You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Create an Azure Active Directory application and service principal that can access resources
17
17
18
-
In this article, you'll learn how to create a Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you register a new application in Azure AD, a service principal is automatically created for the app registration. The service principal is the app's identity in the Azure AD tenant. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to sign in with a user identity.
18
+
In this article, you'll learn how to create an Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you register a new application in Azure AD, a service principal is automatically created for the app registration. The service principal is the app's identity in the Azure AD tenant. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to sign in with a user identity.
19
19
20
20
In this article, you'll create a single tenant application in the Azure portal. This example is applicable for line-of-business applications used within one organization. You can also [use Azure PowerShell](howto-authenticate-service-principal-powershell.md) or the [Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli) to create a service principal.
21
21
@@ -121,7 +121,7 @@ If you choose not to use a certificate, you can create a new application secret.
121
121
122
122
Once you've saved the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You'll provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
123
123
124
-
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Copy the secret value because you can't retrieve it later.":::
124
+
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Screenshot showing the client secret.":::
Copy file name to clipboardExpand all lines: articles/data-factory/quickstart-create-data-factory-dot-net.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ The walkthrough in this article uses Visual Studio 2019. The procedures for Visu
33
33
34
34
From the sections in *How to: Use the portal to create an Azure AD application and service principal that can access resources*, follow the instructions to do these tasks:
35
35
36
-
1. In [Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal), create an application that represents the .NET application you are creating in this tutorial. For the sign-on URL, you can provide a dummy URL as shown in the article (`https://contoso.org/exampleapp`).
36
+
1. In [Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal), create an application that represents the .NET application you're creating in this tutorial. For the sign-on URL, you can provide a dummy URL as shown in the article (`https://contoso.org/exampleapp`).
37
37
2. In [Get values for signing in](../active-directory/develop/howto-create-service-principal-portal.md#sign-in-to-the-application), get the **application ID** and **tenant ID**, and note down these values that you use later in this tutorial.
38
38
3. In [Certificates and secrets](../active-directory/develop/howto-create-service-principal-portal.md#set-up-authentication), get the **authentication key**, and note down this value that you use later in this tutorial.
39
39
4. In [Assign the application to a role](../active-directory/develop/howto-create-service-principal-portal.md#assign-a-role-to-the-application), assign the application to the **Contributor** role at the subscription level so that the application can create data factories in the subscription.
@@ -50,7 +50,7 @@ Next, create a C# .NET console application in Visual Studio:
2. In the **Package Manager Console** pane, run the following commands to install packages. For more information, see the [Microsoft.Azure.Management.DataFactory nuget package](https://www.nuget.org/packages/Microsoft.Azure.Management.DataFactory/).
53
+
2. In the **Package Manager Console** pane, run the following commands to install packages. For more information, see the [Microsoft.Azure.Management.DataFactory NuGet package](https://www.nuget.org/packages/Microsoft.Azure.Management.DataFactory/).
@@ -41,7 +41,7 @@ This article talks about how to create an **Azure AD native application for end-
41
41
## End-user authentication
42
42
This authentication mechanism is the recommended approach if you want an end user to sign in to your application via Azure AD. Your application is then able to access Azure resources with the same level of access as the end user that logged in. Your end user needs to provide their credentials periodically in order for your application to maintain access.
43
43
44
-
The result of having the end-user signin is that your application is given an access token and a refresh token. The access token gets attached to each request made to Data Lake Storage Gen1 or Data Lake Analytics, and it is valid for one hour by default. The refresh token can be used to obtain a new access token, and it is valid for up to two weeks by default. You can use two different approaches for end-user signin.
44
+
The result of having the end-user sign-in is that your application is given an access token and a refresh token. The access token gets attached to each request made to Data Lake Storage Gen1 or Data Lake Analytics, and it's valid for one hour by default. The refresh token can be used to obtain a new access token, and it's valid for up to two weeks by default. You can use two different approaches for end-user sign-in.
45
45
46
46
### Using the OAuth 2.0 pop-up
47
47
Your application can trigger an OAuth 2.0 authorization pop-up, in which the end user can enter their credentials. This pop-up also works with the Azure AD Two-factor Authentication (2FA) process, if necessary.
@@ -52,7 +52,7 @@ Your application can trigger an OAuth 2.0 authorization pop-up, in which the end
52
52
>
53
53
54
54
### Directly passing in user credentials
55
-
Your application can directly provide user credentials to Azure AD. This method only works with organizational ID user accounts; it is not compatible with personal / “live ID” user accounts, including the accounts ending in @outlook.com or @live.com. Furthermore, this method is not compatible with user accounts that require Azure AD Two-factor Authentication (2FA).
55
+
Your application can directly provide user credentials to Azure AD. This method only works with organizational ID user accounts; it isn't compatible with personal / “live ID” user accounts, including the accounts ending in @outlook.com or @live.com. Furthermore, this method isn't compatible with user accounts that require Azure AD Two-factor Authentication (2FA).
56
56
57
57
### What do I need for this approach?
58
58
* Azure AD domain name. This requirement is already listed in the prerequisite of this article.
@@ -77,9 +77,9 @@ See [Get the application ID](../active-directory/develop/howto-create-service-pr
77
77
78
78
To retrieve the redirect URI, do the following steps.
79
79
80
-
1. From the Azure portal, select **Azure Active Directory**, click**App registrations**, and then find and click the Azure AD native application that you created.
80
+
1. From the Azure portal, select **Azure Active Directory**, select**App registrations**, and then find and select the Azure AD native application that you created.
81
81
82
-
2. From the **Settings** blade for the application, click**Redirect URIs**.
82
+
2. From the **Settings** blade for the application, select**Redirect URIs**.
@@ -88,21 +88,21 @@ To retrieve the redirect URI, do the following steps.
88
88
89
89
## Step 3: Set permissions
90
90
91
-
1. From the Azure portal, select **Azure Active Directory**, click**App registrations**, and then find and click the Azure AD native application that you created.
91
+
1. From the Azure portal, select **Azure Active Directory**, select**App registrations**, and then find and select the Azure AD native application that you created.
92
92
93
-
2. From the **Settings** blade for the application, click**Required permissions**, and then click**Add**.
93
+
2. From the **Settings** blade for the application, select**Required permissions**, and then select**Add**.
94
94
95
95

96
96
97
-
3. In the **Add API Access** blade, click**Select an API**, click**Azure Data Lake**, and then click**Select**.
97
+
3. In the **Add API Access** blade, select**Select an API**, select**Azure Data Lake**, and then select**Select**.
98
98
99
99

100
100
101
-
4. In the **Add API Access** blade, click**Select permissions**, select the check box to give **Full access to Data Lake Store**, and then click**Select**.
101
+
4. In the **Add API Access** blade, select**Select permissions**, select the check box to give **Full access to Data Lake Store**, and then select**Select**.
102
102
103
103

104
104
105
-
Click**Done**.
105
+
Select**Done**.
106
106
107
107
5. Repeat the last two steps to grant permissions for **Windows Azure Service Management API** as well.
0 commit comments