You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-secure-device-code.md
+27-24Lines changed: 27 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: How to secure input constrained device with Azure AD and Azure Maps REST APIs
2
+
title: How to secure an input constrained device using Azure AD and Azure Maps REST API
3
3
titleSuffix: Azure Maps
4
-
description: How to configure a browser-less application which supports sign-in to Azure AD and calls Azure Maps REST APIs.
4
+
description: How to configure a browser-less application that supports sign-in to Azure AD and calls Azure Maps REST API.
5
5
author: eriklindeman
6
6
ms.author: eriklind
7
7
ms.date: 06/12/2020
@@ -10,52 +10,48 @@ ms.service: azure-maps
10
10
services: azure-maps
11
11
---
12
12
13
-
# Secure an input constrained device with Azure AD and Azure Maps REST APIs
13
+
# Secure an input constrained device by using Azure Active Directory (Azure AD) and Azure Maps REST APIs
14
14
15
-
This guide discusses how to secure public applications or devices that cannot securely store secrets or accept browser input. These types of applications fall under the category of IoT or internet of things. Some examples of these applications may include: Smart TV devices or sensor data emitting applications.
15
+
This guide discusses how to secure public applications or devices that can't securely store secrets or accept browser input. These types of applications fall under the internet of things (IoT) category. Examples include Smart TVs and sensor data emitting applications.
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more details please see Azure AD [Desktop app that calls web APIs: App registration](../active-directory/develop/scenario-desktop-app-registration.md). Then **Register** the application.
32
+
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more information, see Azure AD [Desktop app that calls web APIs: App registration]. Then **Register** the application.
33
33
34
-
> [!div class="mx-imgBorder"]
35
-
> 
34
+
:::image type="content" source="./media/azure-maps-authentication/devicecode-app-registration.png" alt-text="A screenshot showing the settings used to register an application.":::
36
35
37
-
3. Navigate to **Authentication** and enable **Treat application as a public client**. This will enable device code authentication with Azure AD.
36
+
3. Navigate to **Authentication** and enable **Treat application as a public client** to enable device code authentication with Azure AD.
38
37
39
-
> [!div class="mx-imgBorder"]
40
-
> 
38
+
:::image type="content" source="./media/azure-maps-authentication/devicecode-public-client.png" alt-text="A screenshot showing the advanced settings used to specify treating the application as a public client.":::
41
39
42
40
4. To assign delegated API permissions to Azure Maps, go to the application. Then select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
43
41
44
-
> [!div class="mx-imgBorder"]
45
-
> 
42
+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="A screenshot showing where you request API permissions.":::
46
43
47
44
5. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
48
45
49
-
> [!div class="mx-imgBorder"]
50
-
> 
46
+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="A screenshot showing where you specify the app permissions you require.":::
51
47
52
-
6. Configure Azure role-based access control (Azure RBAC) for users or groups. See [Grant role-based access for users to Azure Maps](#grant-role-based-access-for-users-to-azure-maps).
48
+
6. Configure Azure role-based access control (Azure RBAC) for users or groups. For more information, see [Grant role-based access for users to Azure Maps].
53
49
54
-
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow](../active-directory/develop/scenario-desktop-acquire-token-device-code-flow.md). When acquiring tokens, reference the scope: `user_impersonation`which was selected on earlier steps.
50
+
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow]. When acquiring tokens, reference the scope: `user_impersonation`that was selected on earlier steps.
55
51
56
52
> [!Tip]
57
53
> Use Microsoft Authentication Library (MSAL) to acquire access tokens.
58
-
> See recommendations on [Desktop app that calls web APIs: Code configuration](../active-directory/develop/scenario-desktop-app-configuration.md)
54
+
> For more information, see [Desktop app that calls web APIs: Code configuration] in the activedirectory documentation.
59
55
60
56
8. Compose the HTTP request with the acquired token from Azure AD, and sent request with a valid HTTP client.
# How to secure a single-page web application with non-interactive sign-in
15
15
16
-
This article describes how to secure a single-page web application with Azure Active Directory (Azure AD), when the user isn't able to sign in to Azure AD.
16
+
Secure a single-page web application with Azure Active Directory (Azure AD), even when the user isn't able to sign in to Azure AD.
17
17
18
-
To create this non-interactive authentication flow, we'll create an Azure Function secure web service that's responsible for acquiring access tokens from Azure AD. This web service will be exclusively available only to your single-page web application.
18
+
To create this non-interactive authentication flow, first create an Azure Function secure web service that's responsible for acquiring access tokens from Azure AD. This web service is exclusively available only to your single-page web application.
> Azure Maps can support access tokens from user sign-on or interactive flows. You can use interactive flows for a more restricted scope of access revocation and secret management.
