You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-configure-postman.md
+6-38Lines changed: 6 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
7
7
ms.service: digital-twins
8
8
services: digital-twins
9
9
ms.topic: conceptual
10
-
ms.date: 01/10/2020
10
+
ms.date: 02/03/2020
11
11
---
12
12
13
13
# How to configure Postman for Azure Digital Twins
@@ -28,45 +28,15 @@ Through the Postman client, solutions developers can specify the kind of HTTP re
28
28
29
29
## Configure Azure Active Directory to use the OAuth 2.0 implicit grant flow
30
30
31
-
Configure your Azure Active Directory app to use the OAuth 2.0 implicit grant flow.
32
-
33
-
1. Open the **API permissions** pane for your app registration. Select **Add a permission** button. In the **Request API permissions** pane, select the **APIs my organization uses** tab, and then search for:
34
-
35
-
1.`Azure Digital Twins`. Select the **Azure Digital Twins** API.
36
-
37
-
[](../../includes/media/digital-twins-permissions/aad-aap-search-api-dt.png#lightbox)
38
-
39
-
1. Alternatively, search for `Azure Smart Spaces Service`. Select the **Azure Smart Spaces Service** API.
40
-
41
-
[](../../includes/media/digital-twins-permissions/aad-app-search-api.png#lightbox)
42
-
43
-
> [!IMPORTANT]
44
-
> The Azure AD API name and ID that will appear depends on your tenant:
45
-
> * Test tenant and customer accounts should search for `Azure Digital Twins`.
46
-
> * Other Microsoft accounts should search for `Azure Smart Spaces Service`.
47
-
48
-
1. The selected API shows up as **Azure Digital Twins** in the same **Request API permissions** pane. Select the **Read (1)** drop down, and then select **Read.Write** checkbox. Select the **Add permissions** button.
49
-
50
-
[](../../includes/media/digital-twins-permissions/aad-app-req-permissions.png#lightbox)
51
-
52
-
1. Depending on your organization's settings, you might need to take additional steps to grant admin access to this API. Contact your administrator for more information. Once the admin access is approved, the **ADMIN CONSENT REQUIRED** column in the **API permissions** pane will show similar to the following for your APIs:
1. Configure a second **Redirect URI** to `https://www.getpostman.com/oauth2/callback`.
31
+
1. Follow the steps in [the Quickstart](quickstart-view-occupancy-dotnet.md#set-permissions-for-your-app) to create and configure an Azure Active Directory application. Alternatively, you can reuse an existing app registration.
57
32
58
33
[](media/how-to-configure-postman/authentication-redirect-uri.png#lightbox)
59
34
60
-
1. To make sure that [the app is registered as a **public client**](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration), open the **Authentication** pane for your app registration, and scroll down in that pane. In the **Default client type** section, choose **Yes** for **Treat application as a public client**, and hit **Save**.
61
-
62
-
Check **Access tokens** to enable the **oauth2AllowImplicitFlow** setting in your Manifest.json.
35
+
1. Now, add a **Redirect URI** to `https://www.getpostman.com/oauth2/callback`.
1. Copy and keep the **Application ID** of your Azure Active Directory app. It's used in the steps that follow.
67
-
68
-
[](../../includes/media//digital-twins-permissions/aad-app-reg-app-id.png#lightbox)
37
+
1. Select the **Implicit grant** > **Access tokens** check box to allow the OAuth 2.0 implicit grant flow to be used. Select **Configure**, then **Save**.
69
38
39
+
1. Copy the **Client ID** of your Azure Active Directory app.
70
40
71
41
## Obtain an OAuth 2.0 token
72
42
@@ -86,15 +56,13 @@ Set up and configure Postman to obtain an Azure Active Directory token. Afterwar
86
56
87
57
1. Go to [www.getpostman.com](https://www.getpostman.com/) to download the app.
88
58
89
-
1. Open the Postman app and click new | Create new, and select Request. Enter a Request name. Select a collection or folder to save it to, and click Save.
90
-
91
59
1. We want to make GET request. Select the **Authorization** tab, select OAuth 2.0, and then select **Get New Access Token**.
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-use-swagger.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
7
7
ms.service: digital-twins
8
8
services: digital-twins
9
9
ms.topic: conceptual
10
-
ms.date: 01/21/2020
10
+
ms.date: 02/03/2020
11
11
ms.custom: seodec18
12
12
---
13
13
@@ -88,11 +88,11 @@ The examples also include error codes to help debug or improve failing tests.
