Skip to content

Commit 5e9ca32

Browse files
authored
Merge pull request #114965 from Adaeze934/patch-1
Update howto-authorize-rest-api.md
2 parents e3619d5 + 896857c commit 5e9ca32

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/iot-central/core/howto-authorize-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ The IoT Central REST API lets you develop client applications that integrate wit
1717

1818
Every IoT Central REST API call requires an authorization header that IoT Central uses to determine the identity of the caller and the permissions that caller is granted within the application.
1919

20-
This article describes the types of token you can use in the authorization header, and how to get them.
20+
This article describes the types of token you can use in the authorization header, and how to get them. Please note that service principals are the recommended method for access management for IoT Central REST APIs.
2121

2222
## Token types
2323

2424
To access an IoT Central application using the REST API, you can use an:
2525

26-
- _Azure Active Directory bearer token_. A bearer token is associated with an Azure Active Directory user account or service principal. The token grants the caller the same permissions the user or service principal has in the IoT Central application.
26+
- _Azure Active Directory bearer token_. A bearer token is associated with an Azure Active Directory user account or service principal. The token grants the caller the same permissions the user or service principal has in the IoT Central application.
2727
- IoT Central API token. An API token is associated with a role in your IoT Central application.
2828

2929
Use a bearer token associated with your user account while you're developing and testing automation and scripts that use the REST API. Use a bearer token that's associated with a service principal for production automation and scripts. Use a bearer token in preference to an API token to reduce the risk of leaks and problems when tokens expire.

0 commit comments

Comments
 (0)