Skip to content

Commit a4f0a96

Browse files
committed
Started the convertion of inline links to end of file style links
1 parent 6a23904 commit a4f0a96

File tree

1 file changed

+30
-16
lines changed

1 file changed

+30
-16
lines changed

articles/azure-maps/how-to-secure-daemon-app.md

Lines changed: 30 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -27,20 +27,20 @@ The following are examples of daemon applications:
2727
[!INCLUDE [authentication details](./includes/view-authentication-details.md)]
2828

2929
>[!IMPORTANT]
30-
>For production applications, we recommend implementing Azure AD and Azure role-based access control (Azure RBAC). For an overview of Azure AD concepts, see [Authentication with Azure Maps](azure-maps-authentication.md).
30+
>For production applications, we recommend implementing Azure AD and Azure role-based access control (Azure RBAC). For an overview of Azure AD concepts, see [Authentication with Azure Maps].
3131
3232
## Scenario: Shared key authentication with Azure Key Vault
3333

34-
Applications that use Shared Key authentication, should store the keys in a secure store. This scenario describes how to safely store your application key as a secret in Azure Key Vault. Instead of storing the shared key in application configuration, the application can retrieve the shared key as an Azure Key Vault secret. To simplify key regeneration, we recommend that applications use one key at a time. Applications can then regenerate the unused key and deploy the regenerated key to Azure Key Vault while still maintaining current connections with one key. To understand how to configure Azure Key Vault, see [Azure Key Vault developer guide](../key-vault/general/developers-guide.md).
34+
Applications that use Shared Key authentication, should store the keys in a secure store. This scenario describes how to safely store your application key as a secret in Azure Key Vault. Instead of storing the shared key in application configuration, the application can retrieve the shared key as an Azure Key Vault secret. To simplify key regeneration, we recommend that applications use one key at a time. Applications can then regenerate the unused key and deploy the regenerated key to Azure Key Vault while still maintaining current connections with one key. To understand how to configure Azure Key Vault, see [Azure Key Vault developer guide].
3535

3636
>[!IMPORTANT]
3737
>This scenario indirectly accesses Azure Active Directory through Azure Key Vault. However, we recommend that you use Azure AD authentication directly. Using Azure AD directly avoids the additional complexity and operational requirements of using shared key authentication and setting up Key Vault.
3838
3939
The following steps outline this process:
4040

41-
1. [Create an Azure Key Vault](../key-vault/general/quick-create-portal.md).
42-
2. Create an [Azure AD service principal](../active-directory/fundamentals/service-accounts-principal.md) by creating an App registration or managed identity. The created principal is responsible for accessing the Azure Key Vault.
43-
3. Assign the service principal access to Azure Key secrets `get` permission. For details about how to set permissions, see [Assign a Key Vault access policy using the Azure portal](../key-vault/general/assign-access-policy-portal.md).
41+
1. [Create an Azure Key Vault].
42+
2. Create an [Azure AD service principal] by creating an App registration or managed identity. The created principal is responsible for accessing the Azure Key Vault.
43+
3. Assign the service principal access to Azure Key secrets `get` permission. For details about how to set permissions, see [Assign a Key Vault access policy using the Azure portal].
4444
4. Temporarily assign access to secrets `set` permission for you as the developer.
4545
5. Set the shared key in the Key Vault secrets and reference the secret ID as configuration for the daemon application.
4646
6. Remove your secrets `set` permission.
@@ -77,11 +77,11 @@ When running on a non-Azure environment, managed identities aren't available. As
7777

7878
#### Create new application registration
7979

80-
If you've already created your application registration, go to [Assign delegated API permissions](#assign-delegated-api-permissions).
80+
If you've already created your application registration, go to [Assign delegated API permissions].
8181

8282
To create a new application registration:
8383

84-
1. Sign in to the [Azure portal](https://portal.azure.com).
84+
1. Sign in to the [Azure portal].
8585

8686
2. Select **Azure Active Directory**.
8787

@@ -101,7 +101,7 @@ To create a new application registration:
101101

102102
To assign delegated API permissions to Azure Maps:
103103

104-
1. If you haven't done so already, sign in to the [Azure portal](https://portal.azure.com).
104+
1. If you haven't done so already, sign in to the [Azure portal].
105105

