You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communication-services/concepts/entra-id-authentication-overview.md
+18-27Lines changed: 18 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,20 +32,17 @@ Before we begin:
32
32
- The Fabrikam Azure Communication Services resource admin needs to grant Alice permission to perform her role via *Azure Portal blade* or [Entra Id Assignment](/rest/api/communication/identity/entra-id-assignment) REST APIs.
33
33
34
34
Steps:
35
-
1. Authenticate Alice using Microsoft Entra ID: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
36
-
1. Get an access token for Alice: The Fabrikam application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Fabrikam application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id).
35
+
1. Authenticate Alice using Microsoft Entra ID: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions). Below are the details of the authentication artifact `A`:
36
+
-**_Type_**: Microsoft Entra access token
37
+
-**_Audience_**: _`Azure Communication Services Clients`_
38
+
-**_Source_**: Fabrikam's Microsoft Entra tenant
39
+
-**_Permissions_**: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
40
+
1. Get an access token for Alice: The Fabrikam application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Fabrikam application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id). Below are the details of the authentication artifact `B`:
41
+
-**_Type_**: Azure Communication Services access token
42
+
-**_Audience_**: _`Azure Communication Services`_, data plane
43
+
-**_Azure Communication Services Resource ID_**: Fabrikam's _`Azure Communication Services Resource ID`_
37
44
1. Call Bob: Alice makes a call to Microsoft Entra ID user Bob, with Fabrikam's app. The call takes place via the Calling SDK with an Azure Communication Services access token. Learn more about [developing application for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
38
45
39
-
Artifacts:
40
-
- Artifact `A`
41
-
- Type: Microsoft Entra access token
42
-
- Audience: _`Azure Communication Services`_, control plane
43
-
- Source: Fabrikam's Microsoft Entra tenant
44
-
- Permissions: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
45
-
- Artifact `B`
46
-
- Type: Azure Communication Services access token
47
-
- Audience: _`Azure Communication Services`_, data plane
48
-
- Azure Communication Services Resource ID: Fabrikam's _`Azure Communication Services Resource ID`_
49
46
50
47
## Case 2: Example of a multitenant application
51
48
The Contoso company has built an application for external customers. The Fabrikam company decided to use the application. This application uses Microsoft Entra ID authentication within Contoso's infrastructure.
@@ -61,23 +58,17 @@ Before we begin:
61
58
- The Contoso Azure Communication Services resource admin needs to grant Alice permission to perform her role via *Azure Portal blade* or [Entra Id Assignment](/rest/api/communication/identity/entra-id-assignment) REST APIs.
62
59
63
60
Steps:
64
-
1. Authenticate Alice using the Contoso application: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions).
65
-
1. Get an access token for Alice: The Contoso application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Contoso application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id).
61
+
1. Authenticate Alice using the Contoso application: Alice is authenticated using a standard OAuth flow with *Microsoft Authentication Library (MSAL)* or *Azure Identity SDK*. If authentication is successful, the client application receives a Microsoft Entra access token, with a value of `A`. Tokens are outlined later in this article. Authentication from the developer perspective is explored in this [quickstart](../quickstarts/identity/entra-id-authentication-integration.md#developer-actions). Below are the details of the authentication artifact `A`:
62
+
-**_Type_**: Microsoft Entra access token
63
+
-**_Audience_**: _`Azure Communication Services Clients`_
64
+
-**_Source_**: Contoso application registration's Microsoft Entra tenant
65
+
-**_Permissions_**: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
66
+
1. Get an access token for Alice: The Contoso application by using the authentication artifact with value `A` performs exchange the Microsoft Entra access token for an Azure Communication Services access token logic. After successful authorization, the Azure Communication Services access token `B` is generated for Alice within the Contoso application. This access token can be used for data plane actions in Azure Communication Services, like Calling. For more information on how to implement the logic, see [Obtain access tokens for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md) and [Get an Application ID](../troubleshooting-info.md#get-an-application-id). Below are the details of the authentication artifact `B`:
67
+
-**_Type_**: Azure Communication Services access token
68
+
-**_Audience_**: _`Azure Communication Services`_, data plane
69
+
-**_Azure Communication Services Resource ID_**: Contoso's _`Azure Communication Services Resource ID`_
66
70
1. Call Bob: Alice makes a call to Microsoft Entra ID user Bob, with Contoso's app. The call takes place via the Calling SDK with an Azure Communication Services access token. Learn more about [developing application for Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md).
67
71
68
-
69
-
70
-
Artifacts:
71
-
- Artifact `A`
72
-
- Type: Microsoft Entra access token
73
-
- Audience: _`Azure Communication Services`_, control plane
74
-
- Source: Contoso application registration's Microsoft Entra tenant
75
-
- Permissions: _All permissions listed in [Access tokens with Microsoft Entra ID](./identity-model.md#access-tokens-with-microsoft-entra-id)_
76
-
- Artifact `B`
77
-
- Type: Azure Communication Services access token
78
-
- Audience: _`Azure Communication Services`_, data plane
79
-
- Azure Communication Services Resource ID: Contoso's _`Azure Communication Services Resource ID`_
80
-
81
72
## Next steps
82
73
83
74
- Try this [quickstart to authenticate Microsoft Entra ID users](../quickstarts/identity/entra-id-authentication-integration.md).
0 commit comments