Skip to content

Commit 1e23c80

Browse files
committed
fix the API screenshots
1 parent 0a5ce02 commit 1e23c80

File tree

8 files changed

+19
-12
lines changed

8 files changed

+19
-12
lines changed

CloudAppSecurityDocs/api-authentication-application.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -28,37 +28,43 @@ This article explains how to create a Microsoft Entra application, get an access
2828
1. To enable your app to access Defender for Cloud Apps and assign it **'Read all alerts'** permission, on your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Cloud App Security**, and then select **Microsoft Cloud App Security**.
2929

3030
> [!NOTE]
31-
> *Microsoft Cloud App Security* does not appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
31+
> *Microsoft Cloud App Security* doesn't appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
3232
33-
![Screenshot of adding permission.](media/add-permission.png)
3433

35-
- Select **Application permissions** > **Investigation.Read**, and then select **Add permissions**.
34+
:::image type="content" source="media/api-authentication-application/add-app-permissions.png" alt-text="Screenshot showing how to configure API permissions for your application." lightbox="media/api-authentication-application/add-app-permissions.png":::
3635

37-
:::image type="content" source="media/application-permissions.png" alt-text="Screenshot of adding app permission." lightbox="media/application-permissions.png":::
3836

39-
You need to select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
37+
1. Select **Application permissions** > **Investigation.Read**, and then select **Add permissions**.
4038

41-
- To determine which permission you need, look at the **Permissions** section in the API you're interested to call.
39+
:::image type="content" source="media/api-authentication-application/request-permissions.png" alt-text="Screenshot that shows which API permissions to request for your application." lightbox="media/api-authentication-application/request-permissions.png":::
40+
41+
1. You need to select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
42+
43+
1. To determine which permission you need, look at the **Permissions** section in the API you're interested to call.
4244

4345
1. Select **Grant admin consent**.
4446

4547
> [!NOTE]
4648
> Every time you add a permission, you must select **Grant admin consent** for the new permission to take effect.
4749
48-
![Screenshot of granting admin permissions.](media/grant-consent.png)
4950

50-
1. To add a secret to the application, select **Certificates & secrets**, select **New client secret**, add a description to the secret, and then select **Add**.
51+
:::image type="content" source="media/api-authentication-application/grant-consent.png" alt-text="Screenshot that shows the option to grant admin consent." lightbox="media/api-authentication-application/grant-consent.png":::
52+
53+
54+
1. To add a secret to the application, select **Certificates & secrets**, select **New client secret**. Add a description to the secret, and then select **Add**.
5155

5256
> [!NOTE]
5357
> After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve this value after you leave.
5458
55-
![Screenshot of creating an app key.](media/webapp-create-key2.png)
59+
:::image type="content" source="media/api-authentication-application/webapp-create-key2.png" alt-text="Screenshot that shows how to create an app key." lightbox="media/api-authentication-application/webapp-create-key2.png":::
60+
5661

5762
1. Write down your application ID and your tenant ID. On your application page, go to **Overview** and copy the **Application (client) ID** and the **Directory (tenant) ID**.
5863

59-
![Screenshot of the created app ID.](media/app-and-tenant-ids.png)
64+
:::image type="content" source="media/api-authentication-application/app-and-tenant-ids.png" alt-text="Screenshot that shows the created app ID." lightbox="media/api-authentication-application/app-and-tenant-ids.png":::
65+
6066

61-
1. **For Microsoft Defender for Cloud Apps Partners only**. Set your app to be multitenanted (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multitenanted:
67+
1. **For Microsoft Defender for Cloud Apps Partners only**. Set your app to be multitenant (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multitenant:
6268

6369
- Go to **Authentication**, and add `https://portal.azure.com` as the **Redirect URI**.
6470

@@ -179,7 +185,8 @@ Ensure that you got the correct token:
179185
1. Validate that you get a 'roles' claim with the desired permissions
180186
1. In the following image, you can see a decoded token acquired from an app with permissions to all Microsoft Defender for Cloud Apps roles:
181187

182-
![Screenshot of token validation.](media/webapp-decoded-token.png)
188+
:::image type="content" source="media/api-authentication-application/webapp-decoded-token.png" alt-text="Screenshot that shows the decoded token.":::
189+
183190

184191
## Use the token to access Microsoft Defender for Cloud Apps API
185192

77.2 KB
Loading
File renamed without changes.
File renamed without changes.
56.3 KB
Loading
File renamed without changes.
File renamed without changes.
-44.3 KB
Binary file not shown.

0 commit comments

Comments
 (0)