Skip to content

Commit 918f433

Browse files
committed
Increased Acrolinx score from 88 to 100.
1 parent 5ee75a9 commit 918f433

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/azure-maps/how-to-secure-spa-users.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to secure a single page application with user sign-in
33
titleSuffix: Azure Maps
4-
description: How to configure a single page application which supports Azure AD single-sign-on with Azure Maps Web SDK.
4+
description: How to configure a single page application that supports Azure AD single-sign-on with Azure Maps Web SDK.
55
author: eriklindeman
66
ms.author: eriklind
77
ms.date: 06/12/2020
@@ -13,7 +13,7 @@ ms.custom: devx-track-js
1313

1414
# Secure a single page application with user sign-in
1515

16-
The following guide pertains to an application which is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
16+
The following guide pertains to an application that is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
1717

1818
[!INCLUDE [authentication details](./includes/view-authentication-details.md)]
1919

@@ -26,7 +26,7 @@ Create the web application in Azure AD for users to sign in. The web application
2626
> [!div class="mx-imgBorder"]
2727
> ![App registration](./media/how-to-manage-authentication/app-registration.png)
2828
29-
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI which will represent the url which Azure AD will issue the token and is the url where the map control is hosted. For a detailed sample please see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
29+
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI that represents the url which Azure AD issues the token and is the url where the map control is hosted. For a detailed sample, see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
3030

3131
3. To assign delegated API permissions to Azure Maps, go to the application. Then under **App registrations**, select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
3232

0 commit comments

Comments
 (0)