Skip to content

Commit 71117f5

Browse files
authored
Merge pull request #42266 from v-geberr/0525-aad-1
remove incorrect aad info
2 parents da0a315 + 7693ec2 commit 71117f5

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/cognitive-services/LUIS/luis-concept-security.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,12 +57,13 @@ A user who is not an owner or collaborator, can only access a public app if give
5757
## Microsoft user accounts
5858
Authors and collaborators can add keys to LUIS on the Publish page. The Microsoft user account that creates the LUIS key in the Azure portal needs to either the app owner or an app collaborator.
5959

60+
<!--
6061
### Individual consent
6162
If the Microsoft user account is part of an Azure Active Directory (AAD), and the active directory doesn't allow users to give consent, then you can provide individual consent as part of the login process.
6263
6364
### Administrator consent
6465
If the Microsoft user account is part of an Azure Active Directory (AAD), and the active directory doesn't allow users to give consent, then the administrator can give individual consent via the method discussed in this [blog](https://blogs.technet.microsoft.com/tfg/2017/10/15/english-tips-to-manage-azure-ad-users-consent-to-applications-using-azure-ad-graph-api/).
65-
66+
-->
6667
## Securing the endpoint
6768
You can control who can see your LUIS endpoint key by calling it in a server-to-server environment. If you are using LUIS from a bot, the connection between the bot and LUIS is already secure. If you are calling the LUIS endpoint directly, you should create a server-side API (such as an Azure [function](https://azure.microsoft.com/services/functions/)) with controlled access (such as [AAD](https://azure.microsoft.com/services/active-directory/)). When the server-side API is called and authentication and authorization are verified, pass the call on to LUIS. While this strategy doesn’t prevent man-in-the-middle attacks, it obfuscates your endpoint from your users, allows you to track access, and allows you to add endpoint response logging (such as [Application Insights](https://azure.microsoft.com/services/application-insights/)).
6869

0 commit comments

Comments
 (0)