You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/concept-azure-ad-authorization.md
+17-12Lines changed: 17 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Authorize access with Azure Active Directory for Azure Web PubSub
3
-
description: This article provides information on authorizing access to Azure Web PubSub Service resources using Azure Active Directory.
3
+
description: This article provides information on authorizing access to Azure Web PubSub Service resources using Azure Active Directory.
4
4
author: terencefan
5
5
6
6
ms.author: tefa
@@ -18,7 +18,7 @@ By utilizing role-based access control (RBAC) within Azure AD, permissions can b
18
18
Using Azure AD for authorization of Web PubSub requests offers improved security and ease of use compared to Access Key authorization. Microsoft recommends utilizing Azure AD authorization with Web PubSub resources when possible to ensure access with the minimum necessary privileges.
19
19
20
20
<aid="security-principal"></a>
21
-
*[1] security principal: a user/resource group, an application, or a service principal such as system-assigned identities and user-assigned identities.*
21
+
_[1] security principal: a user/resource group, an application, or a service principal such as system-assigned identities and user-assigned identities._
22
22
23
23
## Overview of Azure AD for Web PubSub
24
24
@@ -49,49 +49,54 @@ Before assigning an Azure RBAC role to a security principal, it's important to i
49
49
50
50
You can scope access to Azure SignalR resources at the following levels, beginning with the narrowest scope:
51
51
52
-
-**An individual resource.**
52
+
-**An individual resource.**
53
53
54
54
At this scope, a role assignment applies to only the target resource.
55
55
56
-
-**A resource group.**
56
+
-**A resource group.**
57
57
58
58
At this scope, a role assignment applies to all of the resources in the resource group.
59
59
60
60
-**A subscription.**
61
61
62
62
At this scope, a role assignment applies to all of the resources in all of the resource groups in the subscription.
63
63
64
-
-**A management group.**
64
+
-**A management group.**
65
65
66
66
At this scope, a role assignment applies to all of the resources in all of the resource groups in all of the subscriptions in the management group.
67
67
68
68
## Azure built-in roles for Web PubSub resources.
69
69
70
70
-`Web PubSub Service Owner`
71
71
72
-
Full access to data-plane permissions, including read/write REST APIs and Auth APIs.
72
+
Full access to data-plane permissions, including read/write REST APIs and Auth APIs.
73
73
74
-
This role is the most common used for building an upstream server.
74
+
This role is the most common used for building an upstream server.
75
75
76
76
-`Web PubSub Service Reader`
77
77
78
-
Use to grant read-only REST APIs permissions to Web PubSub resources.
78
+
Use to grant read-only REST APIs permissions to Web PubSub resources.
79
79
80
-
It's used when you'd like to write a monitoring tool that calling **ONLY** Web PubSub data-plane **READONLY** REST APIs.
80
+
It's used when you'd like to write a monitoring tool that calling **ONLY** Web PubSub data-plane **READONLY** REST APIs.
81
81
82
82
## Next steps
83
83
84
84
To learn how to create an Azure application and use Azure AD auth, see
85
+
85
86
-[Authorize request to Web PubSub resources with Azure AD from Azure applications](howto-authorize-from-application.md)
86
87
87
88
To learn how to configure a managed identity and use Azure AD auth, see
89
+
88
90
-[Authorize request to Web PubSub resources with Azure AD from managed identities](howto-authorize-from-managed-identity.md)
89
91
90
-
To learn more about roles and role assignments, see
92
+
To learn more about roles and role assignments, see
93
+
91
94
-[What is Azure role-based access control](../role-based-access-control/overview.md)
92
95
93
-
To learn how to create custom roles, see
96
+
To learn how to create custom roles, see
97
+
94
98
-[Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
95
99
96
100
To learn how to use only Azure AD authentication, see
97
-
-[Disable local authentication](./howto-disable-local-auth.md)
101
+
102
+
-[Disable local authentication](./howto-disable-local-auth.md)
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-authorize-from-application.md
+23-18Lines changed: 23 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.topic: conceptual
11
11
12
12
# Authorize request to Web PubSub resources with Azure AD from Azure applications
13
13
14
-
Azure Web PubSub Service supports Azure Active Directory (Azure AD) authorizing requests from [Azure applications](../active-directory/develop/app-objects-and-service-principals.md).
14
+
Azure Web PubSub Service supports Azure Active Directory (Azure AD) authorizing requests from [Azure applications](../active-directory/develop/app-objects-and-service-principals.md).
15
15
16
16
This article shows how to configure your Web PubSub resource and codes to authorize the request to a Web PubSub resource from an Azure application.
17
17
@@ -23,7 +23,7 @@ The first step is to register an Azure application.
23
23
2. Under **Manage** section, select **App registrations**.
24
24
3. Click **New registration**.
25
25
26
-

