Skip to content

Commit c325bbe

Browse files
authored
323
1 parent be357f9 commit c325bbe

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/azure-signalr/signalr-concept-authorize-azure-active-directory.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ When a security principal tries to access an Azure SignalR Service resource, the
3333

3434
When you use an access key, the key is shared between your app server (or function app) and the Azure SignalR Service resource. Azure SignalR Service authenticates the client connection request by using the shared key.
3535

36-
When you use Microsoft Entra ID, there is no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
36+
When you use Microsoft Entra ID, there's no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
3737

3838
1. The security principal requires an OAuth 2.0 token from Microsoft Entra ID to authenticate itself.
3939
2. The security principal calls the SignalR authentication API to get a temporary access key.
@@ -46,17 +46,17 @@ The workflow is built in the [Azure SignalR Service SDK for app servers](https:/
4646

4747
### Cross tenant access when using Microsoft Entra ID
4848

49-
In some cases, your server and your Azure SignalR resource may not in the same tenant for security concerns.
49+
In some cases, your server and your Azure SignalR resource may not be in the same tenant due to security concerns.
5050

51-
A [Multi-tenant applications](/entra/identity-platform/single-and-multi-tenant-apps#best-practices-for-multitenant-apps) could help you in this scenario.
51+
A [multitenant applications](/entra/identity-platform/single-and-multi-tenant-apps#best-practices-for-multitenant-apps) could help you in this scenario.
5252

5353
If you've already registered a single-tenant app, see [convert your single-tenant app to multitenant](/entra/identity-platform/howto-convert-app-to-be-multi-tenant).
5454

55-
Once you have registered the multi-tenant application in your `tenantA`, you should provision it as an enterprise application in your `tenantB`.
55+
Once you have registered the multitenant application in your `tenantA`, you should provision it as an enterprise application in your `tenantB`.
5656

5757
[Create an enterprise application from a multitenant application in Microsoft Entra ID](/entra/identity/enterprise-apps/create-service-principal-cross-tenant?pivots=msgraph-powershell)
5858

59-
The application registered in your `tenantA` and the enterprise application provisioned in your `tenantB` share the same Application (client) id.
59+
The application registered in your `tenantA` and the enterprise application provisioned in your `tenantB` share the same Application (client) ID.
6060

6161
## Assign Azure roles for access rights
6262

0 commit comments

Comments
 (0)