You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-concept-authorize-azure-active-directory.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ When a security principal tries to access an Azure SignalR Service resource, the
33
33
34
34
When you use an access key, the key is shared between your app server (or function app) and the Azure SignalR Service resource. Azure SignalR Service authenticates the client connection request by using the shared key.
35
35
36
-
When you use Microsoft Entra ID, there is no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
36
+
When you use Microsoft Entra ID, there's no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
37
37
38
38
1. The security principal requires an OAuth 2.0 token from Microsoft Entra ID to authenticate itself.
39
39
2. The security principal calls the SignalR authentication API to get a temporary access key.
@@ -46,17 +46,17 @@ The workflow is built in the [Azure SignalR Service SDK for app servers](https:/
46
46
47
47
### Cross tenant access when using Microsoft Entra ID
48
48
49
-
In some cases, your server and your Azure SignalR resource may not in the same tenant for security concerns.
49
+
In some cases, your server and your Azure SignalR resource may not be in the same tenant due to security concerns.
50
50
51
-
A [Multi-tenant applications](/entra/identity-platform/single-and-multi-tenant-apps#best-practices-for-multitenant-apps) could help you in this scenario.
51
+
A [multitenant applications](/entra/identity-platform/single-and-multi-tenant-apps#best-practices-for-multitenant-apps) could help you in this scenario.
52
52
53
53
If you've already registered a single-tenant app, see [convert your single-tenant app to multitenant](/entra/identity-platform/howto-convert-app-to-be-multi-tenant).
54
54
55
-
Once you have registered the multi-tenant application in your `tenantA`, you should provision it as an enterprise application in your `tenantB`.
55
+
Once you have registered the multitenant application in your `tenantA`, you should provision it as an enterprise application in your `tenantB`.
56
56
57
57
[Create an enterprise application from a multitenant application in Microsoft Entra ID](/entra/identity/enterprise-apps/create-service-principal-cross-tenant?pivots=msgraph-powershell)
58
58
59
-
The application registered in your `tenantA` and the enterprise application provisioned in your `tenantB` share the same Application (client) id.
59
+
The application registered in your `tenantA` and the enterprise application provisioned in your `tenantB` share the same Application (client) ID.
0 commit comments