and then select **Microsoft Entra ID**.
22-
1. On the left menu under **Manage**, select **App registrations**.
23-
1. Select **New registration**.
24-
1. For **Name**, enter a name to use for your application.
25-
1. Select **Register** to confirm the application registration.
20+
The first step is to [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app):
2621

27-
:::image type="content" source="media/howto-authorize-from-application/register-an-application.png" alt-text="Screenshot that shows registering an application.":::
22+
After you register your application, you can find the **Application (client) ID** and **Directory (tenant) ID** values on the application's overview page. These GUIDs can be useful in the following steps.
2823

29-
When your application is registered, go to the application overview to view the values for **Application (client) ID** and **Directory (tenant) ID**. You use these values in the following sections.
30-
31-
:::image type="content" source="media/howto-authorize-from-application/application-overview.png" alt-text="Screenshot that shows an application.":::
32-
33-
For more information about registering an application, see the quickstart [Register an application by using the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
24+
![Screenshot of overview information for a registered application.](./media/signalr-howto-authorize-application/application-overview.png)
3425

3526
## Add credentials
3627

37-
You can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
38-
39-
For more information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
40-
41-
### Add a client secret
42-
43-
The application requires a client secret for a client to prove its identity when it requests a token.
44-
45-
To create a client secret:
46-
47-
1. On the left menu under **Manage**, select **Certificates & secrets**.
48-
1. On the **Client secrets** tab, select **New client secret**.
49-
50-
:::image type="content" source="media/howto-authorize-from-application/new-client-secret.png" alt-text="Screenshot that shows creating a client secret.":::
51-
52-
1. Enter a description for the client secret, and then choose an **Expires** time for the secret.
53-
1. Copy the value of the client secret and paste it in a secure location for later use.
54-
55-
> [!NOTE]
56-
> The secret is visible only when you create the secret. You can't view the client secret in the portal later.
57-
58-
### Add a certificate
59-
60-
You can upload a certificate instead of creating a client secret.
61-
62-
:::image type="content" source="media/howto-authorize-from-application/upload-certificate.png" alt-text="Screenshot that shows uploading a certificate.":::
63-
64-
## Add a role assignment in the Azure portal
65-
66-
This section demonstrates how to assign a Web PubSub Service Owner role to a service principal (application) for a Web PubSub resource.
67-
68-
> [!NOTE]
69-
> You can assign a role to any scope, including management group, subscription, resource group, and single resource. For more information about scope, see [Understand scope for Azure role-based access control](../role-based-access-control/scope-overview.md).
70-
71-
1. In the [Azure portal](https://portal.azure.com/), go to your Web PubSub resource.
72-
73-
1. On the left menu, select **Access control (IAM)** to display access control settings for the resource.
74-
75-
1. Select the **Role assignments** tab and view the role assignments at this scope.
76-
77-
The following figure shows an example of the **Access control (IAM)** pane for a Web PubSub resource:
78-
79-
:::image type="content" source="media/howto-authorize-from-application/access-control.png" alt-text="Screenshot that shows an example of the Access control (IAM) pane.":::
80-
81-
1. Select **Add** > **Add role assignment**.
82-
83-
1. Select the **Roles** tab, and then select **Web PubSub Service Owner**.
84-
85-
1. Select **Next**.
86-
87-
:::image type="content" source="media/howto-authorize-from-application/add-role-assignment.png" alt-text="Screenshot that shows adding a role assignment.":::
88-
89-
1. Select the **Members** tab. Under **Assign access to**, select **User, group, or service principal**.
90-
91-
1. Choose **Select members**.
92-
93-
1. Search for and select the application to assign the role to.
94-
95-
1. Choose **Select** to confirm the selection.
96-
97-
1. Select **Next**.
98-
99-
:::image type="content" source="media/howto-authorize-from-application/assign-role-to-service-principals.png" alt-text="Screenshot that shows assigning a role to service principals.":::
100-
101-
1. Select **Review + assign** to confirm the change.
28+
After registering an app, you can add **certificates, client secrets (a string), or federated identity credentials** as credentials to your confidential client app registration. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime, and are used by confidential client applications that access a web API.
10229

103-
> [!IMPORTANT]
104-
> Azure role assignments might take up to 30 minutes to propagate.
30+
- [Add a certificate](/entra/identity-platform/quickstart-register-app?tabs=certificate#add-credentials)
31+
- [Add a client secret](/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
32+
- [Add a federated credential](/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
10533

106-
To learn more about how to assign and manage Azure role assignments, see these articles:
34+
## Add role assignments in the Azure portal
10735

108-
- [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml)
109-
- [Assign Azure roles by using REST API](../role-based-access-control/role-assignments-rest.md)
110-
- [Assign Azure roles by using Azure PowerShell](../role-based-access-control/role-assignments-powershell.md)
111-
- [Assign Azure roles by using the Azure CLI](../role-based-access-control/role-assignments-cli.md)
112-
- [Assign Azure roles by using an Azure Resource Manager template](../role-based-access-control/role-assignments-template.md)
36+
[!INCLUDE [add role assignments](includes/web-pubsub-add-role-assignments.md)]
11337

114-
## Code samples that use Microsoft Entra authorization
38+
## Code samples with Microsoft Entra authorization
11539

116-
Get samples that use Microsoft Entra authorization in our four officially supported programming languages:
40+
Check out our samples that show how to use Microsoft Entra authorization in programming languages we officially support.
11741

11842
- [C#](./howto-create-serviceclient-with-net-and-azure-identity.md)
11943
- [Python](./howto-create-serviceclient-with-python-and-azure-identity.md)

0 commit comments

Comments
 (0)