You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -28,12 +28,12 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
28
28
> Before you begin, review [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app) for background information on app registration.
29
29
30
30
## Register web API application for ArcGIS Pro
31
-
31
+
### [Public](#tab/public)
32
32
1. Open the Azure Portal and go to **Microsoft Entra ID**.
33
33
34
34
[](media/microsoft-entra-id.png#lightbox)
35
35
36
-
1. Navigate to **App registrations**\>**New registration**.
36
+
1. Navigate to **App registrations** > **New registration**.
37
37
38
38
[](media/new-app-registration.png#lightbox)
39
39
@@ -42,6 +42,7 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
42
42
- ArcGIS Pro
43
43
44
44
1. Set **Multitenant** as the account type.
45
+
45
46
[](media/register-an-app-arcgis-pro.png#lightbox)
46
47
47
48
[](media/new-app-registration-arcgis-pro.png#lightbox)
@@ -75,8 +76,87 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
75
76
1. Go to **API Permissions**.
76
77
77
78
- Add and grant admin consent for:
78
-
- Azure Storage \> user_impersonation.
79
-
- Microsoft Graph \> User.Read (This permission is enabled by default).
79
+
- Azure Storage > user_impersonation.
80
+
- Microsoft Graph > User.Read (This permission is enabled by default).
81
+
82
+
[](media/add-api-permissions.png#lightbox)
83
+
84
+
1.**Grant admin consent** after permissions are added.
85
+
86
+
[](media/grant-admin-consent.png#lightbox)
87
+
88
+
1. Go to **Expose an API**.
89
+
90
+
- Add **App ID URI**.
91
+
92
+
[](media/add-app-id-uri.png#lightbox)
1. In the new **Mobile and desktop applications** panel, select *Add URI* to add a second Redirect URI: https://login.microsoftonline.us/common/oauth2/nativeclient
1. Enable **ID tokens** under **Implicit grant and hybrid flows**.
150
+
151
+
1. Select **Save**.
152
+
153
+
[](media/enable-id-tokens.png#lightbox)
154
+
155
+
1. Go to **API Permissions**.
156
+
157
+
- Add and grant admin consent for:
158
+
- Azure Storage > user_impersonation.
159
+
- Microsoft Graph > User.Read (This permission is enabled by default).
80
160
81
161
[](media/add-api-permissions.png#lightbox)
82
162
@@ -103,7 +183,66 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
103
183
104
184
[](media/add-a-client-app.png#lightbox)
105
185
106
-
## Register desktop client application for ArcGIS Pro
186
+
## Register desktop client application for ArcGIS Pro
187
+
### [Public](#tab/public)
188
+
189
+
Register a second application (with a distinct name) to represent ArcGIS
190
+
Pro Desktop and configure its API permissions --- ensuring it includes
191
+
access to the web API exposed by the first application.
192
+
193
+
1. Create a second app registration for the ArcGIS Pro desktop client.
194
+
195
+
- Suggested name: ArcGISPro-GeoCatalog-DesktopClient or GeoCatalog-ArcGIS.
196
+
197
+
- Set account type: **Single tenant**.
198
+
199
+
[](media/register-second-app-arcgis-pro-desktop-client.png#lightbox)
200
+
201
+
[](media/new-app-registration-geocatalog-arcgis.png#lightbox)
202
+
203
+
1. Configure the Desktop Client App.
204
+
205
+
Complete the following configuration within the new App registration GeoCatalog-ArcGIS.
206
+
207
+
- For **Authentication**, repeat the same steps as in Step 1:
208
+
209
+
- Add platform: **Web**.
210
+
- Set **Redirect URI**: https://localhost.
211
+
- Add platform: **Mobile and desktop applications**
212
+
- Set **Redirect URI**: arcgis-pro://auth.
213
+
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
214
+
- Select **Save**.
215
+
216
+
-**API Permissions**: Adding Access to the Web API App.
217
+
218
+
- In the **API permissions** tab, select **Add a permission**.
219
+
220
+
- Go to the **APIs my organization uses** tab and search for the **Web
221
+
API app** created in Step 1 (for example, ArcGIS Pro).
222
+
223
+
- Select the app name to open the **Request API Permissions** screen.
224
+
225
+
[](media/request-api-permissions.png#lightbox)
226
+
227
+
- Select both user_authentication and user_impersonation; the delegated permissions defined in the first app.
228
+
229
+
- Select **Add permissions**.
230
+
231
+
[](media/add-api-permissions-arcgis-pro.png#lightbox)
232
+
233
+
- Continue to add the following delegated permissions:
234
+
235
+
-**Azure Storage** > user_impersonation.
236
+
-**Azure Orbital Spatio** > user_impersonation.
