Skip to content

Commit 86cc490

Browse files
Merge pull request #298880 from vac0224/vc-call-automation-2025-04-28
Add Call Automation line 30
2 parents 387238c + bbd457f commit 86cc490

File tree

1 file changed

+8
-12
lines changed

1 file changed

+8
-12
lines changed

articles/communication-services/concepts/authentication.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,10 @@
11
---
22
title: Authenticate to Azure Communication Services
33
titleSuffix: An Azure Communication Services article
4-
description: This article describes how you can use an app or service to authenticate to Communication Services.
4+
description: This article describes how you can use an app or service to authenticate to Azure Communication Services.
55
author: tophpalmer
6-
76
manager: chpalm
87
services: azure-communication-services
9-
108
ms.author: chpalm
119
ms.date: 09/05/2024
1210
ms.topic: conceptual
@@ -16,9 +14,9 @@ ms.subservice: identity
1614

1715
# Authenticate to Azure Communication Services
1816

19-
Every client interaction with Azure Communication Services needs to be authenticated. In a typical architecture, see [client and server architecture](./client-and-server-architecture.md), *access keys* or *Microsoft Entra authentication* are used for server-side authentication.
17+
Every client interaction with Azure Communication Services needs to be authenticated. In a typical architecture, see [client and server architecture](./client-and-server-architecture.md), *access keys* or *Microsoft Entra ID authentication* are used for server-side authentication.
2018

21-
Another type of authentication uses *user access tokens* to authenticate against services that require user participation. For example, the chat or calling service utilizes *user access tokens* to allow users to be added in a thread and have conversations with each other.
19+
Another type of authentication uses *user access tokens* to authenticate against services that require user participation. For example, the chat or calling service utilizes *user access tokens* to enable users to be added in a thread and have conversations with each other.
2220

2321
## Authentication Options
2422

@@ -29,6 +27,7 @@ The following table shows the Azure Communication Services SDKs and their authen
2927
| Identity | Access Key or Microsoft Entra authentication |
3028
| SMS | Access Key or Microsoft Entra authentication |
3129
| Phone Numbers | Access Key or Microsoft Entra authentication |
30+
| Call Automation | Access Key or Microsoft Entra authentication |
3231
| Email | Access Key or Microsoft Entra authentication |
3332
| Advanced Messaging | Access Key or Microsoft Entra authentication |
3433
| Calling | User Access Token |
@@ -46,28 +45,25 @@ If you wish to call Azure Communication Services' APIs manually using an access
4645

4746
<a name='azure-ad-authentication'></a>
4847

49-
50-
5148
To set up a service principal, [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, the endpoint and credentials can be used to authenticate the SDKs. See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
5249

53-
Communication services supports Microsoft Entra ID authentication for Communication services resources. You can find more details, about the managed identity support in the [How to use Managed Identity with Azure Communication Services](/azure/communication-services/how-tos/managed-identity).
50+
Azure Communication services supports Microsoft Entra ID authentication for Communication Services resources. For more information about managed identity support, see [How to use Managed Identity with Azure Communication Services](/azure/communication-services/how-tos/managed-identity).
5451

5552
### Microsoft Entra ID Authentication
5653

5754
The Azure platform provides role-based access (Azure RBAC) to control access to resources. Azure RBAC security principal represents a user, group, service principal, or managed identity that is requesting access to Azure resources. Microsoft Entra ID authentication provides superior security and ease of use over other authorization options.
5855

5956
- **Managed Identity:**
60-
- By using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. Managed identity credentials are fully managed, rotated, and protected by the platform, reducing the risk of credential exposure.
57+
- By using managed identity, you avoid having to store your account access key within your code, as you do with Access Key authorization. The platform fully manages, rotates, and protects identity credentials, reducing the risk of credential exposure.
6158
- Managed identities can authenticate to Azure services and resources that support Microsoft Entra ID authentication. This method provides a seamless and secure way to manage credentials.
6259
- For more information about using Managed Identity with Azure Communication Services, see [Managed Identity](../how-tos/managed-identity.md).
6360

6461
- **Service Principal:**
65-
- To set up a service principal [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then, you can use the endpoint and credentials to authenticate the SDKs.
66-
- See examples of how [service principal](../quickstarts/identity/service-principal.md) is used.
62+
- To set up a service principal, [create a registered application from the Azure CLI](../quickstarts/identity/service-principal.md?pivots=platform-azcli). Then use the endpoint and credentials to authenticate the SDKs.
63+
- For examples, see [service principal](../quickstarts/identity/service-principal.md).
6764

6865
Communication Services supports Microsoft Entra ID authentication for Communication Services resources, While you can continue to use Access Key authorization with communication services applications, Microsoft recommends moving to Microsoft Entra ID where possible.
6966

70-
7167
Use our [Trusted authentication service hero sample](../samples/trusted-auth-sample.md) to map Azure Communication Services access tokens with your Microsoft Entra ID.
7268

7369
### User Access Tokens

0 commit comments

Comments
 (0)