You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/planetary-computer/create-connection-arc-gis-pro.md
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,8 @@ Learn how to securely browse and access data hosted in Microsoft Planetary Compu
30
30
- Azure subscription with permissions to manage app registrations
31
31
- ArcGIS Pro installed on your machine
32
32
33
-
> [!TIP]
34
-
> Before you begin, review background information in [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app).
33
+
> [!TIP]
34
+
> Before you begin, review background information in [Register an application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app).
35
35
36
36
## Register a web API application for ArcGIS Pro
37
37
@@ -94,10 +94,11 @@ Learn how to securely browse and access data hosted in Microsoft Planetary Compu
94
94
1. Select **Add a scope** and add the following information:
:::image type="content" source="media/add-user-authentication-scope.png" alt-text="Screenshot that shows how to add a user authentication scope." lightbox="media/add-user-authentication-scope.png":::
:::image type="content" source="media/add-user-impersonation-scope.png" alt-text="Screenshot that shows how to add a user impersonation scope." lightbox="media/add-user-impersonation-scope.png":::
102
103
103
104
1. Select **Add a client application**. Choose and take note of the client ID. You need the client ID to set up [an authentication connection](#add-an-authentication-connection) in ArcGIS Pro.
@@ -154,7 +155,7 @@ Learn how to securely browse and access data hosted in Microsoft Planetary Compu
154
155
-**Azure Storage** > **user_impersonation**
155
156
-**Microsoft Graph** > **User.Read** (default)
156
157
157
-
:::image type="content" source="media/add-api-permissions.png" alt-text="Screenshot that shows how to configure API permissions." lightbox="media/add-api-permissions.png":::
158
+
:::image type="content" source="media/add-api-permissions.png" alt-text="Screenshot that shows how to configure API permissions." lightbox="media/add-api-permissions.png":::
158
159
159
160
1. After you add permissions, select **Grant admin consent for Default Directory**.
160
161
@@ -220,9 +221,9 @@ After you register your first application, register a second (with a distinct na
220
221
-**Add permissions**
221
222
-**Grant admin consent**
222
223
223
-
:::image type="content" source="media/app-selection-on-request-api-permissions-screen.png" alt-text="Screenshot that shows app selection on the request API permissions screen." lightbox="media/app-selection-on-request-api-permissions-screen.png":::
224
+
:::image type="content" source="media/app-selection-on-request-api-permissions-screen.png" alt-text="Screenshot that shows app selection on the request API permissions screen." lightbox="media/app-selection-on-request-api-permissions-screen.png":::
224
225
225
-
:::image type="content" source="media/grant-admin-consents-4.png" alt-text="Screenshot that shows grant admin consent." lightbox="media/grant-admin-consents-4.png":::
226
+
:::image type="content" source="media/grant-admin-consents-4.png" alt-text="Screenshot that shows grant admin consent." lightbox="media/grant-admin-consents-4.png":::
226
227
227
228
### [US Gov](#tab/usgov)
228
229
@@ -295,15 +296,15 @@ This section outlines how to configure authentication and data access in the Arc
295
296
296
297
1. Enter values in the **Entra Domain** and **Client ID** fields.
297
298
298
-
- You can [find your Microsoft Entra ID domain](/partner-center/account-settings/find-ids-and-domain-names) (also known as your primary domain) from Microsoft Entra ID in the Azure portal
299
+
- You can [find your Microsoft Entra ID domain](/partner-center/account-settings/find-ids-and-domain-names) (also known as your primary domain) from Microsoft Entra ID in the Azure portal.
299
300
- For **Client ID**, enter the client ID you set in the **Add a client application** step.
300
301
301
302
1. Add the following values in the **Scopes** fields:
302
303
303
304
-`https://storage.azure.com/.default`
304
305
-`https://geocatalog.spatio.azure.com/.default`
305
306
306
-
:::image type="content" source="media/add-connection.png" alt-text="Screenshot that shows how to add a connection." lightbox="media/add-connection.png":::
307
+
:::image type="content" source="media/add-connection.png" alt-text="Screenshot that shows how to add a connection." lightbox="media/add-connection.png":::
307
308
308
309
1. Select **OK**.
309
310
@@ -335,15 +336,15 @@ This section outlines how to configure authentication and data access in the Arc
335
336
336
337
1. Enter values in the **Entra Domain** and **Client ID** fields.
337
338
338
-
- You can [find your Microsoft Entra ID domain](/partner-center/account-settings/find-ids-and-domain-names) (also known as your primary domain) from Microsoft Entra ID in the Azure portal
339
+
- You can [find your Microsoft Entra ID domain](/partner-center/account-settings/find-ids-and-domain-names) (also known as your primary domain) from Microsoft Entra ID in the Azure portal.
