You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-authorize-application.md
+34-34Lines changed: 34 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Authorize requests to Azure SignalR Service resources with Microsoft Entr
3
3
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra applications.
4
4
author: vicancy
5
5
ms.author: lianwei
6
-
ms.date: 02/03/2023
6
+
ms.date: /2023
7
7
ms.service: azure-signalr-service
8
8
ms.topic: how-to
9
9
ms.devlang: csharp
@@ -12,41 +12,41 @@ ms.custom: subject-rbac-steps
12
12
13
13
# Authorize requests to Azure SignalR Service resources with Microsoft Entra applications
14
14
15
-
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Microsoft Entra applications](../../entra/identity-platform/app-objects-and-service-principals).
15
+
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Microsoft Entra applications](/entra/identity-platform/app-objects-and-service-principals).
16
16
17
17
This article shows how to configure your Azure SignalR Service resource and codes to authorize requests to the resource from a Microsoft Entra application.
18
18
19
19
## Register an application in Microsoft Entra ID
20
20
21
-
The first step is to [Register an application in Microsoft Entra ID](../../entra/identity-platform/quickstart-register-app):
21
+
The first step is to [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app):
22
22
23
23
After you register your application, you can find the **Application (client) ID** and **Directory (tenant) ID** values on the application's overview page. These GUIDs can be useful in the following steps.
24
24
25
-

25
+
![Screenshot of overview information for a registered application.]dia/signalr-howto-authorize-application/application-overview.png)
26
26
27
27
## Add credentials
28
28
29
29
After registering an app, you can add **certificates, client secrets (a string), or federated identity credentials** as credentials to your confidential client app registration. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime, and are used by confidential client applications that access a web API.
30
30
31
-
-[Add a certificate](../../entra/identity-platform/quickstart-register-app?tabs=certificate#add-credentials)
32
-
-[Add a client secret](../../entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
33
-
-[Add a federated credential](../../entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
31
+
-[Add a certificate](/entra/identity-platform/quickstart-register-app?tabs=certificate#add-credentials)
32
+
-[Add a client secret](/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
33
+
-[Add a federated credential](/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
34
34
35
35
36
36
## Add role assignments in the Azure portal
37
37
38
-
The following steps describe how to assign a SignalR App Server role to a service principal (application) over an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
38
+
The following steps describe how to assign a SignalR App Server role to a service principal (application) over an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](le-based-access-control/role-assignments-portal.yml).
39
39
40
40
> [!NOTE]
41
-
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../role-based-access-control/scope-overview.md).
41
+
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](le-based-access-control/scope-overview.md).
42
42
43
-
1. In the [Azure portal](https://portal.azure.com/), go to your Azure SignalR Service resource.
43
+
1. In the [Azure portal](httportal.azure.com/), go to your Azure SignalR Service resource.
44
44
45
45
1. Select **Access control (IAM)**.
46
46
47
47
1. Select **Add** > **Add role assignment**.
48
48
49
-
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows the page for access control and selections for adding a role assignment.":::
49
+
:::image type="content" source=usable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows the page for access control and selections for adding a role assignment.":::
50
50
51
51
1. On the **Role** tab, select **SignalR App Server**.
52
52
@@ -61,15 +61,15 @@ The following steps describe how to assign a SignalR App Server role to a servic
61
61
62
62
To learn more about how to assign and manage Azure roles, see these articles:
63
63
64
-
-[Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml)
65
-
-[Assign Azure roles using the REST API](../role-based-access-control/role-assignments-rest.md)
66
-
-[Assign Azure roles using Azure PowerShell](../role-based-access-control/role-assignments-powershell.md)
67
-
-[Assign Azure roles using the Azure CLI](../role-based-access-control/role-assignments-cli.md)
68
-
-[Assign Azure roles using Azure Resource Manager templates](../role-based-access-control/role-assignments-template.md)
64
+
-[Assign Azure roles using the Azure portal](le-based-access-control/role-assignments-portal.yml)
65
+
-[Assign Azure roles using the REST API](le-based-access-control/role-assignments-rest.md)
66
+
-[Assign Azure roles using Azure PowerShell](le-based-access-control/role-assignments-powershell.md)
67
+
-[Assign Azure roles using the Azure CLI](le-based-access-control/role-assignments-cli.md)
68
+
-[Assign Azure roles using Azure Resource Manager templates](le-based-access-control/role-assignments-template.md)
69
69
70
70
## Microsoft.Azure.SignalR app server SDK for C#
71
71
72
-
[Azure SignalR server SDK for C#](https://github.com/Azure/azure-signalr)
72
+
[Azure SignalR server SDK for C#](httpithub.com/Azure/azure-signalr)
73
73
74
74
### Use Microsoft Entra application with certificate
> Configure an application to trust a managed identity is a preview feature.
103
-
> To learn more about it, see [Configure an application to trust a managed identity (preview)](../../entra/workload-id/workload-identity-federation-config-app-trust-managed-identity).
103
+
> To learn more about it, see [Configure an application to trust a managed identity (preview)](/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity).
## Azure SignalR Service bindings in Azure Functions
146
146
147
-
Azure SignalR Service bindings in Azure Functions use [application settings](../azure-functions/functions-how-to-use-azure-function-app-settings.md) in the portal or [local.settings.json](../azure-functions/functions-develop-local.md#local-settings-file) locally to configure Microsoft Entra application identities to access your Azure SignalR Service resources.
147
+
Azure SignalR Service bindings in Azure Functions use [application settings](ure-functions/functions-how-to-use-azure-function-app-settings.md) in the portal or [local.settings.json](../azure-functions/functions-develop-local.md#local-settings-file) locally to configure Microsoft Entra application identities to access your Azure SignalR Service resources.
148
148
149
-
First, you need to specify the service URI of Azure SignalR Service. The key of the service URI is `serviceUri`. It starts with a connection name prefix (which defaults to `AzureSignalRConnectionString`) and a separator. The separator is an underscore (`__`) in the Azure portal and a colon (`:`) in the *local.settings.json* file. You can customize the connection name by using the binding property [`ConnectionStringSetting`](../azure-functions/functions-bindings-signalr-service.md). Continue reading to find the sample.
149
+
First, you need to specify the service URI of Azure SignalR Service. The key of the service URI is `serviceUri`. It starts with a connection name prefix (which defaults to `AzureSignalRConnectionString`) and a separator. The separator is an underscore (`__`) in the Azure portal and a colon (`:`) in the *local.settings.json* file. You can customize the connection name by using the binding property [`ConnectionStringSetting`](ure-functions/functions-bindings-signalr-service.md). Continue reading to find the sample.
150
150
151
151
Then, you choose whether to configure your Microsoft Entra application identity in [predefined environment variables](#configure-an-identity-in-predefined-environment-variables) or in [SignalR-specified variables](#configure-an-identity-in-signalr-specified-variables).
152
152
153
153
### Configure an identity in predefined environment variables
154
154
155
-
See [Environment variables](/dotnet/api/overview/azure/identity-readme#environment-variables) for the list of predefined environment variables. When you have multiple services, we recommend that you use the same application identity, so that you don't need to configure the identity for each service. Other services might also use these environment variables, based on the settings of those services.
155
+
See [Environment variablestnet/api/overview/azure/identity-readme#environment-variables) for the list of predefined environment variables. When you have multiple services, we recommend that you use the same application identity, so that you don't need to configure the identity for each service. Other services might also use these environment variables, based on the settings of those services.
156
156
157
157
For example, to use client secret credentials, configure the identity as follows in the *local.settings.json* file:
0 commit comments