24
24
25
25
## Create an Azure function
26
26
27
27
To create a secured web service application that's responsible for authentication to Azure AD:
28
28
29
-
1. Create a function in the Azure portal. For more information, see [Getting started with Azure Functions](../azure-functions/functions-get-started.md).
29
+
1. Create a function in the Azure portal. For more information, see [Getting started with Azure Functions].
30
30
31
-
2. Configure CORS policy on the Azure function to be accessible by the single-page web application. The CORS policy secures browser clients to the allowed origins of your web application. For more information, see [Add CORS functionality](../app-service/app-service-web-tutorial-rest-api.md#add-cors-functionality).
31
+
2. Configure CORS policy on the Azure function to be accessible by the single-page web application. The CORS policy secures browser clients to the allowed origins of your web application. For more information, see [Add CORS functionality].
32
32
33
-
3.[Add a system-assigned identity](../app-service/overview-managed-identity.md?tabs=dotnet#add-a-system-assigned-identity) on the Azure function to enable creation of a service principal to authenticate to Azure AD.
33
+
3.[Add a system-assigned identity] on the Azure function to enable creation of a service principal to authenticate to Azure AD.
34
34
35
-
4. Grant role-based access for the system-assigned identity to the Azure Maps account. For details, see [Grant role-based access](#grant-role-based-access-for-users-to-azure-maps).
35
+
4. Grant role-based access for the system-assigned identity to the Azure Maps account. For more information, see [Grant role-based access].
36
36
37
-
5. Write code for the Azure function to obtain Azure Maps access tokens using system-assigned identity with one of the supported mechanisms or the REST protocol. For more information, see [Obtain tokens for Azure resources](../app-service/overview-managed-identity.md?tabs=dotnet#add-a-system-assigned-identity)
37
+
5. Write code for the Azure function to obtain Azure Maps access tokens using system-assigned identity with one of the supported mechanisms or the REST protocol. For more information, see [Obtain tokens for Azure resources].
38
38
39
39
Here's an example REST protocol:
40
40
@@ -60,7 +60,7 @@ To create a secured web service application that's responsible for authenticatio
60
60
61
61
6. Configure security for the Azure function HttpTrigger:
62
62
63
-
1. [Create a function access key](../azure-functions/functions-bindings-http-webhook-trigger.md?tabs=csharp#authorization-keys)
63
+
1. [Create a function access key]
64
64
1. [Secure HTTP endpoint](../azure-functions/functions-bindings-http-webhook-trigger.md?tabs=csharp#secure-an-http-endpoint-in-production) for the Azure function in production.
65
65
66
66
7. Configure a web application Azure Maps Web SDK.
@@ -111,3 +111,10 @@ Find the API usage metrics for your Azure Maps account:
111
111
Explore other samples that show how to integrate Azure AD with Azure Maps:
Copy file name to clipboardExpand all lines: articles/virtual-machines/managed-disks-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ This disk has a maximum capacity of 4,095 GiB, however, many operating systems a
96
96
97
97
### Temporary disk
98
98
99
-
Most VMs contain a temporary disk, which is not a managed disk. The temporary disk provides short-term storage for applications and processes, and is intended to only store data such as page or swap files. Data on the temporary disk may be lost during a [maintenance event](./understand-vm-reboots.md) or when you [redeploy a VM](/troubleshoot/azure/virtual-machines/redeploy-to-new-node-windows?toc=%2fazure%2fvirtual-machines%2fwindows%2ftoc.json). During a successful standard reboot of the VM, data on the temporary disk will persist. For more information about VMs without temporary disks, see [Azure VM sizes with no local temporary disk](azure-vms-no-temp-disk.yml).
99
+
Most VMs contain a temporary disk, which is not a managed disk. The temporary disk provides short-term storage for applications and processes, and is intended to only store data such as page files, swap files, or SQL Server tempdb. Data on the temporary disk may be lost during a [maintenance event](./understand-vm-reboots.md) or when you [redeploy a VM](/troubleshoot/azure/virtual-machines/redeploy-to-new-node-windows?toc=%2fazure%2fvirtual-machines%2fwindows%2ftoc.json). During a successful standard reboot of the VM, data on the temporary disk will persist. For more information about VMs without temporary disks, see [Azure VM sizes with no local temporary disk](azure-vms-no-temp-disk.yml).
100
100
101
101
On Azure Linux VMs, the temporary disk is typically /dev/sdb and on Windows VMs the temporary disk is D: by default. The temporary disk is not encrypted unless (for server side encryption) you enable encryption at host or (for Azure Disk Encryption) with the [VolumeType parameter set to All on Windows](./windows/disk-encryption-windows.md#enable-encryption-on-a-newly-added-data-disk) or [EncryptFormatAll on Linux](./linux/disk-encryption-linux.md#use-encryptformatall-feature-for-data-disks-on-linux-vms).
0 commit comments