You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/azure-maps-authentication.md
+11-14Lines changed: 11 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,32 +13,31 @@ ms.custom: mvc
13
13
14
14
# Authentication with Azure Maps
15
15
16
-
Azure Maps supports two ways to authenticate requests: Shared Key and Azure Active Directory (Azure AD). This article explains these authentication methods to help guide your implementation.
16
+
Azure Maps supports two ways to authenticate requests: Shared Key authentication and Azure Active Directory authentication. This article explains these authentication methods to help guide your implementation.
17
17
18
18
## Shared Key authentication
19
19
20
-
Shared Key authentication passes keys generated by an Azure Maps account with each request to Azure Maps. For each request to Azure Maps services, the *subscription key* needs to be added as a parameter to the URL. Primary and secondary keys are generated after the Azure Maps account is created. We recommend that you use the primary key as the subscription key when you call Azure Maps by using shared key authentication. The secondary key can be used in scenarios like rolling key changes.
20
+
Shared Key authentication passes keys generated by an Azure Maps account with each request to Azure Maps. For each request to Azure Maps services, the *subscription key* needs to be added as a parameter to the URL. Primary and secondary keys are generated after the Azure Maps account is created. We recommend you use the primary key as the subscription key when you call Azure Maps by using shared key authentication. The secondary key can be used in scenarios like rolling key changes.
21
21
22
22
For information about viewing your keys in the Azure portal, see [Manage authentication](https://aka.ms/amauthdetails).
23
23
24
24
> [!Tip]
25
-
> We recommend regenerating your keys regularly. You're provided with two keys so that you can maintain connections with one key while regenerating the other. When you regenerate your keys, you need to update any applications that access your account with the new keys.
25
+
> We recommend regenerating your keys regularly. You're provided with two keys, so that you can maintain connections with one key while regenerating the other. When you regenerate your keys, you need to update any applications that access your account with the new keys.
26
26
27
27
28
28
29
29
## Authentication with Azure Active Directory (Preview)
30
30
31
-
Azure Maps now offers authentication of requests for Azure Maps services using [Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis). Azure AD provides identity-based authentication, including [role-based access control (RBAC)](https://docs.microsoft.com/azure/role-based-access-control/overview). RBAC is used to grant user-level, group-level, or application-level access to Azure Maps resources. The sections that follow can help you understand the concepts and components of Azure Maps integration with Azure AD.
32
-
31
+
Azure Maps now offers requests authentication for Azure Maps services using [Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis). Azure AD provides identity-based authentication, including [role-based access control (RBAC)](https://docs.microsoft.com/azure/role-based-access-control/overview). RBAC is used to grant user-level, group-level, or application-level access to Azure Maps resources. The next sections can help you understand concepts and components of Azure Maps integration with Azure AD.
33
32
## Authentication with OAuth access tokens
34
33
35
34
Azure Maps accepts **OAuth 2.0** access tokens for Azure AD tenants associated with an Azure subscription that contains an Azure Maps account. Azure Maps accepts tokens for:
36
35
37
-
* Azure AD users.
38
-
* Partner applications that use permissions delegated by users.
39
-
* Managed identities for Azure resources.
36
+
* Azure AD users
37
+
* Partner applications that use permissions delegated by users
38
+
* Managed identities for Azure resources
40
39
41
-
Azure Maps generates a *unique identifier (client ID)* for each Azure Maps account. When you combine this client ID with an additional parameters, you can request tokens from Azure AD. To request a token, you need to specify the values in the following table based on your Azure Environment.
40
+
Azure Maps generates a *unique identifier (client ID)* for each Azure Maps account. You can request tokens from Azure AD when you combine this client ID with additional parameters. To request a token, you need to specify the values in the following table based on your Azure Environment.
42
41
43
42
| Azure Environment | Azure AD token endpoint |
44
43
| --------------------|-------------------------|
@@ -52,7 +51,7 @@ For general information about requesting tokens from Azure AD, see [What is auth
52
51
53
52
## Request Azure Map resources with OAuth tokens
54
53
55
-
After a token is received from Azure AD, a request can be sent to Azure Maps with the following two required request headers set:
54
+
After a token is received from Azure AD, a request is sent to Azure Maps with the following set of required request headers:
56
55
57
56
| Request header | Value |
58
57
|:------------------|:------------|
@@ -75,17 +74,15 @@ For information about viewing your client ID, see [View authentication details](
75
74
76
75
## Control access with RBAC
77
76
78
-
Azure AD lets you control access to secured resources by using RBAC. Set up your Azure Maps account and register your Azure Maps Azure AD TENANT. Then, you can set up RBAC for a user, group, application, or Azure resource on the Azure Maps account portal page.
79
-
80
-
Azure Maps supports read access control for individual Azure AD users, groups, applications, and Azure services via managed identities for Azure resources.
77
+
In Azure AD, use RBAC to control access to secured resources. Set up your Azure Maps account and register your Azure Maps Azure AD TENANT. Azure Maps supports read access control for individual Azure AD users, groups, applications, Azure resources, and Azure services via managed identities for Azure resources. On the Azure Maps portal page, you can set up RBAC for your desired roles.
81
78
82
79

83
80
84
81
For information about viewing your RBAC settings, see [How to configure RBAC for Azure Maps](https://aka.ms/amrbac).
85
82
86
83
## Managed identities for Azure resources and Azure Maps
87
84
88
-
[Managed identities for Azure resources](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) provide Azure services (Azure App Service, Azure Functions, Azure Virtual Machines, and so on) with an automatically managed identity that can be authorized for access to Azure Maps services.
85
+
[Managed identities for Azure resources](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) provide Azure services with an automatically managed identity, which can be authorized to access Azure Maps services. Some examples of managed identities, include: Azure App Service, Azure Functions, and Azure Virtual Machines.
0 commit comments