Skip to content

Commit 3a67964

Browse files
committed
copyedits
1 parent 7e47732 commit 3a67964

3 files changed

Lines changed: 50 additions & 44 deletions

File tree

articles/api-management/credentials-how-to-azure-ad.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: api-management
55
author: dlepow
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 12/05/2025
8+
ms.date: 12/08/2025
99
ms.author: danlep
1010
ms.custom: sfi-image-nochange
1111
---
@@ -14,7 +14,7 @@ ms.custom: sfi-image-nochange
1414

1515
[!INCLUDE [api-management-availability-all-tiers](../../includes/api-management-availability-all-tiers.md)]
1616

17-
This article guides you through the steps required to create a [managed connection](credentials-overview.md) to the Microsoft Graph API within Azure API Management. The Microsoft Entra identity provider is used to call the Microsoft Graph API. The authorization code grant type is used in this example.
17+
This article guides you through the steps required to create a [managed connection](credentials-overview.md) to the Microsoft Graph API within Azure API Management. Use the Microsoft Entra identity provider to call the Microsoft Graph API. This example uses the authorization code grant type.
1818

1919
You learn how to:
2020

@@ -45,9 +45,9 @@ Create a Microsoft Entra application for the API and give it the appropriate per
4545

4646
1. Search for and select **Microsoft Entra ID**.
4747

48-
1. Under **Manage** on the sidebar menu, select **App registrations**, and then select **+ New registration**.
48+
1. Under **Manage** on the sidebar menu, select **App registrations**, then select **+ New registration**.
4949

50-
1. On the **Register an application** page, enter your application registration settings:
50+
1. On **Register an application**, enter your application registration settings:
5151
1. In **Name**, enter a meaningful name for the app, such as *MicrosoftGraphAuth*.
5252
1. In **Supported account types**, select an option that suits your scenario, for example, **Accounts in this organizational directory only (Single tenant)**.
5353
1. Set the **Redirect URI** to **Web**, and enter `https://authorization-manager.consent.azure-apim.net/redirect/apim/<YOUR-APIM-SERVICENAME>`, substituting the name of the API Management service where you'll configure the credential provider.
@@ -56,18 +56,18 @@ Create a Microsoft Entra application for the API and give it the appropriate per
5656
:::image type="content" source="media/credentials-how-to-azure-ad/create-registration.png" alt-text="Screenshot of creating a Microsoft Entra app registration in the portal.":::
5757

5858
1. On the sidebar menu, select **Manage** > **API permissions**.
59-
Make sure the permission **User.Read** with the type *Delegated* has already been added.
59+
Make sure the permission **User.Read** with the type *Delegated* is already added.
6060

6161
1. Select **+ Add a permission**.
6262
:::image type="content" source="./media/credentials-how-to-azure-ad/add-permission.png" alt-text="Screenshot of adding an API permission in the portal.":::
6363

64-
1. Select **Microsoft Graph**, and then select **Delegated permissions**.
65-
1. Type **Team**, expand the **Team** options, and then select **Team.ReadBasic.All**. Select **Add permissions**.
64+
1. Select **Microsoft Graph**, then select **Delegated permissions**.
65+
1. Type **Team**, expand the **Team** options, then select **Team.ReadBasic.All**. Select **Add permissions**.
6666
1. Next, select **Grant admin consent for Default Directory**. The status of the permissions changes to **Granted for Default Directory**.
6767

68-
1. On the sidebar menu, select **Overview**. On the **Overview** page, find the **Application (client) ID** value and record it for use in Step 2.
68+
1. On the sidebar menu, select **Overview**. On **Overview**, find the **Application (client) ID** value and record it for use in Step 2.
6969

70-
1. On the sidebar menu, select **Manage** >**Certificates & secrets**, and then select **+ New client secret**.
70+
1. On the sidebar menu, select **Manage** >**Certificates & secrets**, then select **+ New client secret**.
7171
:::image type="content" source="media/credentials-how-to-azure-ad/create-secret.png" alt-text="Screenshot of creating an app secret in the portal.":::
7272

7373
1. Enter a **Description**.
@@ -79,10 +79,10 @@ Create a Microsoft Entra application for the API and give it the appropriate per
7979

8080
1. Go to your API Management instance.
8181

82-
1. Under **APIs** on the sidebar menu, select **Credential manager**, and then select **+ Create**.
82+
1. Under **APIs** on the sidebar menu, select **Credential manager**, then select **+ Create**.
8383
:::image type="content" source="media/credentials-how-to-azure-ad/create-credential.png" alt-text="Screenshot of creating an API credential in the portal.":::
8484

85-
1. On the **Create credential provider** page, enter the following settings, and select **Create**:
85+
1. On **Create credential provider**, enter the following settings, and select **Create**:
8686

8787
|Settings |Value |
8888
|---------|---------|
@@ -169,7 +169,7 @@ On the **Connection** tab, complete the steps for your connection to the provide
169169

170170
The preceding policy definition consists of two parts:
171171

172-
* The [get-authorization-context](get-authorization-context-policy.md) policy fetches an authorization token by referencing the credential provider and connection that were created earlier.
172+
* The [get-authorization-context](get-authorization-context-policy.md) policy fetches an authorization token by referencing the credential provider and connection that you created earlier.
173173
* The [set-header](set-header-policy.md) policy creates an HTTP header with the fetched access token.
174174