26
+

27
27
28
28
4. Enter a display **Name** for your application.
29
29
5. Click **Register** to confirm the register.
@@ -33,6 +33,7 @@ Once you have your application registered, you can find the **Application (clien
33
33

34
34
35
35
To learn more about registering an application, see
36
+
36
37
-[Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
37
38
38
39
## Add credentials
@@ -45,11 +46,12 @@ The application requires a client secret to prove its identity when requesting a
45
46
46
47
1. Under **Manage** section, select **Certificates & secrets**
47
48
1. On the **Client secrets** tab, click **New client secret**.
48
-

49
+

49
50
1. Enter a **description** for the client secret, and choose a **expire time**.
50
-
1. Copy the value of the **client secret** and then paste it to a secure location.
51
-
> [!NOTE]
52
-
> The secret will display only once.
51
+
1. Copy the value of the **client secret** and then paste it to a secure location.
52
+
> [!NOTE]
53
+
> The secret will display only once.
54
+
53
55
### Certificate
54
56
55
57
You can also upload a certification instead of creating a client secret.
@@ -62,10 +64,11 @@ To learn more about adding credentials, see
62
64
63
65
## Add role assignments on Azure portal
64
66
65
-
This sample shows how to assign a `Web PubSub Service Owner` role to a service principal (application) over a Web PubSub resource.
67
+
This sample shows how to assign a `Web PubSub Service Owner` role to a service principal (application) over a Web PubSub resource.
66
68
67
69
> [!Note]
68
70
> A role can be assigned to any scope, including management group, subscription, resource group or a single resource. To learn more about scope, see [Understand scope for Azure RBAC](../role-based-access-control/scope-overview.md)
71
+
69
72
1. On the [Azure portal](https://portal.azure.com/), navigate to your Web PubSub resource.
70
73
71
74
1. Click **Access Control (IAM)** to display access control settings for the Azure Web PubSub.
@@ -88,26 +91,28 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a service p
88
91
89
92
1. Click **Select Members**
90
93
91
-
3. Search for and select the application that you would like to assign the role to.
94
+
1. Search for and select the application that you would like to assign the role to.
92
95
93
96
1. Click **Select** to confirm the selection.
94
97
95
-
4. Click **Next**.
98
+
1. Click **Next**.
96
99
97
100

98
101
99
-
5. Click **Review + assign** to confirm the change.
102
+
1. Click **Review + assign** to confirm the change.
100
103
101
104
> [!IMPORTANT]
102
105
> Azure role assignments may take up to 30 minutes to propagate.
103
-
To learn more about how to assign and manage Azure role assignments, see these articles:
106
+
> To learn more about how to assign and manage Azure role assignments, see these articles:
107
+
104
108
-[Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md)
105
109
-[Assign Azure roles using the REST API](../role-based-access-control/role-assignments-rest.md)
106
110
-[Assign Azure roles using Azure PowerShell](../role-based-access-control/role-assignments-powershell.md)
107
111
-[Assign Azure roles using Azure CLI](../role-based-access-control/role-assignments-cli.md)
108
112
-[Assign Azure roles using Azure Resource Manager templates](../role-based-access-control/role-assignments-template.md)
109
113
110
114
## Use Postman to get the Azure AD token
115
+
111
116
1. Launch Postman
112
117
113
118
2. For the method, select **GET**.
@@ -119,15 +124,15 @@ To learn more about how to assign and manage Azure role assignments, see these a
119
124

120
125
121
126
5. Switch to the **Body** tab, and add the following keys and values.
122
-
1. Select **x-www-form-urlencoded**.
123
-
2. Add `grant_type` key, and type `client_credentials` for the value.
124
-
3. Add `client_id` key, and paste the value of **Application (client) ID** in the **Overview** tab of the application you created earlier.
125
-
4. Add `client_secret` key, and paste the value of client secret you noted down earlier.
126
-
5. Add `resource` key, and type `https://webpubsub.azure.com` for the value.
127
+
1. Select **x-www-form-urlencoded**.
128
+
2. Add `grant_type` key, and type `client_credentials` for the value.
129
+
3. Add `client_id` key, and paste the value of **Application (client) ID** in the **Overview** tab of the application you created earlier.
130
+
4. Add `client_secret` key, and paste the value of client secret you noted down earlier.
131
+
5. Add `resource` key, and type `https://webpubsub.azure.com` for the value.
127
132
128
133

