Skip to content

Commit 9df2194

Browse files
committed
fixed auidence and moved artifacts to the steps
1 parent c612005 commit 9df2194

File tree

1 file changed

+18
-27
lines changed

1 file changed

+18
-27
lines changed

articles/communication-services/concepts/entra-id-authentication-overview.md

Lines changed: 18 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -32,20 +32,17 @@ Before we begin:
3232
- The Fabrikam Azure Communication Services resource admin needs to grant Alice permission to perform her role via *Azure Portal blade* or [Entra Id Assignment](/rest/api/communication/identity/entra-id-assignment) REST APIs.
3333

3434
Steps:
35-
1. Authenticate Alice using Microsoft Entra ID: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
36-
1. Get an access token for Alice: The Fabrikam application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Fabrikam application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id).
35+
1. Authenticate Alice using Microsoft Entra ID: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions). Below are the details of the authentication artifact `A`:
36+
- **_Type_**: Microsoft Entra access token
37+
- **_Audience_**: _`Azure Communication Services Clients`_
38+
- **_Source_**: Fabrikam's Microsoft Entra tenant
39+
- **_Permissions_**: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
40+
1. Get an access token for Alice: The Fabrikam application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Fabrikam application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id). Below are the details of the authentication artifact `B`:
41+
- **_Type_**: Azure Communication Services access token
42+
- **_Audience_**: _`Azure Communication Services`_, data plane
43+
- **_Azure Communication Services Resource ID_**: Fabrikam's _`Azure Communication Services Resource ID`_
3744
1. Call Bob: Alice makes a call to Microsoft Entra ID user Bob, with Fabrikam's app. The call takes place via the Calling SDK with an Azure Communication Services access token. Learn more about [developing application for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
3845

39-
Artifacts:
40-
- Artifact `A`
41-
- Type: Microsoft Entra access token
42-
- Audience: _`Azure Communication Services`_, control plane
43-
- Source: Fabrikam's Microsoft Entra tenant
44-
- Permissions: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
45-
- Artifact `B`
46-
- Type: Azure Communication Services access token
47-
- Audience: _`Azure Communication Services`_, data plane
48-
- Azure Communication Services Resource ID: Fabrikam's _`Azure Communication Services Resource ID`_
4946

5047
## Case 2: Example of a multitenant application
5148
The Contoso company has built an application for external customers. The Fabrikam company decided to use the application. This application uses Microsoft Entra ID authentication within Contoso's infrastructure.
@@ -61,23 +58,17 @@ Before we begin:
6158
- The Contoso Azure Communication Services resource admin needs to grant Alice permission to perform her role via *Azure Portal blade* or [Entra Id Assignment](/rest/api/communication/identity/entra-id-assignment) REST APIs.
6259

6360
Steps:
64-
1. Authenticate Alice using the Contoso application: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
65-
1. Get an access token for Alice: The Contoso application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Contoso application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id).
61+
1. Authenticate Alice using the Contoso application: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions). Below are the details of the authentication artifact `A`:
62+
- **_Type_**: Microsoft Entra access token
63+
- **_Audience_**: _`Azure Communication Services Clients`_
64+
- **_Source_**: Contoso application registration's Microsoft Entra tenant
65+
- **_Permissions_**: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
66+
1. Get an access token for Alice: The Contoso application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Contoso application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id). Below are the details of the authentication artifact `B`:
67+
- **_Type_**: Azure Communication Services access token
68+
- **_Audience_**: _`Azure Communication Services`_, data plane
69+
- **_Azure Communication Services Resource ID_**: Contoso's _`Azure Communication Services Resource ID`_
6670
1. Call Bob: Alice makes a call to Microsoft Entra ID user Bob, with Contoso's app. The call takes place via the Calling SDK with an Azure Communication Services access token. Learn more about [developing application for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md).
6771

68-
69-
70-
Artifacts:
71-
- Artifact `A`
72-
- Type: Microsoft Entra access token
73-
- Audience: _`Azure Communication Services`_, control plane
74-
- Source: Contoso application registration's Microsoft Entra tenant
75-
- Permissions: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
76-
- Artifact `B`
77-
- Type: Azure Communication Services access token
78-
- Audience: _`Azure Communication Services`_, data plane
79-
- Azure Communication Services Resource ID: Contoso's _`Azure Communication Services Resource ID`_
80-
8172
## Next steps
8273

8374
- Try this [quickstart to authenticate Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md).

0 commit comments

Comments
 (0)