Skip to content

Commit 5efdc7e

Browse files
authored
Update authentication.md
Adding managed identity support for Azure communication service
1 parent 34f7ee5 commit 5efdc7e

File tree

1 file changed

+20
-3
lines changed

1 file changed

+20
-3
lines changed

articles/communication-services/concepts/authentication.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,33 @@ If you wish to call Azure Communication Services' APIs manually using an access
4545

4646
<a name='azure-ad-authentication'></a>
4747

48-
### Microsoft Entra authentication
4948

50-
The Azure platform provides role-based access (Azure RBAC) to control access to the resources. Azure RBAC security principal represents a user, group, service principal, or managed identity that is requesting access to Azure resources. Microsoft Entra authentication provides superior security and ease of use over other authorization options. For example, by using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. While you can continue to use Access Key authorization with communication services applications, Microsoft recommends moving to Microsoft Entra ID where possible.
5149

5250
To set up a service principal, [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, the endpoint and credentials can be used to authenticate the SDKs. See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
5351

54-
Communication services supports Microsoft Entra authentication for Communication services resources. You can find more details, about the managed identity support in the [Microsoft Entra documentation](/entra/identity/managed-identities-azure-resources/managed-identities-status).
52+
Communication services supports Microsoft Entra ID authentication for Communication services resources. You can find more details, about the managed identity support in the [How to use Managed Identity with Azure Communication Services](https://learn.microsoft.com/en-us/azure/communication-services/how-tos/managed-identity).
5553

5654

5755

56+
57+
58+
59+
### Microsoft Entra ID Authentication
60+
61+
The Azure platform provides role-based access (Azure RBAC) to control access to resources. Azure RBAC security principal represents a user, group, service principal, or managed identity that is requesting access to Azure resources. Microsoft Entra ID authentication provides superior security and ease of use over other authorization options.
62+
63+
- **Managed Identity:**
64+
- By using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. Managed identity credentials are fully managed, rotated, and protected by the platform, reducing the risk of credential exposure.
65+
- Managed identities can authenticate to Azure services and resources that support Microsoft Entra ID authentication. This method provides a seamless and secure way to manage credentials.
66+
- For more information on how to use Managed Identity with Azure Communication Services, refer to [this guide](https://learn.microsoft.com/azure/communication-services/how-tos/managed-identity).
67+
68+
- **Service Principal:**
69+
- To set up a service principal [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, the endpoint and credentials can be used to authenticate the SDKs.
70+
- See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
71+
72+
Communication Services supports Microsoft Entra ID authentication for Communication Services resources, While you can continue to use Access Key authorization with communication services applications, Microsoft recommends moving to Microsoft Entra ID where possible.
73+
74+
5875
Use our [Trusted authentication service hero sample](../samples/trusted-auth-sample.md) to map Azure Communication Services access tokens with your Microsoft Entra ID.
5976

6077
### User Access Tokens

0 commit comments

Comments
 (0)