175175
## Step 5: Test the API

articles/api-management/credentials-how-to-github.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: api-management
55
author: dlepow
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 12/05/2025
8+
ms.date: 12/08/2025
99
ms.author: danlep
1010
ms.custom: sfi-image-nochange
1111
---
@@ -14,7 +14,7 @@ ms.custom: sfi-image-nochange
1414

1515
[!INCLUDE [api-management-availability-all-tiers](../../includes/api-management-availability-all-tiers.md)]
1616

17-
In this article, you learn how to create a managed [connection](credentials-overview.md) in API Management and call a GitHub API that requires an OAuth 2.0 token. The authorization code grant type is used in this example.
17+
In this article, you learn how to create a managed [connection](credentials-overview.md) in API Management and call a GitHub API that requires an OAuth 2.0 token. This example uses the authorization code grant type.
1818

1919
You learn how to:
2020

@@ -27,8 +27,8 @@ You learn how to:
2727
2828
## Prerequisites
2929

30-
* A GitHub account is required.
31-
* A running API Management instance. If you need to, [create an Azure API Management instance](get-started-create-service-instance.md).
30+
* A GitHub account.
31+
* A running API Management instance. If you need one, [create an Azure API Management instance](get-started-create-service-instance.md).
3232
* Enable a [system-assigned managed identity](api-management-howto-use-managed-service-identity.md) for API Management in the API Management instance.
3333

3434
## Step 1: Register an application in GitHub
@@ -41,21 +41,21 @@ Create a GitHub OAuth app for the API and give it the appropriate permissions fo
4141
:::image type="content" source="media/credentials-how-to-github/register-application.png" alt-text="Screenshot of registering a new OAuth application in GitHub.":::
4242
1. Enter an **Application name** and **Homepage URL** for the application. For this example, you can supply a placeholder URL such as `http://localhost`.
4343
1. Optionally, add an **Application description**.
44-
1. In **Authorization callback URL** (the redirect URL), enter `https://authorization-manager.consent.azure-apim.net/redirect/apim/<YOUR-APIM-SERVICENAME>`, substituting the name of the API Management instance where you will configure the credential provider.
44+
1. In **Authorization callback URL** (the redirect URL), enter `https://authorization-manager.consent.azure-apim.net/redirect/apim/<YOUR-APIM-SERVICENAME>`, substituting the name of the API Management instance where you configure the credential provider.
4545
1. Optionally select **Enable device flow** (not required for this example).
4646
1. Select **Register application**.
47-
1. On the **General** page, copy the **Client ID**, which you'll use in Step 2.
48-
1. Select **Generate a new client secret**. Copy the secret, which won't be displayed again. You'll configure the secret in Step 2.
47+
1. On the **General** page, copy the **Client ID**, which you use in Step 2.
48+
1. Select **Generate a new client secret**. Copy the secret, which isn't displayed again. You configure the secret in Step 2.
4949

5050
:::image type="content" source="media/credentials-how-to-github/generate-secret.png" alt-text="Screenshot showing how to get client ID and client secret for the application in GitHub.":::
5151

5252
## Step 2: Configure a credential provider in API Management
5353

54-
1. Sign into the [Azure portal](https://portal.azure.com) and go to your API Management instance.
54+
1. Sign in to the [Azure portal](https://portal.azure.com) and go to your API Management instance.
5555
1. On the left menu, select **APIs** > **Credential manager** > **+ Create**.
5656

5757
:::image type="content" source="media/credentials-how-to-azure-ad/create-credential.png" alt-text="Screenshot of creating an API Management credential in the Azure portal.":::
58-
1. On the **Create credential provider** page, enter the following settings:
58+
1. On **Create credential provider**, enter the following settings:
5959

6060
|Settings |Value |
6161
|---------|---------|
@@ -83,7 +83,7 @@ On the **Connection** tab, complete the steps for your connection to the provide
8383
8484
## Step 4: Create an API in API Management and configure a policy
8585

86-
1. Sign into the [Azure portal](https://portal.azure.com) and go to your API Management instance.
86+
1. Sign in to the [Azure portal](https://portal.azure.com) and go to your API Management instance.
8787
1. On the left menu, select **APIs** > **APIs** > **+ Add API**.
8888
1. Select **HTTP** and enter the following settings, then select **Create**.
8989

@@ -93,7 +93,7 @@ On the **Connection** tab, complete the steps for your connection to the provide
9393
|**Web service URL** | `https://api.github.com` |
9494
|**API URL suffix** | *githubuser* |
9595

96-
1. Navigate to the newly created API and select **Add Operation**. Enter the following settings and select **Save**.
96+
1. Go to the new API and select **Add Operation**. Enter the following settings and select **Save**.
9797

9898
|Setting |Value |
9999
|---------|---------|
@@ -110,7 +110,7 @@ On the **Connection** tab, complete the steps for your connection to the provide
110110
|**URL** for GET | /user/followers |
111111

112112
1. Select **All operations**. In the **Inbound processing** section, select the (**</>**) (code editor) icon.
113-
1. Copy and paste the following in the policy editor. Make sure the `provider-id` and `authorization-id` values in the `get-authorization-context` policy correspond to the names of the credential provider and connection, respectively, that you configured in the preceding steps. Select **Save**.
113+
1. Copy and paste the following code in the policy editor. Make sure the `provider-id` and `authorization-id` values in the `get-authorization-context` policy correspond to the names of the credential provider and connection, respectively, that you configured in the preceding steps. Select **Save**.
114114

115115
```xml
116116
<policies>

0 commit comments

Comments
 (0)