You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-secure-device-code.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: How to secure an input constrained device using Azure AD and Azure Maps REST API
3
3
titleSuffix: Azure Maps
4
-
description: How to configure a browser-less application which supports sign-in to Azure AD and calls Azure Maps REST API.
4
+
description: How to configure a browser-less application that supports sign-in to Azure AD and calls Azure Maps REST API.
5
5
author: eriklindeman
6
6
ms.author: eriklind
7
7
ms.date: 06/12/2020
@@ -12,7 +12,7 @@ services: azure-maps
12
12
13
13
# Secure an input constrained device using Azure active directory (Azure AD) and Azure Maps REST APIs
14
14
15
-
This guide discusses how to secure public applications or devices that cannot securely store secrets or accept browser input. These types of applications fall under the internet of things (IoT) category. Examples include Smart TVs and sensor data emitting applications.
15
+
This guide discusses how to secure public applications or devices that can't securely store secrets or accept browser input. These types of applications fall under the internet of things (IoT) category. Examples include Smart TVs and sensor data emitting applications.
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more details please see Azure AD [Desktop app that calls web APIs: App registration]. Then **Register** the application.
32
+
2. Enter a **Name**, choose **Accounts in this organizational directory only** as the **Supported account type**. In **Redirect URIs**, specify **Public client / native (mobile & desktop)** then add `https://login.microsoftonline.com/common/oauth2/nativeclient` to the value. For more information, see Azure AD [Desktop app that calls web APIs: App registration]. Then **Register** the application.
33
33
34
-
:::image type="content" source="./media/how-to-manage-authentication/devicecode-app-registration.png" alt-text="A screenshot showing the register an application settings.":::
34
+
:::image type="content" source="./media/how-to-manage-authentication/devicecode-app-registration.png" alt-text="A screenshot showing the settings used to register an application.":::
35
35
36
-
3. Navigate to **Authentication** and enable **Treat application as a public client**. This will enable device code authentication with Azure AD.
36
+
3. Navigate to **Authentication** and enable **Treat application as a public client** to enable device code authentication with Azure AD.
37
37
38
-
:::image type="content" source="./media/azure-maps-authentication/devicecode-public-client.png" alt-text="A screen shot showing the advanced settings used to specify treating the application as a public client.":::
38
+
:::image type="content" source="./media/azure-maps-authentication/devicecode-public-client.png" alt-text="A screenshot showing the advanced settings used to specify treating the application as a public client.":::
39
39
40
40
4. To assign delegated API permissions to Azure Maps, go to the application. Then select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
41
41
42
-
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="A screen shot showing where you request API permissions.":::
42
+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="A screenshot showing where you request API permissions.":::
43
43
44
44
5. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
45
45
46
-
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="A screen shot showing where you specify the app permissions you require.":::
46
+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="A screenshot showing where you specify the app permissions you require.":::
47
47
48
-
6. Configure Azure role-based access control (Azure RBAC) for users or groups. See[Grant role-based access for users to Azure Maps].
48
+
6. Configure Azure role-based access control (Azure RBAC) for users or groups. For more information, see[Grant role-based access for users to Azure Maps].
49
49
50
-
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow]. When acquiring tokens, reference the scope: `user_impersonation`which was selected on earlier steps.
50
+
7. Add code for acquiring token flow in the application, for implementation details see [Device code flow]. When acquiring tokens, reference the scope: `user_impersonation`that was selected on earlier steps.
51
51
52
52
> [!Tip]
53
53
> Use Microsoft Authentication Library (MSAL) to acquire access tokens.
@@ -101,9 +101,9 @@ Find the API usage metrics for your Azure Maps account:
101
101
> [!div class="nextstepaction"]
102
102
> [View usage metrics]
103
103
104
-
[Scenario: Desktop app that calls web APIs]: ../active-directory/develop/scenario-desktop-overview.md
105
104
[Desktop app that calls web APIs: App registration]: ../active-directory/develop/scenario-desktop-app-registration.md
106
-
[Grant role-based access for users to Azure Maps]: #grant-role-based-access-for-users-to-azure-maps
0 commit comments