129
134
130
-
6. Select **Send** to send the request to get the token. You see the token in the `access_token` field.
135
+
6. Select **Send** to send the request to get the token. You see the token in the `access_token` field.
131
136
132
137

133
138
@@ -146,4 +151,4 @@ See the following related articles:
146
151
147
152
-[Overview of Azure AD for Web PubSub](concept-azure-ad-authorization.md)
148
153
-[Authorize request to Web PubSub resources with Azure AD from managed identities](howto-authorize-from-managed-identity.md)
149
-
-[Disable local authentication](./howto-disable-local-auth.md)
154
+
-[Disable local authentication](./howto-disable-local-auth.md)
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-authorize-from-managed-identity.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,8 @@ ms.topic: conceptual
10
10
---
11
11
12
12
# Authorize request to Web PubSub resources with Azure AD from managed identities
13
-
Azure Web PubSub Service supports Azure Active Directory (Azure AD) authorizing requests from [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
13
+
14
+
Azure Web PubSub Service supports Azure Active Directory (Azure AD) authorizing requests from [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
14
15
15
16
This article shows how to configure your Web PubSub resource and codes to authorize the request to a Web PubSub resource from a managed identity.
16
17
@@ -27,6 +28,7 @@ This is an example for configuring `System-assigned managed identity` on a `Virt
27
28
1. Click the **Save** button to confirm the change.
28
29
29
30
### How to create user-assigned managed identities
31
+
30
32
-[Create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md#create-a-user-assigned-managed-identity)
31
33
32
34
### How to configure managed identities on other platforms
@@ -41,12 +43,13 @@ This is an example for configuring `System-assigned managed identity` on a `Virt
41
43
42
44
-[How to use managed identities for App Service and Azure Functions](../app-service/overview-managed-identity.md).
43
45
44
-
## Add role assignments on Azure portal
46
+
## Add role assignments on Azure portal
45
47
46
-
This sample shows how to assign a `Web PubSub Service Owner` role to a system-assigned identity over a Web PubSub resource.
48
+
This sample shows how to assign a `Web PubSub Service Owner` role to a system-assigned identity over a Web PubSub resource.
47
49
48
50
> [!Note]
49
51
> A role can be assigned to any scope, including management group, subscription, resource group or a single resource. To learn more about scope, see [Understand scope for Azure RBAC](../role-based-access-control/scope-overview.md)
52
+
50
53
1. Open [Azure portal](https://portal.azure.com/), navigate to your Web PubSub resource.
51
54
52
55
1. Click **Access Control (IAM)** to display access control settings for the Azure Web PubSub.
@@ -77,15 +80,16 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a system-as
77
80
78
81
1. Click **Select** to confirm the selection.
79
82
80
-
2. Click **Next**.
83
+
1. Click **Next**.
81
84
82
85

83
86
84
-
3. Click **Review + assign** to confirm the change.
87
+
1. Click **Review + assign** to confirm the change.
85
88
86
89
> [!IMPORTANT]
87
90
> Azure role assignments may take up to 30 minutes to propagate.
88
-
To learn more about how to assign and manage Azure role assignments, see these articles:
91
+
> To learn more about how to assign and manage Azure role assignments, see these articles:
92
+
89
93
-[Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md)
90
94
-[Assign Azure roles using the REST API](../role-based-access-control/role-assignments-rest.md)
91
95
-[Assign Azure roles using Azure PowerShell](../role-based-access-control/role-assignments-powershell.md)
@@ -107,4 +111,4 @@ See the following related articles:
107
111
108
112
-[Overview of Azure AD for Web PubSub](concept-azure-ad-authorization.md)
109
113
-[Authorize request to Web PubSub resources with Azure AD from Azure applications](howto-authorize-from-application.md)
110
-
-[Disable local authentication](./howto-disable-local-auth.md)
114
+
-[Disable local authentication](./howto-disable-local-auth.md)
0 commit comments