You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-configure-postman.md
+7-37Lines changed: 7 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
7
7
ms.service: digital-twins
8
8
services: digital-twins
9
9
ms.topic: conceptual
10
-
ms.date: 01/10/2020
10
+
ms.date: 02/03/2020
11
11
---
12
12
13
13
# How to configure Postman for Azure Digital Twins
@@ -28,45 +28,17 @@ Through the Postman client, solutions developers can specify the kind of HTTP re
28
28
29
29
## Configure Azure Active Directory to use the OAuth 2.0 implicit grant flow
30
30
31
-
Configure yourAzure Active Directory app to use the OAuth 2.0 implicit grant flow.
31
+
1. Follow the steps in [the Quickstart](quickstart-view-occupancy-dotnet.md#set-permissions-for-your-app) to create and configure an Azure Active Directory application. Alternatively, you can reuse an existing app registration.
32
32
33
-
1. Open the **API permissions** pane for your app registration. Select **Add a permission** button. In the **Request API permissions** pane, select the **APIs my organization uses** tab, and then search for:
34
-
35
-
1.`Azure Digital Twins`. Select the **Azure Digital Twins** API.
36
-
37
-
[](../../includes/media/digital-twins-permissions/aad-aap-search-api-dt.png#lightbox)
38
-
39
-
1. Alternatively, search for `Azure Smart Spaces Service`. Select the **Azure Smart Spaces Service** API.
40
-
41
-
[](../../includes/media/digital-twins-permissions/aad-app-search-api.png#lightbox)
42
-
43
-
> [!IMPORTANT]
44
-
> The Azure AD API name and ID that will appear depends on your tenant:
45
-
> * Test tenant and customer accounts should search for `Azure Digital Twins`.
46
-
> * Other Microsoft accounts should search for `Azure Smart Spaces Service`.
47
-
48
-
1. The selected API shows up as **Azure Digital Twins** in the same **Request API permissions** pane. Select the **Read (1)** drop down, and then select **Read.Write** checkbox. Select the **Add permissions** button.
49
-
50
-
[](../../includes/media/digital-twins-permissions/aad-app-req-permissions.png#lightbox)
51
-
52
-
1. Depending on your organization's settings, you might need to take additional steps to grant admin access to this API. Contact your administrator for more information. Once the admin access is approved, the **ADMIN CONSENT REQUIRED** column in the **API permissions** pane will show similar to the following for your APIs:
1. Configure a second **Redirect URI** to `https://www.getpostman.com/oauth2/callback`.
33
+
1. Add a **Redirect URI** to `https://www.getpostman.com/oauth2/callback`.
57
34
58
35
[](media/how-to-configure-postman/authentication-redirect-uri.png#lightbox)
59
36
60
-
1. To make sure that [the app is registered as a **public client**](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration), open the **Authentication** pane for your app registration, and scroll down in that pane. In the **Default client type** section, choose **Yes** for **Treat application as a public client**, and hit **Save**.
61
-
62
-
Check **Access tokens** to enable the **oauth2AllowImplicitFlow** setting in your Manifest.json.
37
+
1. Select the **Implicit grant** > **Access tokens** check box to allow the OAuth 2.0 implicit grant flow to be used.
1. Copy and keep the **Application ID** of your Azure Active Directory app. It's used in the steps that follow.
67
-
68
-
[](../../includes/media//digital-twins-permissions/aad-app-reg-app-id.png#lightbox)
39
+
1. Select **Configure**, then **Save**.
69
40
41
+
1. Copy the **Client ID** of your Azure Active Directory app.
70
42
71
43
## Obtain an OAuth 2.0 token
72
44
@@ -86,15 +58,13 @@ Set up and configure Postman to obtain an Azure Active Directory token. Afterwar
86
58
87
59
1. Go to [www.getpostman.com](https://www.getpostman.com/) to download the app.
88
60
89
-
1. Open the Postman app and click new | Create new, and select Request. Enter a Request name. Select a collection or folder to save it to, and click Save.
