You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communication-services/concepts/authentication.md
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,10 @@
1
1
---
2
2
title: Authenticate to Azure Communication Services
3
3
titleSuffix: An Azure Communication Services article
4
-
description: This article describes how you can use an app or service to authenticate to Communication Services.
4
+
description: This article describes how you can use an app or service to authenticate to Azure Communication Services.
5
5
author: tophpalmer
6
-
7
6
manager: chpalm
8
7
services: azure-communication-services
9
-
10
8
ms.author: chpalm
11
9
ms.date: 09/05/2024
12
10
ms.topic: conceptual
@@ -16,9 +14,9 @@ ms.subservice: identity
16
14
17
15
# Authenticate to Azure Communication Services
18
16
19
-
Every client interaction with Azure Communication Services needs to be authenticated. In a typical architecture, see [client and server architecture](./client-and-server-architecture.md), *access keys* or *Microsoft Entra authentication* are used for server-side authentication.
17
+
Every client interaction with Azure Communication Services needs to be authenticated. In a typical architecture, see [client and server architecture](./client-and-server-architecture.md), *access keys* or *Microsoft Entra ID authentication* are used for server-side authentication.
20
18
21
-
Another type of authentication uses *user access tokens* to authenticate against services that require user participation. For example, the chat or calling service utilizes *user access tokens* to allow users to be added in a thread and have conversations with each other.
19
+
Another type of authentication uses *user access tokens* to authenticate against services that require user participation. For example, the chat or calling service utilizes *user access tokens* to enable users to be added in a thread and have conversations with each other.
22
20
23
21
## Authentication Options
24
22
@@ -29,6 +27,7 @@ The following table shows the Azure Communication Services SDKs and their authen
29
27
| Identity | Access Key or Microsoft Entra authentication |
30
28
| SMS | Access Key or Microsoft Entra authentication |
31
29
| Phone Numbers | Access Key or Microsoft Entra authentication |
30
+
| Call Automation | Access Key or Microsoft Entra authentication |
32
31
| Email | Access Key or Microsoft Entra authentication |
33
32
| Advanced Messaging | Access Key or Microsoft Entra authentication |
34
33
| Calling | User Access Token |
@@ -46,28 +45,25 @@ If you wish to call Azure Communication Services' APIs manually using an access
46
45
47
46
<aname='azure-ad-authentication'></a>
48
47
49
-
50
-
51
48
To set up a service principal, [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, the endpoint and credentials can be used to authenticate the SDKs. See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
52
49
53
-
Communication services supports Microsoft Entra ID authentication for Communication services resources. You can find more details, about the managed identity support in the[How to use Managed Identity with Azure Communication Services](/azure/communication-services/how-tos/managed-identity).
50
+
Azure Communication services supports Microsoft Entra ID authentication for Communication Services resources. For more information about managed identity support, see[How to use Managed Identity with Azure Communication Services](/azure/communication-services/how-tos/managed-identity).
54
51
55
52
### Microsoft Entra ID Authentication
56
53
57
54
The Azure platform provides role-based access (Azure RBAC) to control access to resources. Azure RBAC security principal represents a user, group, service principal, or managed identity that is requesting access to Azure resources. Microsoft Entra ID authentication provides superior security and ease of use over other authorization options.
58
55
59
56
-**Managed Identity:**
60
-
- By using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. Managed identity credentials are fully managed, rotated, and protected by the platform, reducing the risk of credential exposure.
57
+
- By using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. The platform fully manages, rotates, and protects identity credentials, reducing the risk of credential exposure.
61
58
- Managed identities can authenticate to Azure services and resources that support Microsoft Entra ID authentication. This method provides a seamless and secure way to manage credentials.
62
59
- For more information about using Managed Identity with Azure Communication Services, see [Managed Identity](../how-tos/managed-identity.md).
63
60
64
61
-**Service Principal:**
65
-
- To set up a service principal [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, you can use the endpoint and credentials to authenticate the SDKs.
66
-
-See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
62
+
- To set up a service principal,[create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then use the endpoint and credentials to authenticate the SDKs.
63
+
-For examples, see [service principal](../quickstarts/identity/service-principal.md).
67
64
68
65
Communication Services supports Microsoft Entra ID authentication for Communication Services resources, While you can continue to use Access Key authorization with communication services applications, Microsoft recommends moving to Microsoft Entra ID where possible.
69
66
70
-
71
67
Use our [Trusted authentication service hero sample](../samples/trusted-auth-sample.md) to map Azure Communication Services access tokens with your Microsoft Entra ID.
0 commit comments