You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Quickstart: Set up and obtain access tokens for Microsoft Entra ID users
18
18
@@ -23,7 +23,7 @@ This quickstart demonstrates how to use the Communication Services Common SDK al
23
23
## Prerequisites
24
24
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
25
- An active Azure Communication Services resource and endpoint URI. For more information, see [Create an Azure Communication Services resource](../create-communication-resource.md).
26
-
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](../../../entra/fundamentals/whatis).
26
+
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](https://learn.microsoft.com/entra/fundamentals/whatis?source=docs).
27
27
28
28
## Introduction
29
29
@@ -49,7 +49,7 @@ The Administrator role has extended permissions in Microsoft Entra ID. Members o
49
49
To enable the Contoso application to access Azure Communication Services Clients application API permissions, the Contoso Administrator must create a service principal for Azure Communication Services Clients application in the Contoso Microsoft Entra ID tenant.
50
50
The Contoso Administrator can create a service principal in Contoso tenant by one of the following methods:
51
51
52
-
- Use the [Microsoft Graph REST API](../../../graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http#request) to run the following request:
52
+
- Use the [Microsoft Graph REST API](https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http#request) to run the following request:
53
53
54
54
```http
55
55
POST https://graph.microsoft.com/v1.0/servicePrincipals
@@ -60,9 +60,9 @@ Content-Type: application/json
60
60
}
61
61
```
62
62
63
-
This request can also be executed in [Graph Explorer](../../../graph/graph-explorer/graph-explorer-overview). Make sure to include your full tenant domain in the URL `https://developer.microsoft.com/graph/graph-explorer?tenant={tenant domain}`, sign in,and provide consent for `Application.ReadWrite.All` permission.
63
+
This request can also be executed in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer/). Make sure to include your full tenant domain in the URL `https://developer.microsoft.com/graph/graph-explorer?tenant={tenant domain}`, sign in,and provide consent for `Application.ReadWrite.All` permission.
64
64
65
-
- Use the [Azure CLI](../../../cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create) to run the following command:
65
+
- Use the [Azure CLI](https://learn.microsoft.com/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create) to run the following command:
66
66
67
67
```azurecli-interactive
68
68
az ad sp create --id 2a04943b-b6a7-4f65-8786-2bb6131b59f6
@@ -100,7 +100,7 @@ The Azure Communication Services resource is used to authenticate all requests f
100
100
101
101
If you want to create a new Communication Services resource, see [Create and manage Communication Services resources](../create-communication-resource.md).
102
102
103
-
The Contoso administrator can provide Fabrikam Entra ID users with access to the Contoso Azure Communication Services resource through the Azure portal or by using the [Entra ID Assignment REST API](../../../rest/api/communication/identity/entra-id-assignment).
103
+
The Contoso administrator can provide Fabrikam Entra ID users with access to the Contoso Azure Communication Services resource through the Azure portal or by using the [Entra ID Assignment REST API](https://learn.microsoft.com/rest/api/communication/identity/communication-identity/entra-id-assignment).
104
104
105
105
In the Azure portal follow these steps:
106
106
1. Navigate to your Communication Services resource.
@@ -126,7 +126,7 @@ If you want to check roles in Azure portal, see [List Azure role assignments](..
126
126
127
127
To construct an Administrator consent URL, the Fabrikam Microsoft Entra Administrator does the following steps:
128
128
129
-
1. In the URL *https://login.microsoftonline.com/{Tenant_ID}/adminconsent?client_id={Application_ID}*, the Administrator replaces {Tenant_ID} with the Fabrikam [Tenant ID](../concepts/troubleshooting-info.md#get-a-directory-id), and replaces {Application_ID} with the Contoso [Application ID](../../concepts/troubleshooting-info.md#get-an-application-id).
129
+
1. In the URL *https://login.microsoftonline.com/{Tenant_ID}/adminconsent?client_id={Application_ID}*, the Administrator replaces {Tenant_ID} with the Fabrikam [Tenant ID](../../concepts/troubleshooting-info.md#get-a-directory-id), and replaces {Application_ID} with the Contoso [Application ID](../../concepts/troubleshooting-info.md#get-an-application-id).
