Skip to content

Commit caa2787

Browse files
committed
address blocking issues
1 parent 6016ac8 commit caa2787

11 files changed

+62
-62
lines changed

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
11-
ms.date: 01/31/2023
11+
ms.date: 02/01/2023
1212
ms.author: cwerner
1313
ms.custom: aaddev, identityplatformtop40, subject-rbac-steps
1414
---
1515

1616
# Create an Azure Active Directory application and service principal that can access resources
1717

18-
In this article, you'll learn how to create a Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you register a new application in Azure AD, a service principal is automatically created for the app registration. The service principal is the app's identity in the Azure AD tenant. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to sign in with a user identity.
18+
In this article, you'll learn how to create an Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you register a new application in Azure AD, a service principal is automatically created for the app registration. The service principal is the app's identity in the Azure AD tenant. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to sign in with a user identity.
1919

2020
In this article, you'll create a single tenant application in the Azure portal. This example is applicable for line-of-business applications used within one organization. You can also [use Azure PowerShell](howto-authenticate-service-principal-powershell.md) or the [Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli) to create a service principal.
2121

@@ -121,7 +121,7 @@ If you choose not to use a certificate, you can create a new application secret.
121121

122122
Once you've saved the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You'll provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
123123

124-
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Copy the secret value because you can't retrieve it later.":::
124+
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Screenshot showing the client secret.":::
125125

126126
## Configure access policies on resources
127127

articles/data-factory/quickstart-create-data-factory-dot-net.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The walkthrough in this article uses Visual Studio 2019. The procedures for Visu
3333

3434
From the sections in *How to: Use the portal to create an Azure AD application and service principal that can access resources*, follow the instructions to do these tasks:
3535

36-
1. In [Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal), create an application that represents the .NET application you are creating in this tutorial. For the sign-on URL, you can provide a dummy URL as shown in the article (`https://contoso.org/exampleapp`).
36+
1. In [Create an Azure Active Directory application](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal), create an application that represents the .NET application you're creating in this tutorial. For the sign-on URL, you can provide a dummy URL as shown in the article (`https://contoso.org/exampleapp`).
3737
2. In [Get values for signing in](../active-directory/develop/howto-create-service-principal-portal.md#sign-in-to-the-application), get the **application ID** and **tenant ID**, and note down these values that you use later in this tutorial.
3838
3. In [Certificates and secrets](../active-directory/develop/howto-create-service-principal-portal.md#set-up-authentication), get the **authentication key**, and note down this value that you use later in this tutorial.
3939
4. In [Assign the application to a role](../active-directory/develop/howto-create-service-principal-portal.md#assign-a-role-to-the-application), assign the application to the **Contributor** role at the subscription level so that the application can create data factories in the subscription.
@@ -50,7 +50,7 @@ Next, create a C# .NET console application in Visual Studio:
5050
## Install NuGet packages
5151

5252
1. Select **Tools** > **NuGet Package Manager** > **Package Manager Console**.
53-
2. In the **Package Manager Console** pane, run the following commands to install packages. For more information, see the [Microsoft.Azure.Management.DataFactory nuget package](https://www.nuget.org/packages/Microsoft.Azure.Management.DataFactory/).
53+
2. In the **Package Manager Console** pane, run the following commands to install packages. For more information, see the [Microsoft.Azure.Management.DataFactory NuGet package](https://www.nuget.org/packages/Microsoft.Azure.Management.DataFactory/).
5454

