Skip to content

Commit 817939b

Browse files
committed
Grammar updates (increased Acrolinx score from 78 to 100).
1 parent d7b5bae commit 817939b

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/azure-maps/how-to-secure-device-code.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to secure an input constrained device using Azure AD and Azure Maps REST API
33
titleSuffix: Azure Maps
4-
description: How to configure a browser-less application which supports sign-in to Azure AD and calls Azure Maps REST API.
4+
description: How to configure a browser-less application that supports sign-in to Azure AD and calls Azure Maps REST API.
55
author: eriklindeman
66
ms.author: eriklind
77
ms.date: 06/12/2020
@@ -12,7 +12,7 @@ services: azure-maps
1212

1313
# Secure an input constrained device using Azure active directory (Azure AD) and Azure Maps REST APIs
1414

15-
This guide discusses how to secure public applications or devices that cannot securely store secrets or accept browser input. These types of applications fall under the internet of things (IoT) category. Examples include Smart TVs and sensor data emitting applications.
15+
This guide discusses how to secure public applications or devices that can't securely store secrets or accept browser input. These types of applications fall under the internet of things (IoT) category. Examples include Smart TVs and sensor data emitting applications.
1616

1717
[!INCLUDE [authentication details](./includes/view-authentication-details.md)]
1818

@@ -23,31 +23,31 @@ This guide discusses how to secure public applications or devices that cannot se
2323
> * **Prerequisite Reading:** [Scenario: Desktop app that calls web APIs]
2424
> * The following scenario uses the device code flow, which does not involve a web browser to acquire a token.
2525
26-
Create the device based application in Azure AD to enable Azure AD sign in. This application will be granted access to Azure Maps REST APIs.
26+
Create the device based application in Azure AD to enable Azure AD sign in, which is granted access to Azure Maps REST APIs.
2727

2828
1. In the Azure portal, in the list of Azure services, select **Azure Active Directory** > **App registrations** > **New registration**.
2929

3030
:::image type="content" source="./media/how-to-manage-authentication/app-registration.png" alt-text="A screenshot showing application registration in Azure AD":::
3131

32-
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more details please see Azure AD [Desktop app that calls web APIs: App registration]. Then **Register** the application.
32+
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more information, see Azure AD [Desktop app that calls web APIs: App registration]. Then **Register** the application.
3333

34-
:::image type="content" source="./media/how-to-manage-authentication/devicecode-app-registration.png" alt-text="A screenshot showing the register an application settings.":::
34+
:::image type="content" source="./media/how-to-manage-authentication/devicecode-app-registration.png" alt-text="A screenshot showing the settings used to register an application.":::
3535

36-
3. Navigate to **Authentication** and enable **Treat application as a public client**. This will enable device code authentication with Azure AD.
36+
3. Navigate to **Authentication** and enable **Treat application as a public client** to enable device code authentication with Azure AD.
3737

38-
:::image type="content" source="./media/azure-maps-authentication/devicecode-public-client.png" alt-text="A screen shot showing the advanced settings used to specify treating the application as a public client.":::
38+
:::image type="content" source="./media/azure-maps-authentication/devicecode-public-client.png" alt-text="A screenshot showing the advanced settings used to specify treating the application as a public client.":::
3939

4040
4. To assign delegated API permissions to Azure Maps, go to the application. Then select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
4141

42-
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="A screen shot showing where you request API permissions.":::
42+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="A screenshot showing where you request API permissions.":::
4343

4444
5. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
4545

46-
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="A screen shot showing where you specify the app permissions you require.":::
46+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="A screenshot showing where you specify the app permissions you require.":::
4747

48-
6. Configure Azure role-based access control (Azure RBAC) for users or groups. See [Grant role-based access for users to Azure Maps].
48+
6. Configure Azure role-based access control (Azure RBAC) for users or groups. For more information, see [Grant role-based access for users to Azure Maps].
4949

50-
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow]. When acquiring tokens, reference the scope: `user_impersonation` which was selected on earlier steps.
50+
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow]. When acquiring tokens, reference the scope: `user_impersonation` that was selected on earlier steps.
5151

5252
> [!Tip]
5353
> Use Microsoft Authentication Library (MSAL) to acquire access tokens.
@@ -101,9 +101,9 @@ Find the API usage metrics for your Azure Maps account:
101101
> [!div class="nextstepaction"]
102102
> [View usage metrics]
103103
104-
[Scenario: Desktop app that calls web APIs]: ../active-directory/develop/scenario-desktop-overview.md
105104
[Desktop app that calls web APIs: App registration]: ../active-directory/develop/scenario-desktop-app-registration.md
106-
[Grant role-based access for users to Azure Maps]: #grant-role-based-access-for-users-to-azure-maps
107-
[Device code flow]: ../active-directory/develop/scenario-desktop-acquire-token-device-code-flow.md
108105
[Desktop app that calls web APIs: Code configuration]: ../active-directory/develop/scenario-desktop-app-configuration.md
106+
[Device code flow]: ../active-directory/develop/scenario-desktop-acquire-token-device-code-flow.md
107+
[Grant role-based access for users to Azure Maps]: #grant-role-based-access-for-users-to-azure-maps
108+
[Scenario: Desktop app that calls web APIs]: ../active-directory/develop/scenario-desktop-overview.md
109109
[View usage metrics]: how-to-view-api-usage.md

0 commit comments

Comments
 (0)