90
-
91
61
1. We want to make GET request. Select the **Authorization** tab, select OAuth 2.0, and then select **Get New Access Token**.
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-use-swagger.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
7
7
ms.service: digital-twins
8
8
services: digital-twins
9
9
ms.topic: conceptual
10
-
ms.date: 01/21/2020
10
+
ms.date: 02/03/2020
11
11
ms.custom: seodec18
12
12
---
13
13
@@ -90,9 +90,9 @@ The examples also include error codes to help debug or improve failing tests.
90
90
> [!NOTE]
91
91
> * The user principal that created the Azure Digital Twins resource will have a Space Administrator role assignment and will be able to create additional role assignments for other users. Such users and their roles can be authorized to call the APIs.
92
92
93
-
1. Follow the steps in [this quickstart](https://docs.microsoft.com/azure/active-directory/develop/quickstart-v1-integrate-apps-with-azure-ad) to create and configure an Azure AD application. Alternatively, you can reuse an existing app registration.
93
+
1. Follow the steps in [the Quickstart](quickstart-view-occupancy-dotnet.md#set-permissions-for-your-app) to create and configure an Azure Active Directory application. Alternatively, you can reuse an existing app registration.
94
94
95
-
1. Add the following **Redirect url** to your Azure AD app registration:
95
+
1. Add the following **Redirect URI** to your Azure Active Directory app registration:
96
96
97
97
[](media/how-to-use-swagger/swagger-aad-redirect-url-registration.png#lightbox)
98
98
@@ -103,7 +103,9 @@ The examples also include error codes to help debug or improve failing tests.
103
103
|---------|---------|---------|
104
104
| YOUR_SWAGGER_URL | Your Management REST API documentation URL found in the portal | `https://yourDigitalTwinsName.yourLocation.azuresmartspaces.net/management/swagger` |
105
105
106
-
1. Copy the **Client ID** of your Azure AD app.
106
+
1. Select the **Implicit grant** > **Access tokens** check box to allow the OAuth 2.0 implicit grant flow to be used. Select **Configure**, then **Save**.
107
+
108
+
1. Copy the **Client ID** of your Azure Active Directory app.
107
109
108
110
After completing the Azure Active Directory registration:
1.To make sure that [the app is registered as a **public client**](https://docs.microsoft.com/azure/active-directory/develop/scenario-desktop-app-registration), open the **Authentication**pane for your app registration, and scroll down in that pane. In the **Default client type** section, choose **Yes** for **Treat application as a public client**, and hit **Save**.
29
+
1.The **Authentication**blade specifies important authentication configuration settings.
30
30
31
-
1.**Redirect URIs** must match the address supplied by the authentication request:
31
+
1. Add **Redirect URIs** and configure **Access Tokens** by selecting **+ Add a platform**.
32
+
33
+
1. Determine whether the app is a **public client** or not by selecting **Yes** or **No**.
34
+
35
+
1. Verify which accounts and tenants are supported.
32
36
33
-
* For apps hosted in a local development environment, select **Public client (mobile & desktop)**. Make sure to set the **Default client type** to yes.
34
-
* For Single-Page apps hosted on Azure App Service, select **Web**.
1. After selecting the appropriate platform, configure your **Redirect URIs** and **Access Tokens** in the side panel to the right of the user interface.
40
+
41
+
1.**Redirect URIs** must match the address supplied by the authentication request:
35
42
36
-
Select **Public client (mobile & desktop)** and enter `http://localhost:8080/`.
43
+
* For apps hosted in a local development environment, select **Public client (mobile & desktop)**. Make sure to set **public client** to **Yes**.
44
+
* For Single-Page Apps hosted on Azure App Service, select **Web**.
1. Open the **Overview** pane of your registered app, and copy the values of the following entities to a temporary file. You'll use these values to configure your sample application in the following sections.
0 commit comments