You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -27,9 +27,9 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
27
27
> [!TIP]
28
28
> Before you begin, review [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app) for background information on app registration.
29
29
30
-
# [Public](#tab/public)
31
-
## Register web API application for ArcGIS Pro
32
30
31
+
## Register web API application for ArcGIS Pro
32
+
### [Public](#tab/public)
33
33
1. Open the Azure Portal and go to **Microsoft Entra ID**.
34
34
35
35
[](media/microsoft-entra-id.png#lightbox)
@@ -104,227 +104,8 @@ By the end of this guide, you'll be able to securely browse and access Microsoft
104
104
1. Select **Add a client application** and note the App ID.
105
105
106
106
[](media/add-a-client-app.png#lightbox)
107
-
## Register desktop client application for ArcGIS Pro
108
-
109
-
Register a second application (with a distinct name) to represent ArcGIS
110
-
Pro Desktop and configure its API permissions --- ensuring it includes
111
-
access to the web API exposed by the first application.
112
-
113
-
1. Create a second app registration for the ArcGIS Pro desktop client.
114
-
115
-
- Suggested name: ArcGISPro-GeoCatalog-DesktopClient or GeoCatalog-ArcGIS.
116
-
117
-
- Set account type: **Single tenant**.
118
-
119
-
[](media/register-second-app-arcgis-pro-desktop-client.png#lightbox)
120
-
121
-
[](media/new-app-registration-geocatalog-arcgis.png#lightbox)
122
-
123
-
1. Configure the Desktop Client App.
124
-
125
-
Complete the following configuration within the new App registration GeoCatalog-ArcGIS.
126
-
127
-
- For **Authentication**, repeat the same steps as in Step 1:
128
-
129
-
- Add platform: **Web**.
130
-
- Set **Redirect URI**: https://localhost.
131
-
- Add platform: **Mobile and desktop applications**
132
-
- Set **Redirect URI**: arcgis-pro://auth.
133
-
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
134
-
- Select **Save**.
135
-
136
-
-**API Permissions**: Adding Access to the Web API App.
137
-
138
-
- In the **API permissions** tab, select **Add a permission**.
139
-
140
-
- Go to the **APIs my organization uses** tab and search for the **Web
141
-
API app** created in Step 1 (for example, ArcGIS Pro).
142
-
143
-
- Select the app name to open the **Request API Permissions** screen.
144
-
145
-
[](media/request-api-permissions.png#lightbox)
146
-
147
-
- Select both user_authentication and user_impersonation; the delegated permissions defined in the first app.
148
-
149
-
- Select **Add permissions**.
150
-
151
-
[](media/add-api-permissions-arcgis-pro.png#lightbox)
152
-
153
-
- Continue to add the following delegated permissions:
154
-
155
-
-**Azure Storage** > user_impersonation.
156
-
-**Azure Orbital Spatio** > user_impersonation.
157
-
-**Microsoft Graph** > User.Read (This permission is enabled by default).
158
-
- Select **Add permissions**.
159
-
- Select **Grant admin consent**.
160
-
161
-
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
162
-
163
-
[](media/grant-admin-consents-4.png#lightbox)
164
-
## Configure ArcGIS Pro (Desktop) for Microsoft Planetary Computer Pro GeoCatalog access
165
-
166
-
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
167
-
## Add an authentication connection
168
-
169
-
1. Open the **ArcGIS Pro settings** page in one of the following ways:
170
-
171
-
- From an open project, select the **Project** tab on the ribbon.
172
-
- From the start page, select the **Settings** tab.
173
-
174
-
1. In the side menu, select **Options**.
175
-
176
-
1. In the **Options** dialog box, under **Application**, select **Authentication**.
177
-
178
-
1. Select **Add Connection** to add a new authentication connection.
179
-
180
-
1. In the **Add Connection** dialog box:
181
-
182
-
- Enter a **Connection Name**.
183
-
184
-
- For **Type**, select **Microsoft Entra ID**.
185
-
186
-
- Enter your **Entra Domain** and **Client ID**.
187
-
188
-
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
189
-
190
-
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
191
-
192
-
- Add the following **scopes**:
193
-
194
-
-`https://storage.azure.com/.default`
195
-
196
-
-`https://geocatalog.spatio.azure.com/.default`
197
-
198
-
[](media/add-connection.png#lightbox)
199
-
200
-
- Select **OK**.
201
-
202
-
- Sign in through the Authentication dialog and complete the prompts.