106106
2. Select **Azure Active Directory**.
107107

@@ -174,21 +174,21 @@ To create a client secret:
174174
:::image type="content" border="true" source="./media/how-to-manage-authentication/copy-client-secret.png" alt-text="Copy client secret.":::
175175

176176
>[!IMPORTANT]
177-
>To securely store the certificate or secret, see the [Azure Key Vault Developer Guide](../key-vault/general/developers-guide.md). You'll use this secret to get tokens from Azure AD.
177+
>To securely store the certificate or secret, see the [Azure Key Vault developer guide]. You'll use this secret to get tokens from Azure AD.
178178
179179
[!INCLUDE [grant role-based access to users](./includes/grant-rbac-users.md)]
180180

181181
### Request a token with managed identity
182182

183-
After a managed identity is configured for the hosting resource, you can use Azure SDK or REST API to acquire a token for Azure Maps. To learn how to acquire an access token, see [Acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
183+
After a managed identity is configured for the hosting resource, you can use Azure SDK or REST API to acquire a token for Azure Maps. To learn how to acquire an access token, see [Acquire an access token].
184184

185185
### Request token with application registration
186186

187187
After you register your app and associate it with Azure Maps, you'll need to request an access token.
188188

189189
To acquire the access token:
190190

191-
1. If you haven't done so already, sign in to the [Azure portal](https://portal.azure.com).
191+
1. If you haven't done so already, sign in to the [Azure portal].
192192

193193
2. Select **Azure Active Directory**.
194194

@@ -200,7 +200,7 @@ To acquire the access token:
200200

201201
:::image type="content" border="true" source="./media/how-to-manage-authentication/get-token-params.png" alt-text="Copy token parameters.":::
202202

203-
We'll use the [Postman](https://www.postman.com/) application to create the token request, but you can use a different API development environment.
203+
We'll use the [Postman] application to create the token request, but you can use a different API development environment.
204204

205205
1. In the Postman app, select **New**.
206206

@@ -229,18 +229,32 @@ We'll use the [Postman](https://www.postman.com/) application to create the toke
229229
}
230230
```
231231

232-
For more information about authentication flow, see [OAuth 2.0 client credentials flow on the Microsoft identity platform](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#first-case-access-token-request-with-a-shared-secret)
232+
For more information about authentication flow, see [OAuth 2.0 client credentials flow on the Microsoft identity platform]
233233

234234
## Next steps
235235

236236
For more detailed examples:
237237
> [!div class="nextstepaction"]
238-
> [Authentication scenarios for Azure AD](../active-directory/develop/authentication-vs-authorization.md)
238+
> [Authentication scenarios for Azure AD]
239239
240240
Find the API usage metrics for your Azure Maps account:
241241
> [!div class="nextstepaction"]
242-
> [View usage metrics](how-to-view-api-usage.md)
242+
> [View usage metrics]
243243
244244
Explore samples that show how to integrate Azure AD with Azure Maps:
245245
> [!div class="nextstepaction"]
246-
> [Azure Maps samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples)
246+
> [Azure Maps samples]
247+
248+
[Acquire an access token]: ../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md
249+
[Assign a Key Vault access policy using the Azure portal]: ../key-vault/general/assign-access-policy-portal.md
250+
<!---[Assign delegated API permissions]: #assign-delegated-api-permissions-->
251+
<!--[Authentication scenarios for Azure AD]: ../active-directory/develop/authentication-vs-authorization.md-->
252+
[Authentication with Azure Maps]: azure-maps-authentication.md
253+
[Azure AD service principal]: ../active-directory/fundamentals/service-accounts-principal.md
254+
[Azure Key Vault developer guide]: ../key-vault/general/developers-guide.md
255+
[Azure Maps samples]: https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples
256+
[Azure portal]: https://portal.azure.com
257+
[Create an Azure Key Vault]: ../key-vault/general/quick-create-portal.md
258+
[OAuth 2.0 client credentials flow on the Microsoft identity platform]: ../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#first-case-access-token-request-with-a-shared-secret
259+
[Postman]: https://www.postman.com
260+
[View usage metrics]: how-to-view-api-usage.md

0 commit comments

Comments
 (0)