Skip to content

Commit 3583699

Browse files
adjust formatting
1 parent a6abff1 commit 3583699

File tree

2 files changed

+8
-9
lines changed

2 files changed

+8
-9
lines changed

docs/reference/elasticsearch-plugins/ms-graph-authz-configure-azure.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ with the correct permissions.
1616
Entra ID.
1717
2) To register a new application, click **Enterprise applications** > **New
1818
application**.
19-
3) Click **Create your own application**, provide a name, and select the
19+
3) Click **Create your own application**, provide a name, and select the
2020
**Integrate any other application you don’t find in the gallery** option.
2121

2222
:::{image} ./images/ms-graph-authz/01-create-enterprise-application.png
@@ -39,17 +39,17 @@ with the correct permissions.
3939
:alt: get your application ID
4040
:::
4141
4) Under **Manage** > **Certificates & secrets**, do the following:
42-
- Create a new client secret
42+
- Create a new client secret.
4343
- Take note of your new client secret's **Value**. This is needed later, and
4444
is only displayed once.
4545
:::{image} ./images/ms-graph-authz/04-create-client-secret.png
4646
:alt: get your client secret
4747
:::
48-
5) Under Manage > API permissions
49-
1. Go to **Add a permission**
50-
2. Choose **Microsoft Graph**
51-
3. Choose **Application permissions**
52-
4. Select `Directory.ReadWrite.All`, `Group.ReadWrite.All`, `User.Read.All`
48+
5) Under **Manage** > **API permissions**, do the following:
49+
1. Go to **Add a permission**.
50+
2. Choose **Microsoft Graph**.
51+
3. Choose **Application permissions**.
52+
4. Select `Directory.ReadWrite.All`, `Group.ReadWrite.All`, `User.Read.All`.
5353

5454
Note that an Azure Admin will need to approve these permissions before the
5555
credentials can be used

docs/reference/elasticsearch-plugins/ms-graph-authz-configure-elasticsearch.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,7 @@ Create a Microsoft Graph realm, following the above settings, then configure an
4747
existing realm to delegate to it using `authorization_realms`.
4848

4949
For example, the following configuration authenticates via Microsoft Entra with
50-
SAML,
51-
and uses the Microsoft Graph plugin to look up group membership:
50+
SAML, and uses the Microsoft Graph plugin to look up group membership:
5251

5352
```yaml
5453
xpack.security.authc.realms.saml.kibana-realm:

0 commit comments

Comments
 (0)