237
+
-**Microsoft Graph** > User.Read (This permission is enabled by default).
238
+
- Select **Add permissions**.
239
+
- Select **Grant admin consent**.
240
+
241
+
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
242
+
243
+
[](media/grant-admin-consents-4.png#lightbox)
244
+
245
+
### [US Gov](#tab/usgov)
107
246
108
247
Register a second application (with a distinct name) to represent ArcGIS
109
248
Pro Desktop and configure its API permissions --- ensuring it includes
@@ -127,8 +266,9 @@ access to the web API exposed by the first application.
127
266
128
267
- Add platform: **Web**.
129
268
- Set **Redirect URI**: https://localhost.
130
-
- Add platform.
269
+
- Add platform: **Mobile and desktop applications**
131
270
- Set **Redirect URI**: arcgis-pro://auth.
271
+
- Add another **Mobile and desktop applications** Redirect URI: https://login.microsoftonline.us/common/oauth2/nativeclient.
132
272
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
133
273
- Select **Save**.
134
274
@@ -151,9 +291,9 @@ access to the web API exposed by the first application.
151
291
152
292
- Continue to add the following delegated permissions:
153
293
154
-
-**Azure Storage**\> user_impersonation.
155
-
-**Azure Orbital Spatio**\> user_impersonation.
156
-
-**Microsoft Graph**\> User.Read (This permission is enabled by default).
294
+
-**Azure Storage** > user_impersonation.
295
+
-**Azure Orbital Spatio** > user_impersonation.
296
+
-**Microsoft Graph** > User.Read (This permission is enabled by default).
157
297
- Select **Add permissions**.
158
298
- Select **Grant admin consent**.
159
299
@@ -166,6 +306,7 @@ access to the web API exposed by the first application.
166
306
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
167
307
168
308
## Add an authentication connection
309
+
### [Public](#tab/public)
169
310
170
311
1. Open the **ArcGIS Pro settings** page in one of the following ways:
171
312
@@ -186,6 +327,10 @@ This section outlines how to configure authentication and data access in the **A
186
327
187
328
- Enter your **Entra Domain** and **Client ID**.
188
329
330
+
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
331
+
332
+
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
333
+
189
334
- Add the following **scopes**:
190
335
191
336
-`https://storage.azure.com/.default`
@@ -203,6 +348,48 @@ This section outlines how to configure authentication and data access in the **A
203
348
> [!TIP]
204
349
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
205
350
351
+
### [US Gov](#tab/usgov)
352
+
353
+
1. Open the **ArcGIS Pro settings** page in one of the following ways:
354
+
355
+
- From an open project, select the **Project** tab on the ribbon.
356
+
- From the start page, select the **Settings** tab.
357
+
358
+
1. In the side menu, select **Options**.
359
+
360
+
1. In the **Options** dialog box, under **Application**, select **Authentication**.
361
+
362
+
1. Select **Add Connection** to add a new authentication connection.
363
+
364
+
1. In the **Add Connection** dialog box:
365
+
366
+
- Enter a **Connection Name**.
367
+
368
+
- For **Type**, select **Microsoft Entra ID**.
369
+
370
+
- Select **Azure US Government** under **Azure Environment**
371
+
372
+
- Enter your **Entra Domain** and **Client ID**.
373
+
374
+
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
375
+
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
376
+
377
+
- Add the following **scopes**:
378
+
379
+
-`https://storage.usgovcloudapi.net/.default`
380
+
381
+
-`https://geocatalog.spatio.azure.us/.default`
382
+
383
+
[](media/add-authentication-usgov.png#lightbox)
384
+
385
+
- Select **OK**.
386
+
387
+
- Sign in through the Authentication dialog and complete the prompts.
388
+
389
+
[](media/sign-in.png#lightbox)
390
+
391
+
> [!TIP]
392
+
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
206
393
207
394
## Prepare and record GeoCatalog information
208
395
@@ -213,7 +400,7 @@ This section outlines how to configure authentication and data access in the **A
213
400
214
401
1. Select on the GeoCatalog. For example, **arcgisprogeocatalog**.
215
402
216
-
1. Record the **GeoCatalog URI**. For example, **https://arcgisprogeocatalog.\<unique-identity\>.\<cloud-region\>.geocatalog.spatio.azure.com**.
403
+
1. Record the **GeoCatalog URI**. For example, **https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com**.
217
404
218
405
[](media/get-geocatalog-uri.png#lightbox)
219
406
@@ -224,17 +411,9 @@ This section outlines how to configure authentication and data access in the **A
224
411
225
412
1. Record the **Collection Name**. For example, sentinel-2-l2a-tutorial-1000.
226
413
227
-
1. Construct the **Token API Endpoint** using this pattern:
0 commit comments