5555
```powershell
5656
Install-Package Microsoft.Azure.Management.DataFactory

articles/data-lake-store/data-lake-store-end-user-authenticate-using-active-directory.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This article talks about how to create an **Azure AD native application for end-
2828
## Prerequisites
2929
* An Azure subscription. See [Get Azure free trial](https://azure.microsoft.com/pricing/free-trial/).
3030

31-
* Your subscription ID. You can retrieve it from the Azure portal. For example, it is available from the Data Lake Storage Gen1 account blade.
31+
* Your subscription ID. You can retrieve it from the Azure portal. For example, it's available from the Data Lake Storage Gen1 account blade.
3232

3333
![Get subscription ID](./media/data-lake-store-end-user-authenticate-using-active-directory/get-subscription-id.png)
3434

@@ -41,7 +41,7 @@ This article talks about how to create an **Azure AD native application for end-
4141
## End-user authentication
4242
This authentication mechanism is the recommended approach if you want an end user to sign in to your application via Azure AD. Your application is then able to access Azure resources with the same level of access as the end user that logged in. Your end user needs to provide their credentials periodically in order for your application to maintain access.
4343

44-
The result of having the end-user sign in is that your application is given an access token and a refresh token. The access token gets attached to each request made to Data Lake Storage Gen1 or Data Lake Analytics, and it is valid for one hour by default. The refresh token can be used to obtain a new access token, and it is valid for up to two weeks by default. You can use two different approaches for end-user sign in.
44+
The result of having the end-user sign-in is that your application is given an access token and a refresh token. The access token gets attached to each request made to Data Lake Storage Gen1 or Data Lake Analytics, and it's valid for one hour by default. The refresh token can be used to obtain a new access token, and it's valid for up to two weeks by default. You can use two different approaches for end-user sign-in.
4545

4646
### Using the OAuth 2.0 pop-up
4747
Your application can trigger an OAuth 2.0 authorization pop-up, in which the end user can enter their credentials. This pop-up also works with the Azure AD Two-factor Authentication (2FA) process, if necessary.
@@ -52,7 +52,7 @@ Your application can trigger an OAuth 2.0 authorization pop-up, in which the end
5252
>
5353
5454
### Directly passing in user credentials
55-
Your application can directly provide user credentials to Azure AD. This method only works with organizational ID user accounts; it is not compatible with personal / “live ID” user accounts, including the accounts ending in @outlook.com or @live.com. Furthermore, this method is not compatible with user accounts that require Azure AD Two-factor Authentication (2FA).
55+
Your application can directly provide user credentials to Azure AD. This method only works with organizational ID user accounts; it isn't compatible with personal / “live ID” user accounts, including the accounts ending in @outlook.com or @live.com. Furthermore, this method isn't compatible with user accounts that require Azure AD Two-factor Authentication (2FA).
5656

5757
### What do I need for this approach?
5858
* Azure AD domain name. This requirement is already listed in the prerequisite of this article.
@@ -77,9 +77,9 @@ See [Get the application ID](../active-directory/develop/howto-create-service-pr
7777

7878
To retrieve the redirect URI, do the following steps.
7979

80-
1. From the Azure portal, select **Azure Active Directory**, click **App registrations**, and then find and click the Azure AD native application that you created.
80+
1. From the Azure portal, select **Azure Active Directory**, select **App registrations**, and then find and select the Azure AD native application that you created.
8181

82-
2. From the **Settings** blade for the application, click **Redirect URIs**.
82+
2. From the **Settings** blade for the application, select **Redirect URIs**.
8383

8484
![Get Redirect URI](./media/data-lake-store-end-user-authenticate-using-active-directory/azure-active-directory-redirect-uri.png)
8585

@@ -88,21 +88,21 @@ To retrieve the redirect URI, do the following steps.
8888

8989
## Step 3: Set permissions
9090

91-
1. From the Azure portal, select **Azure Active Directory**, click **App registrations**, and then find and click the Azure AD native application that you created.
91+
1. From the Azure portal, select **Azure Active Directory**, select **App registrations**, and then find and select the Azure AD native application that you created.
9292

93-
2. From the **Settings** blade for the application, click **Required permissions**, and then click **Add**.
93+
2. From the **Settings** blade for the application, select **Required permissions**, and then select **Add**.
9494

9595
![Screenshot of the Settings blade with the Redirect U R I option called out and the Redirect U R I blade with the actual U R I called out.](./media/data-lake-store-end-user-authenticate-using-active-directory/aad-end-user-auth-set-permission-1.png)
9696

97-
3. In the **Add API Access** blade, click **Select an API**, click **Azure Data Lake**, and then click **Select**.
97+
3. In the **Add API Access** blade, select **Select an API**, select **Azure Data Lake**, and then select **Select**.
9898

9999
![Screenshot of the Add API access blade with the Select an API option called out and the Select an API blade with the Azure Data Lake option and the Select option called out.](./media/data-lake-store-end-user-authenticate-using-active-directory/aad-end-user-auth-set-permission-2.png)
100100

101-
4. In the **Add API Access** blade, click **Select permissions**, select the check box to give **Full access to Data Lake Store**, and then click **Select**.
101+
4. In the **Add API Access** blade, select **Select permissions**, select the check box to give **Full access to Data Lake Store**, and then select **Select**.
102102

103103
![Screenshot of the Add API access blade with the Select permissions option called out and the Enable Access blade with the Have full access to the Azure Data Lake service option and the Select option called out.](./media/data-lake-store-end-user-authenticate-using-active-directory/aad-end-user-auth-set-permission-3.png)
104104

105-
Click **Done**.
105+
Select **Done**.
106106

107107
5. Repeat the last two steps to grant permissions for **Windows Azure Service Management API** as well.
108108

0 commit comments

Comments
 (0)