88
88
## Swagger OAuth 2.0 authorization
89
89
90
90
> [!NOTE]
91
-
> * The user principal that created the Azure Digital Twins resource will have a Space Administrator role assignment and will be able to create additional role assignments for other users. Such users and their roles can be authorized to call the APIs.
91
+
> * The user principal that created the Azure Digital Twins resource will have a Space Administrator role assignment and will be able to create additional role assignments for other users. Those users and their roles can be authorized to call the APIs.
92
92
93
-
1. Follow the steps in [this quickstart](https://docs.microsoft.com/azure/active-directory/develop/quickstart-v1-integrate-apps-with-azure-ad) to create and configure an Azure AD application. Alternatively, you can reuse an existing app registration.
93
+
1. Follow the steps in [the Quickstart](quickstart-view-occupancy-dotnet.md#set-permissions-for-your-app) to create and configure an Azure Active Directory application. Alternatively, you can reuse an existing app registration.
94
94
95
-
1. Add the following **Redirect url** to your Azure AD app registration:
95
+
1. Add the following **Redirect URI** to your Azure Active Directory app registration:
96
96
97
97
[](media/how-to-use-swagger/swagger-aad-redirect-url-registration.png#lightbox)
98
98
@@ -103,7 +103,9 @@ The examples also include error codes to help debug or improve failing tests.
103
103
|---------|---------|---------|
104
104
| YOUR_SWAGGER_URL | Your Management REST API documentation URL found in the portal | `https://yourDigitalTwinsName.yourLocation.azuresmartspaces.net/management/swagger` |
105
105
106
-
1. Copy the **Client ID** of your Azure AD app.
106
+
1. Select the **Implicit grant** > **Access tokens** check box to allow the OAuth 2.0 implicit grant flow to be used. Select **Configure**, then **Save**.
107
+
108
+
1. Copy the **Client ID** of your Azure Active Directory app.
107
109
108
110
After completing the Azure Active Directory registration:
Copy file name to clipboardExpand all lines: includes/digital-twins-permissions.md
+26-10Lines changed: 26 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
manager: bertvanhoof
8
8
ms.service: digital-twins
9
9
ms.topic: include
10
-
ms.date: 01/23/2020
10
+
ms.date: 02/03/2020
11
11
ms.custom: include file
12
12
---
13
13
@@ -22,24 +22,40 @@
22
22
23
23
[](./media/digital-twins-permissions/aad-app-register.png#lightbox)
24
24
25
-
1. Give a friendly name for this app registration in the **Name** box. Under the **Redirect URI (optional)** section, choose **Public client/native (mobile & desktop)** in the drop-down menu on the left, and enter `https://microsoft.com` in the textbox on the right. Select **Register**.
25
+
1. Give a friendly name for this app registration in the **Name** box.
26
+
27
+
1. Under **Redirect URI (optional)** section, enter `https://microsoft.com` in the textbox.
28
+
29
+
1. Verify which accounts and tenants are supported by your Azure Active Directory app.
1.To make sure that [the app is registered as a **public client**](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration), open the **Authentication**pane for your app registration, and scroll down in that pane. In the **Default client type** section, choose **Yes** for **Treat application as a public client**, and hit **Save**.
35
+
1.The **Authentication**blade specifies important authentication configuration settings.
30
36
31
-
1.**Redirect URIs** must match the address supplied by the authentication request:
37
+
1. Add **Redirect URIs** and configure **Access Tokens** by selecting **+ Add a platform**.
38
+
39
+
1. Select **Yes** to specify that the app is a **public client**.
32
40
33
-
* For apps hosted in a local development environment, select **Public client (mobile & desktop)**. Make sure to set the **Default client type** to yes.
34
-
* For Single-Page apps hosted on Azure App Service, select **Web**.
41
+
1. Verify which accounts and tenants are supported by your Azure Active Directory app.
1. After selecting the appropriate platform, configure your **Redirect URIs** and **Access Tokens** in the side panel to the right of the user interface.
46
+
47
+
1.**Redirect URIs** must match the address supplied by the authentication request:
35
48
36
-
Select **Public client (mobile & desktop)** and enter `http://localhost:8080/`.
49
+
* For apps hosted in a local development environment, select **Public client (mobile & desktop)**. Make sure to set **public client** to **Yes**.
50
+
* For Single-Page Apps hosted on Azure App Service, select **Web**.
1. Open the **Overview** pane of your registered app, and copy the values of the following entities to a temporary file. You'll use these values to configure your sample application in the following sections.
0 commit comments