130
130
1. The Administrator logs in and grants permissions on behalf of the organization.
131
131
132
132
The service principal of the Contoso application in the Fabrikam tenant is created if consent is granted. The Fabrikam Administrator can review the consent in Microsoft Entra ID by doing the following steps:
@@ -203,5 +203,5 @@ In this quickstart, you learned how to:
203
203
204
204
Learn about the following concepts:
205
205
206
-
-[Support Microsoft Entra ID users in Azure Communication Services](../concepts/identity-model.md#microsoft-entra-id-integrating-with-entra-id)
207
-
-[Tenancy in Microsoft Entra ID](/entra/identity-platform/single-and-multi-tenant-apps.md)
206
+
-[Support Microsoft Entra ID users in Azure Communication Services](../../concepts/identity-model.md#microsoft-entra-id-integrating-with-entra-id)
207
+
-[Tenancy in Microsoft Entra ID](https://learn.microsoft.com/entra/identity-platform/single-and-multi-tenant-apps)
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/identity/includes/entra-id/support-entra-id-users-js.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,15 +71,15 @@ From the project directory:
71
71
app.listen(SERVER_PORT, () =>console.log(`Communication access token application started on ${SERVER_PORT}!`))
72
72
```
73
73
74
-
You can importanyimplementationofthe [TokenCredential](/javascript/api/%40azure/core-auth/tokencredential) interfacefrom the [Azure Identity SDK for JavaScript](https://www.npmjs.com/package/@azure/identity) to authenticate with Microsoft Entra ID. In this quickstart, we use the `InteractiveBrowserCredential` class, which is suitable for browser basic authentication scenarios. For a full list of the credentials offered, see [Credential Classes](/javascript/api/overview/azure/identity-readme?view=azure-node-latest#credential-classes).
74
+
You can importanyimplementationofthe [TokenCredential](https://learn.microsoft.com/javascript/api/%40azure/core-auth/tokencredential) interface from the [Azure Identity SDK for JavaScript](https://www.npmjs.com/package/@azure/identity) to authenticate with Microsoft Entra ID. In this quickstart, we use the `InteractiveBrowserCredential` class, which is suitable for browser basic authentication scenarios. For a full list of the credentials offered, see [Credential Classes](https://learn.microsoft.com/javascript/api/overview/azure/identity-readme#credential-classes).
75
75
76
76
1. Save the newfile as `obtain-access-token-for-entra-id-user.js`in the `entra-id-users-support-quickstart` directory.
### Step 1: Initialize implementation of TokenCredential from Azure Identity SDK
81
81
82
-
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure Identity](/javascript/api/overview/azure/identity-readme) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential`classwith the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](/entra/identity-platform/msal-client-application-configuration#authority).
82
+
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure Identity](https://learn.microsoft.com/javascript/api/overview/azure/identity-readme) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](https://learn.microsoft.com//entra/identity-platform/msal-client-application-configuration#authority).
83
83
84
84
```javascript
85
85
// This code demonstrates how to fetch your Microsoft Entra client ID and tenant ID from environment variables.
### Step 1: Initialize implementation of TokenCredential from Azure Identity SDK
79
79
80
-
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure.Identity](/dotnet/api/overview/azure/identity-readme?view=azure-dotnet) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](/entra/identity-platform/msal-client-application-configuration#authority).
80
+
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure.Identity](https://learn.microsoft.com/dotnet/api/overview/azure/identity-readme?view=azure-dotnet) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](https://learn.microsoft.com/entra/identity-platform/msal-client-application-configuration#authority).
81
81
82
82
```csharp
83
83
// This code demonstrates how to fetch your Microsoft Entra client ID and tenant ID from environment variables.
Copy file name to clipboardExpand all lines: articles/communication-services/tutorials/events-playbook.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ Attendee experience can be directly embedded into an application or platform usi
108
108
109
109
2. Before developers dive into using [Azure Communication Services](../overview.md), they must [create a resource](../quickstarts/create-communication-resource.md?pivots=platform-azp&tabs=windows&preserve-view=true).
110
110
111
-
3. Once a resource is created, developers must [generate access tokens](../quickstarts/identity/access-tokens.md?pivots=programming-language-javascript&preserve-view=true) for attendees to access Azure Communication Services. We recommend using a [trusted service architecture](../concepts/identity-model.md#client-server-architecture).
111
+
3. Once a resource is created, developers must [generate access tokens](../quickstarts/identity/access-tokens.md?pivots=programming-language-javascript&preserve-view=true) for attendees to access Azure Communication Services. We recommend using a [trusted service architecture](../concepts/identity-model.md#client-server-architecture-for-the-bring-your-own-identity-byoi-model).
112
112
113
113
4. Developers can leverage [headless SDKs](../concepts/teams-interop.md) or [UI Library](../concepts/ui-library/ui-library-overview.md) using the join link URL to join the Teams meeting through [Teams Interoperability](../concepts/teams-interop.md). Details below:
Copy file name to clipboardExpand all lines: articles/communication-services/tutorials/includes/trusted-service-js.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ For this tutorial, you create a function app that serves as a trusted token prov
30
30
31
31
This service is responsible for authenticating users to Communication Services. Users of your Communication Services applications require an access token to participate in chat threads and VoIP calls. The function works as a trusted middleman between the user and Communication Services. You can provision access tokens without exposing your resource connection string to your users.
32
32
33
-
For more information, see the [client-server architecture](../../concepts/identity-model.md#client-server-architecture) and [authentication and authorization](../../concepts/authentication.md) conceptual documentation.
33
+
For more information, see the [client-server architecture](../../concepts/identity-model.md#client-server-architecture-for-the-bring-your-own-identity-byoi-model) and [authentication and authorization](../../concepts/authentication.md) conceptual documentation.
0 commit comments