339
340
- For **Client ID**, enter the client ID that you set in the **Add a client application** step.
340
341
341
342
1. Add the following values in the **Scopes** fields:
342
343
343
344
-`https://storage.usgovcloudapi.net/.default`
344
345
-`https://geocatalog.spatio.azure.us/.default`
345
346
346
-
:::image type="content" source="media/add-authentication-us-gov.png" alt-text="Screenshot that shows how to add a connection." lightbox="media/add-authentication-us-gov.png":::
347
+
:::image type="content" source="media/add-authentication-us-gov.png" alt-text="Screenshot that shows how to add a connection." lightbox="media/add-authentication-us-gov.png":::
347
348
348
349
1. Select **OK**.
349
350
@@ -376,7 +377,7 @@ This section outlines how to configure authentication and data access in the Arc
376
377
377
378
1. Record the value in **Collection Name**. For example, `sentinel-2-l2a-tutorial-1000`.
378
379
379
-
1. Construct the token API endpoint by using this pattern: ```<GeoCatalog URI>/sas/token/<Collection Name>?api-version=2025-04-30-preview```. For example: ```https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com/sas/token/sentinel-2-l2a-tutorial-1000?api-version=2025-04-30-preview```
380
+
1. Construct the token API endpoint by using this pattern: ```<GeoCatalog URI>/sas/token/<Collection Name>?api-version=2025-04-30-preview```. For example: ```https://arcgisprogeocatalog.<unique-identity>.<cloud-region>.geocatalog.spatio.azure.com/sas/token/sentinel-2-l2a-tutorial-1000?api-version=2025-04-30-preview```.
380
381
381
382
### Find and record the storage location
382
383
@@ -389,7 +390,7 @@ There are two easy ways to discover the storage account and blob container for a
389
390
390
391
#### Discover the storage account by using a collection thumbnail
391
392
392
-
1. From a specific **Collections** page, select the value for the **Collection Name**.
393
+
1. From a specific **Collections** page, select the value for **Collection Name**.
393
394
394
395
:::image type="content" source="media/click-on-collection-name.png" alt-text="Screenshot that shows how to select the collection name." lightbox="media/click-on-collection-name.png":::
395
396
@@ -408,7 +409,7 @@ There are two easy ways to discover the storage account and blob container for a
:::image type="content" source="media/collection-json-display.png" alt-text="Screenshot that shows a collection json display." lightbox="media/collection-json-display.png":::
412
+
:::image type="content" source="media/collection-json-display.png" alt-text="Screenshot that shows a collection json display." lightbox="media/collection-json-display.png":::
412
413
413
414
#### Discover the storage account by using a STAC Item
414
415
@@ -420,11 +421,11 @@ There are two easy ways to discover the storage account and blob container for a
420
421
421
422
:::image type="content" source="media/select-stac-item-checkbox.png" alt-text="Screenshot that shows how to select a STAC Item box." lightbox="media/select-stac-item-checkbox.png":::
422
423
423
-
1. Scroll to the bottom of the **STAC Item** right panel and selectthis link to retrieve the STAC Item JSON.
424
+
1. Scroll to the bottom of the **STAC Item** right panel and selectthe link to retrieve the STAC Item JSON.
424
425
425
426
:::image type="content" source="media/select-stac-item-json-link.png" alt-text="Screenshot that shows how to select the STAC Item JSON link." lightbox="media/select-stac-item-json-link.png":::
426
427
427
-
1. Find the object called `assets` within the STAC Item JSON specification called. Select one of the asset types within this object and find the `href` key.
428
+
1. Find the object called `assets` within the STAC Item JSON specification. Select one of the asset types within this object and find the `href` key.
0 commit comments