203
-
204
-
[](media/sign-in.png#lightbox)
205
-
206
-
> [!TIP]
207
-
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
208
-
209
-
210
-
## Prepare and record GeoCatalog information
211
-
212
-
1. Create an Microsoft Planetary Computer Pro GeoCatalog in your Azure subscription (for example,
213
-
arcgisprogeocatalog), and locate it in the appropriate resource group.
1. Select on the GeoCatalog. For example, **arcgisprogeocatalog**.
218
-
219
-
1. Record the **GeoCatalog URI**. For example, ```https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com```.
220
-
221
-
[](media/get-geocatalog-uri.png#lightbox)
222
-
223
-
1. Open the link to your GeoCatalog URI in the browser and select on the
224
-
**Collections** button
225
-
226
-
[](media/media-processing-center-pro-collections.png#lightbox)
227
-
228
-
1. Record the **Collection Name**. For example, sentinel-2-l2a-tutorial-1000.
229
-
230
-
1. Construct the **Token API Endpoint** using this pattern: ```<GeoCatalog URI>/sas/token/<Collection Name>?api-version=2025-04-30-preview```
1. In ArcGIS Pro, open the **Create Cloud Storage Connection File** geoprocessing tool to create a new ACS connection file. This tool can be accessed in the main Ribbon on the Analysis Tab. Select the Tools Button, then search for the tool by typing its name.
257
-
258
-
1. Specify a Connection File Location for the ACS file.
259
-
260
-
1. Provide a Connection File Name. For example, **geocatalog_connection.acs**.
261
-
262
-
1. For Service Provider selectAzure.
263
-
264
-
1. For **Authentication**, selectthe name of the auth profile that you created in previous steps.
265
-
266
-
1. For **Access Key ID (Account Name)**, use the **Account Name** value that you recorded earlier: ```<unique-storage>```.
267
-
268
-
1. For **Bucket (Container) Name** use the **Container Name** value that you recorded earlier: ```sentinel-2-l2a-tutorial-1000-<unique-id>```.
269
-
270
-
1. Do not specify a **Folder**.
271
-
272
-
1. Add the provider option **ARC_TOKEN_SERVICE_API** and set the value to your **Token API Endpoint** that you constructed earlier. For example:
## Create a STAC connection to Microsoft Planetary Computer Pro
282
-
283
-
1. Create a new STAC connection in ArcGIS Pro (desktop).
284
-
285
-
> [!TIP]
286
-
> Refer to ArcGIS Pro documentation to [Create a STAC connection](https://pro.arcgis.com/en/pro-app/latest/help/data/imagery/create-a-stac-connection.htm).
287
-
288
-
[  ](media/create-new-stac-connection.png#lightbox)
289
-
290
-
- Provide a name for the STAC Connection: For example, GeoCatalog_Connection.
291
-
292
-
- For Connection use the form```<GeoCatalog URI>/stac```. For example,
- [Create a new GeoCatalog](./deploy-geocatalog-resource.md)
323
-
- [Create a STAC collection](./create-stac-collection.md)
324
-
325
-
# [US Gov](#tab/usgov)
326
-
## Register web API application for ArcGIS Pro
327
-
1. Open the Azure Portal and go to **Microsoft Entra ID**.
107
+
### [US Gov](#tab/usgov)
108
+
Open the Azure Portal and go to **Microsoft Entra ID**.
328
109
329
110
[  ](media/microsoft-entra-id.png#lightbox)
330
111
@@ -401,8 +182,66 @@ This section outlines how to configure authentication and data access in the **A
401
182
1. Select **Add a client application** and note the App ID.
402
183
403
184
[](media/add-a-client-app.png#lightbox)
185
+
---
186
+
404
187
## Register desktop client application for ArcGIS Pro
188
+
### [Public](#tab/public)
189
+
Register a second application (with a distinct name) to represent ArcGIS
190
+
Pro Desktop and configure its API permissions --- ensuring it includes
191
+
access to the web API exposed by the first application.
192
+
193
+
1. Create a second app registration for the ArcGIS Pro desktop client.
194
+
195
+
- Suggested name: ArcGISPro-GeoCatalog-DesktopClient or GeoCatalog-ArcGIS.
196
+
197
+
- Set account type: **Single tenant**.
198
+
199
+
[](media/register-second-app-arcgis-pro-desktop-client.png#lightbox)
200
+
201
+
[](media/new-app-registration-geocatalog-arcgis.png#lightbox)
202
+
203
+
1. Configure the Desktop Client App.
204
+
205
+
Complete the following configuration within the new App registration GeoCatalog-ArcGIS.
206
+
207
+
- For **Authentication**, repeat the same steps as in Step 1:
208
+
209
+
- Add platform: **Web**.
210
+
- Set **Redirect URI**: https://localhost.
