Skip to content

Commit 7a86888

Browse files
authored
update
1 parent 9fbbe7f commit 7a86888

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/azure-signalr/signalr-howto-authorize-cross-tenant.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Cross tenant authorization with Microsoft Entra
3-
description: This article provides information about building multitenant applications and configure authorization in SignalR.
3+
description: This article provides information about building multitenant applications and configures authorization in SignalR.
44
author: terencefan
55
ms.author: tefa
66
ms.date: 03/12/2023
@@ -12,11 +12,11 @@ ms.custom: subject-rbac-steps
1212

1313
# Cross tenant authorization with Microsoft Entra
1414

15-
For security reasons, your server may host in a independent tenant from your Azure SignalR resource.
15+
For security reasons, your server may host in an independent tenant from your Azure SignalR resource.
1616

17-
Since managed identity can not be used across tenants, you'll need to register an application in `tenantA` and then provision it as an enterprise application in `tenantB`.
17+
Since managed identity can't be used across tenants, you need to register an application in `tenantA` and then provision it as an enterprise application in `tenantB`.
1818

19-
This doc will help you create an application in `tenantA` and use it to connect to a SignalR resource in `tenantB`.
19+
This doc help you create an application in `tenantA` and use it to connect to a SignalR resource in `tenantB`.
2020

2121
## Register a multitenant application in tenant A
2222

@@ -28,32 +28,32 @@ The first step is to create a multitenant application.
2828
2929
[Quickstart: Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app)
3030

31-
There will be 4 account types:
31+
There are four account types:
3232

3333
1. Accounts in this organizational directory
3434
2. Accounts in any organizational directory
3535
3. Accounts in any organizational directory and personal Microsoft accounts
3636
4. Personal Microsoft accounts
3737

38-
Be sure to select either 2 or 3 when creating the application.
38+
Be sure to select either type 2 or type 3 when creating the application.
3939

4040
![Screenshot of overview information for a registered application.](./media/signalr-howto-authorize-application/application-overview.png)
4141

4242
Note down the **Application (client) ID** and **Directory (tenant) ID**, they can be useful in the following steps.
4343

4444
## Provision the application in tenant B
4545

46-
The role cannot be assigned to the application registered in other tenants. We have to provision it as an external enterprise application in the tenant B.
46+
The role can't be assigned to the application registered in other tenants. We have to provision it as an external enterprise application in the tenant B.
4747

4848
Click to learn [differences between App registration and Enterprise applications](/answers/questions/270680/app-registration-vs-enterprise-applications).
4949

50-
For short, the enterprise application is a service principal, while the app registration is not. The enterprise application will inherit certain properties from the application object, such as **Application (client) ID**.
50+
For short, the enterprise application is a service principal, while the app registration isn't. The enterprise application inherits certain properties from the application object, such as **Application (client) ID**.
5151

52-
A default service principal will be created in the tenant where the app is registered. For other tenants, you'll need to provision the app to get an enterprice application service principal, see:
52+
A default service principal is created in the tenant where the app is registered. For other tenants, you need to provision the app to get an enterprise application service principal, see:
5353

5454
[Create an enterprise application from a multitenant application in Microsoft Entra ID](/entra/identity/enterprise-apps/create-service-principal-cross-tenant)
5555

56-
Enterprise applications in different tenant will have different **Directory (tenant) ID**, but share the same **Application (client) ID**.
56+
Enterprise applications in different tenant have different **Directory (tenant) ID**, but share the same **Application (client) ID**.
5757

5858
## Assign roles to the enterprise application
5959

@@ -77,7 +77,7 @@ We strongly recommend you to use the first 2 ways to make cross tenant requests.
7777
- `clientId` in both tenants are equal.
7878
- `clientSecret` and `clientCert` should be configured in **Tenant A**, see [Add credentials](/entra/identity-platform/quickstart-register-app?tabs=certificate%2Cexpose-a-web-api#add-credentials)
7979

80-
If you are not sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant)
80+
If you aren't sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant)
8181

8282
```csharp
8383
services.AddSignalR().AddAzureSignalR(option =>
@@ -95,7 +95,7 @@ services.AddSignalR().AddAzureSignalR(option =>
9595

9696
### Use Federated identity
9797

98-
However, for security reasons, certificates and client secrets might be disabled in your subscription. In this case, you'll need to either use an external identity providor or try the preview support for managed identity.
98+
However, for security reasons, certificates and client secrets might be disabled in your subscription. In this case, you need to either use an external identity provider or try the preview support for managed identity.
9999

100100
- [Configure an app to trust an external identity provider](/entra/workload-id/workload-identity-federation-create-trust)
101101
- [Configure an application to trust a managed identity (preview)](/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity)
@@ -127,7 +127,7 @@ services.AddSignalR().AddAzureSignalR(option =>
127127
});
128128
```
129129

130-
When using enternal identity providers, the code should look like this:
130+
When using external identity providers, the code should look like this:
131131

132132
```csharp
133133
services.AddSignalR().AddAzureSignalR(option =>
@@ -167,15 +167,15 @@ Your goal is to get a token with following claims. Use [jwt.io](https://jwt.io/)
167167
168168
- **oid**
169169

170-
This should be equal to your enterprise application object ID.
170+
The value should be equal to your enterprise application object ID.
171171

172-
If you don't know where to get it, see [How Retrieve Enterprise Object Id](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ)
172+
If you don't know where to get it, see [How Retrieve Enterprise Object ID](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ)
173173

174174
- **tid**
175175

176-
This should be equal to the Directory ID of your tenant B.
176+
The value should be equal to the Directory ID of your tenant B.
177177

178-
If you are not sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant)
178+
If you aren't sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant)
179179

180180
- **audience**
181181

0 commit comments

Comments
 (0)