Skip to content

Commit fa1b7ec

Browse files
authored
Fine tune instructions
1 parent 5223988 commit fa1b7ec

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/partner-solutions/split-experimentation/how-to-set-up-data-access.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Register a new app or use an existing Microsoft Entra application registration t
3232

3333
To register a new app:
3434

35-
1. Go to **Identity** > **Applications** > **App registrations**.
35+
1. In the Microsoft admin center, go to **Identity** > **Applications** > **App registrations**.
3636

3737
:::image type="content" source="media/data-access/app-registration.png" alt-text="Screenshot of the Microsoft Entra admin center showing the App registrations page.":::
3838

@@ -45,12 +45,11 @@ To register a new app:
4545

4646
Configure the application ID URI to allow the Entra application to be used as global audience/scope when requesting an authentication token.
4747

48-
1. Open your app in the Azure portal and under **Overview**, get the **Application ID URI**.
48+
1. In the Microsoft Entra admin center, in **Identity** > **Applications** > **App registrations**, open your application by selecting its **Display name**. In the pane that opens, under **Overview**, copy the **Application ID URI**. If instead of the application ID URI you see **Add an Application ID URI**, select this option, then select **Add** and **Save**.
4949

5050
:::image type="content" source="media/data-access/get-application-id-uri.png" alt-text="Screenshot of the app in the Azure portal.":::
5151

52-
1. Back in the Microsoft Entra admin center, in **Identity** > **Applications** > **App registrations**, open your application by selecting its **Display name**.
53-
1. In the pane that opens, select **Expose an API** and Ensure the **Application ID URI** value is: `api://<Entra application ID>` where `Entra application ID` must be the same Microsoft Entra application ID.
52+
1. Then select **Expose an API** in the app's left menu. Ensure the **Application ID URI** value is: `api://<Entra application ID>` where `Entra application ID` must be the same Microsoft Entra application ID.
5453

5554
:::image type="content" source="media/data-access/app-registration.png" alt-text="Screenshot of the Microsoft Entra admin center showing the App registrations page.":::
5655

@@ -81,7 +80,7 @@ In the Microsoft Entra admin center, go to your app and open the **Expose an API
8180

8281
Split Experimentation workspace supports well-known roles to scope access control. Add the following roles in the Entra application.
8382

84-
1. Go to the **App roles** menu and select **Create app role**.
83+
1. Go to the **App roles** menu of your app and select **Create app role**.
8584
1. Select or enter the following information in the pane that opens to create an *ExperimentationDataOwner* role. This role gives the app full access to execute all operations on the Split Experimentation resource.
8685

8786
- **Display name**: enter *ExperimentationDataOwner*
@@ -104,16 +103,16 @@ Split Experimentation workspace supports well-known roles to scope access contro
104103

105104
#### Choose an assignment requirement option
106105

107-
1. Go to the **Overview** menu and select the link under to **Managed application in local directory**
108-
1. Open **Manage** > **Properties** and select your preferred option for the **Assignment required** setting.
106+
1. Go to the **Overview** menu of your app and select the link under **Managed application in local directory**. This opens your app in the Microsoft admin center **Identity** > **Enterprise Application** menu.
107+
1. Open **Manage** > **Properties** on the left and select your preferred option for the **Assignment required** setting.
109108
- **Yes**: means that only the entries explicitly defined under **Users and Groups** in the enterprise application can obtain a token and therefore access the associated Split Experimentation Workspace. This is the recommended option.
110109
- **No**: means that everyone in the same Entra tenant can obtain tokens and therefore may be allowed, via the Split Experimentation control plane opt-in setting, to access the associated Split Experimentation Workspace.
111110

112111
:::image type="content" source="media/data-access/assignment-required.png" alt-text="Screenshot of the Microsoft Entra admin center showing how to require an assignment.":::
113112

114113
#### Assign users and groups
115114

116-
1. Go to the **Users and groups** menu and select **Add user/group**
115+
1. Go back to the **Users and groups** menu and select **Add user/group**
117116

118117
:::image type="content" source="media/data-access/assign-users.png" alt-text="Screenshot of the Microsoft Entra admin center showing how to assign roles to users.":::
119118
1. Select a user or a group and select one of the roles you created for the Split Experimentation Workspace.

0 commit comments

Comments
 (0)