211
+
- Add platform: **Mobile and desktop applications**
212
+
- Set **Redirect URI**: arcgis-pro://auth.
213
+
- Enable **ID tokens** under **Implicit grant and hybrid flows**.
214
+
- Select **Save**.
215
+
216
+
-**API Permissions**: Adding Access to the Web API App.
217
+
218
+
- In the **API permissions** tab, select **Add a permission**.
219
+
220
+
- Go to the **APIs my organization uses** tab and search for the **Web
221
+
API app** created in Step 1 (for example, ArcGIS Pro).
222
+
223
+
- Select the app name to open the **Request API Permissions** screen.
224
+
225
+
[](media/request-api-permissions.png#lightbox)
226
+
227
+
- Select both user_authentication and user_impersonation; the delegated permissions defined in the first app.
228
+
229
+
- Select **Add permissions**.
230
+
231
+
[](media/add-api-permissions-arcgis-pro.png#lightbox)
405
232
233
+
- Continue to add the following delegated permissions:
234
+
235
+
-**Azure Storage** > user_impersonation.
236
+
-**Azure Orbital Spatio** > user_impersonation.
237
+
-**Microsoft Graph** > User.Read (This permission is enabled by default).
238
+
- Select **Add permissions**.
239
+
- Select **Grant admin consent**.
240
+
241
+
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
242
+
243
+
[](media/grant-admin-consents-4.png#lightbox)
244
+
### [US Gov](#tab/usgov)
406
245
Register a second application (with a distinct name) to represent ArcGIS
407
246
Pro Desktop and configure its API permissions --- ensuring it includes
408
247
access to the web API exposed by the first application.
@@ -459,10 +298,53 @@ access to the web API exposed by the first application.
459
298
[](media/app-selection-on-request-api-permissions-screen.png#lightbox)
460
299
461
300
[](media/grant-admin-consents-4.png#lightbox)
301
+
---
462
302
## Configure ArcGIS Pro (Desktop) for Microsoft Planetary Computer Pro GeoCatalog access
463
303
464
304
This section outlines how to configure authentication and data access in the **ArcGIS Pro desktop application**, using OAuth 2.0 integration with **Microsoft Entra ID** and access to the **Microsoft Planetary Computer Pro GeoCatalog**. It includes steps to add an authentication connection and create storage and STAC data connections.
305
+
465
306
## Add an authentication connection
307
+
### [Public](#tab/public)
308
+
1. Open the **ArcGIS Pro settings** page in one of the following ways:
309
+
310
+
- From an open project, select the **Project** tab on the ribbon.
311
+
- From the start page, select the **Settings** tab.
312
+
313
+
1. In the side menu, select **Options**.
314
+
315
+
1. In the **Options** dialog box, under **Application**, select **Authentication**.
316
+
317
+
1. Select **Add Connection** to add a new authentication connection.
318
+
319
+
1. In the **Add Connection** dialog box:
320
+
321
+
- Enter a **Connection Name**.
322
+
323
+
- For **Type**, select **Microsoft Entra ID**.
324
+
325
+
- Enter your **Entra Domain** and **Client ID**.
326
+
327
+
- You can [find your **Entra Domain**](/partner-center/account-settings/find-ids-and-domain-names) (also know as your **Primary Domain**) from with Microsoft Entra ID from your Azure Portal
328
+
329
+
- Your **Client ID** is the client ID you set above in the **Add a client application** step.
330
+
331
+
- Add the following **scopes**:
332
+
333
+
-`https://storage.azure.com/.default`
334
+
335
+
-`https://geocatalog.spatio.azure.com/.default`
336
+
337
+
[](media/add-connection.png#lightbox)
338
+
339
+
- Select **OK**.
340
+
341
+
- Sign in through the Authentication dialog and complete the prompts.
342
+
343
+
[](media/sign-in.png#lightbox)
344
+
345
+
> [!TIP]
346
+
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
347
+
### [US Gov](#tab/usgov)
466
348
467
349
1. Open the **ArcGIS Pro settings** page in one of the following ways:
468
350
@@ -504,8 +386,7 @@ This section outlines how to configure authentication and data access in the **A
504
386
505
387
> [!TIP]
506
388
> For more information, see the official ArcGIS Pro documentation [Connect to authentication providers from ArcGIS Pro](https://pro.arcgis.com/en/pro-app/latest/get-started/connect-to-authentication-providers-from-arcgis-pro.htm).
507
-
508
-
389
+
---
509
390
510
391
## Prepare and record GeoCatalog information
511
392
@@ -620,4 +501,4 @@ This section outlines how to configure authentication and data access in the **A
0 commit comments