Skip to content

Commit 451187d

Browse files
committed
refactor intro
1 parent 08d44fb commit 451187d

File tree

1 file changed

+16
-8
lines changed

1 file changed

+16
-8
lines changed

docs/azure/sdk/authentication/local-development-dev-accounts.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,20 @@ ms.custom:
1212

1313
# Authenticate .NET apps to Azure services during local development using developer accounts
1414

15-
During local development, applications need to authenticate to Azure to access various Azure services. You can authenticate locally using a developer account, a [broker](local-development-broker.md), or a [service principal](local-development-service-principal.md). This article explains how to use a developer account. In the sections ahead, you learn:
15+
During local development, applications need to authenticate to Azure to access various Azure services. You can authenticate locally using one of these approaches:
1616

17-
- How to use Microsoft Entra groups to efficiently manage permissions for multiple developer accounts
18-
- How to assign roles to developer accounts to scope permissions
19-
- How to sign-in to supported local development tools
20-
- How to authenticate using a developer account from your app code
17+
- Use a developer account with one of the [developer tools supported by the Azure Identity library](#supported-developer-tools).
18+
- Delegate credential management to a [broker](local-development-broker.md).
19+
- Use a [service principal](local-development-service-principal.md).
20+
21+
This article explains how to authenticate using a developer account with tools supported by the Azure Identity library. In the sections ahead, you learn:
22+
23+
- How to use Microsoft Entra groups to efficiently manage permissions for multiple developer accounts.
24+
- How to assign roles to developer accounts to scope permissions.
25+
- How to sign-in to supported local development tools.
26+
- How to authenticate using a developer account from your app code.
27+
28+
## Supported developer tools for authentication
2129

2230
For an app to authenticate to Azure during local development using the developer's Azure credentials, the developer must be signed-in to Azure from one of the following developer tools:
2331

@@ -82,23 +90,23 @@ az login --use-device-code
8290

8391
### [Azure Developer CLI](#tab/sign-in-azure-developer-cli)
8492

85-
Developers can use [Azure Developer CLI](/azure/developer/azure-developer-cli/overview) to authenticate. Apps using <xref:Azure.Identity.DefaultAzureCredential> or <xref:Azure.Identity.AzureDeveloperCliCredential> can then use this account to authenticate app requests when running locally.
93+
Developers can use [Azure Developer CLI](/azure/developer/azure-developer-cli/overview) to authenticate. Apps using <xref:Azure.Identity.DefaultAzureCredential> or <xref:Azure.Identity.AzureDeveloperCliCredential> can then use this account to authenticate app requests.
8694

8795
To authenticate with the Azure Developer CLI, run the `azd auth login` command. On a system with a default web browser, the Azure Developer CLI launches the browser to authenticate the user.
8896

8997
```azdeveloper
9098
azd auth login
9199
```
92100

93-
For systems without a default web browser, the `azd auth login --use-device-code` uses the device code authentication flow. The user can also force the the Azure Developer CLI to use the device code flow rather than launching a browser by specifying the `--use-device-code` argument.
101+
For systems without a default web browser, the `azd auth login --use-device-code` uses the device code authentication flow. The user can also force the Azure Developer CLI to use the device code flow rather than launching a browser by specifying the `--use-device-code` argument.
94102

95103
```azdeveloper
96104
azd auth login --use-device-code
97105
```
98106

99107
### [Azure PowerShell](#tab/sign-in-azure-powershell)
100108

101-
Developers can use [Azure PowerShell](/powershell/azure/what-is-azure-powershell) to authenticate. Apps using <xref:Azure.Identity.DefaultAzureCredential> or <xref:Azure.Identity.AzurePowerShellCredential> can then use this account to authenticate app requests when running locally.
109+
Developers can use [Azure PowerShell](/powershell/azure/what-is-azure-powershell) to authenticate. Apps using <xref:Azure.Identity.DefaultAzureCredential> or <xref:Azure.Identity.AzurePowerShellCredential> can then use this account to authenticate app requests.
102110

103111
To authenticate with Azure PowerShell, run the command `Connect-AzAccount`. On a system with a default web browser and version 5.0.0 or later of Azure PowerShell, it launches the browser to authenticate the user.
104112

0 commit comments

Comments
 (0)