Skip to content

Commit 5d8d340

Browse files
authored
Merge pull request #99671 from dagiro/freshness135
freshness135
2 parents 550862f + 68e41ef commit 5d8d340

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

articles/hdinsight/hdinsight-create-non-interactive-authentication-dotnet-applications.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
title: Non-interactive authentication .NET application - Azure HDInsight
33
description: Learn how to create non-interactive authentication Microsoft .NET applications in Azure HDInsight.
4-
ms.reviewer: jasonh
54
author: hrasheed-msft
6-
5+
ms.author: hrasheed
6+
ms.reviewer: jasonh
77
ms.service: hdinsight
8-
ms.custom: hdinsightactive
98
ms.topic: conceptual
10-
ms.date: 05/14/2018
11-
ms.author: hrasheed
12-
9+
ms.custom: hdinsightactive
10+
ms.date: 12/23/2019
1311
---
12+
1413
# Create a non-interactive authentication .NET HDInsight application
15-
You can run your Microsoft .NET Azure HDInsight application either under the application's own identity (non-interactive) or under the identity of the signed-in user of the application (interactive). This article shows you how to create a non-interactive authentication .NET application to connect to Azure and manage HDInsight. For a sample of an interactive application, see [Connect to Azure HDInsight](hdinsight-administer-use-dotnet-sdk.md#connect-to-azure-hdinsight).
14+
15+
Run your Microsoft .NET Azure HDInsight application either under the application's own identity (non-interactive) or under the identity of the signed-in user of the application (interactive). This article shows you how to create a non-interactive authentication .NET application to connect to Azure and manage HDInsight. For a sample of an interactive application, see [Connect to Azure HDInsight](hdinsight-administer-use-dotnet-sdk.md#connect-to-azure-hdinsight).
1616

1717
From your non-interactive .NET application, you need:
1818

@@ -21,20 +21,21 @@ From your non-interactive .NET application, you need:
2121
* The Azure AD application secret key. See [Get application authentication key](../active-directory/develop/howto-create-service-principal-portal.md#get-values-for-signing-in).
2222

2323
## Prerequisites
24-
* An HDInsight cluster. See the [getting started tutorial](hadoop/apache-hadoop-linux-tutorial-get-started.md#create-cluster).
24+
25+
An HDInsight cluster. See the [getting started tutorial](hadoop/apache-hadoop-linux-tutorial-get-started.md#create-cluster).
2526

2627
## Assign a role to the Azure AD application
27-
Assign your Azure AD application a [role](../role-based-access-control/built-in-roles.md), to grant it permissions to perform actions. You can set the scope at the level of the subscription, resource group, or resource. The permissions are inherited to lower levels of scope. (For example, adding an application to the Reader role for a resource group means that the application can read the resource group and any resources in it.) In this article, you set the scope at the resource group level. For more information, see [Use role assignments to manage access to your Azure subscription resources](../role-based-access-control/role-assignments-portal.md).
28+
29+
Assign your Azure AD application a [role](../role-based-access-control/built-in-roles.md), to grant it permissions to perform actions. You can set the scope at the level of the subscription, resource group, or resource. The permissions are inherited to lower levels of scope. For example, adding an application to the Reader role for a resource group means that the application can read the resource group and any resources in it. In this article, you set the scope at the resource group level. For more information, see [Use role assignments to manage access to your Azure subscription resources](../role-based-access-control/role-assignments-portal.md).
2830

2931
**To add the Owner role to the Azure AD application**
3032

3133
1. Sign in to the [Azure portal](https://portal.azure.com).
32-
2. In the left menu, select **Resource groups**.
33-
3. Select the resource group that has the HDInsight cluster on which you will run your Hive query later in this article. If you have a large number of resource groups, you can use the filter to find the one you want.
34-
4. On the resource group menu, select **Access control (IAM)**.
35-
5. Select the **Role assignments** tab to see the current role assignments.
36-
6. At the top of the page, select **Add role assignment**.
37-
7. Follow the instructions to add the Owner role to your Azure AD application. After you successfully add the role, the application is listed under the Owner role.
34+
1. Navigate to the resource group that has the HDInsight cluster on which you'll run your Hive query later in this article. If you have a large number of resource groups, you can use the filter to find the one you want.
35+
1. On the resource group menu, select **Access control (IAM)**.
36+
1. Select the **Role assignments** tab to see the current role assignments.
37+
1. At the top of the page, select **+ Add**.
38+
1. Follow the instructions to add the Owner role to your Azure AD application. After you successfully add the role, the application is listed under the Owner role.
3839

3940
## Develop an HDInsight client application
4041

@@ -113,8 +114,8 @@ Assign your Azure AD application a [role](../role-based-access-control/built-in-
113114
}
114115
```
115116

116-
117117
## Next steps
118+
118119
* [Create an Azure Active Directory application and service principal in the Azure portal](../active-directory/develop/howto-create-service-principal-portal.md).
119120
* Learn how to [authenticate a service principal with Azure Resource Manager](../active-directory/develop/howto-authenticate-service-principal-powershell.md).
120121
* Learn about [Azure Role-Based Access Control (RBAC)](../role-based-access-control/role-assignments-portal.md).

0 commit comments

Comments
 (0)