Skip to content

Commit 44927f5

Browse files
committed
acrolinx fixes
1 parent 54bf622 commit 44927f5

1 file changed

Lines changed: 14 additions & 14 deletions

File tree

articles/planetary-computer/configure-cross-tenant-application.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 01/13/2026
1212

1313
# Quickstart: Configure a cross-tenant application for Microsoft Planetary Computer Pro
1414

15-
In this quickstart, you create and configure a multi-tenant Azure application that can access customer Microsoft Planetary Computer Pro GeoCatalogs. As a geospatial data provider or service provider, this enables your application to deliver data to or process data from your customers' GeoCatalogs without requiring separate application registrations in each customer tenant.
15+
In this quickstart, you create and configure a multitenant Azure application that can access customer Microsoft Planetary Computer Pro GeoCatalogs. As a geospatial data or service provider, this process enables your application to read or write data from or to your customers' GeoCatalogs.
1616

1717
## Prerequisites
1818

@@ -37,20 +37,20 @@ The repository contains three directories:
3737

3838
| Directory | Purpose |
3939
| ----------- | --------- |
40-
| `provider-app/` | Scripts for creating your multi-tenant application registration |
40+
| `provider-app/` | Scripts for creating your multitenant application registration |
4141
| `customer-app/` | Scripts your customers use to authorize your application |
4242
| `client-app/` | Test scripts for validating GeoCatalog access |
4343

44-
## Create a multi-tenant application registration
44+
## Create a multitenant application registration
4545

46-
The first step is to create an application registration in your Azure tenant configured for multi-tenant access. This application will be the identity that customers authorize to access their GeoCatalogs.
46+
The first step is to create an application registration in your Azure tenant configured for multitenant access. This application is the entity that customers authorize to access their GeoCatalogs.
4747

4848
### Understand the application configuration
4949

50-
A multi-tenant application registration requires specific configuration:
50+
A multitenant application registration requires specific configuration:
5151

5252
- **Sign-in audience**: Set to `AzureADMultipleOrgs` to allow sign-in from any Microsoft Entra tenant
53-
- **Redirect URIs**: URIs where tokens are sent after authentication
53+
- **Redirect URI**: URI where tokens are sent after authentication
5454
- **Token configuration**: Enable ID and access token issuance
5555
- **Client credentials**: A client secret for app-only authentication
5656

@@ -62,7 +62,7 @@ A multi-tenant application registration requires specific configuration:
6262
az login
6363
```
6464
65-
1. Create the multi-tenant application registration:
65+
1. Create the multitenant application registration:
6666
6767
```azurecli
6868
az ad app create \
@@ -74,7 +74,7 @@ A multi-tenant application registration requires specific configuration:
7474
```
7575
7676
> [!NOTE]
77-
> The `appId` value in the output—this is your Application (client) ID.
77+
> The `appId` value in the output is your Application (client) ID.
7878
7979
1. Create a service principal for the application in your tenant:
8080
@@ -92,7 +92,7 @@ A multi-tenant application registration requires specific configuration:
9292
```
9393
9494
> [!WARNING]
95-
> Save the `password` value immediately—it won't be shown again. Store it securely using Azure Key Vault or another secrets management solution.
95+
> Save the `password` value immediately—this is the only time it is provided. Store it securely using Azure Key Vault or another secrets management solution.
9696
9797
1. Get your tenant ID:
9898
@@ -102,7 +102,7 @@ A multi-tenant application registration requires specific configuration:
102102
103103
### Use the sample script
104104
105-
Alternatively, use the provided setup script which automates these steps:
105+
Alternatively, use the provided setup script to automate these steps:
106106
107107
1. Navigate to the provider-app directory:
108108
@@ -138,7 +138,7 @@ Provide customers with:
138138
| Information | Description | Example |
139139
| ------------- | ------------- | --------- |
140140
| Application (client) ID | Unique identifier for your application | `abcd1234-ef56-7890-abcd-1234567890ab` |
141-
| Admin consent URL | URL for granting admin consent | See below |
141+
| Admin consent URL | URL for granting admin consent | See next section |
142142
143143
### Generate the admin consent URL
144144
@@ -148,7 +148,7 @@ Construct the admin consent URL using this template:
148148
https://login.microsoftonline.com/{customer-tenant-id}/adminconsent?client_id={your-app-id}&redirect_uri={your-redirect-uri}
149149
```
150150

151-
Provide customers with this template along with instructions to replace `{customer-tenant-id}` with their own tenant ID.
151+
Provide customers with this template and instruct them to replace `{customer-tenant-id}` with their own tenant ID.
152152

153153
> [!NOTE]
154154
> Outside the scope of this quickstart, you can collect your customers tenant-id as part of the registration and onboarding flow for your application.
@@ -174,7 +174,7 @@ The `customer_onboarding.json` file generated by the setup script contains:
174174

175175
## Authenticate and access customer GeoCatalogs
176176

177-
Once a customer has authorized your application, you can authenticate and access their GeoCatalog resources.
177+
Once your customer [authorizes the your cross-tenant application](./authorizing-cross-tenant-partner-applications.md), you can authenticate and access their GeoCatalog resources.
178178

179179
### Authentication flow
180180

@@ -184,7 +184,7 @@ Your application authenticates using the OAuth2 client credentials flow:
184184

185185
### Acquire an access token
186186

187-
Use the OAuth2 client credentials flow to acquire a token for the GeoCatalog scope. For Python based application, it is recommended to use the MSAL libraries to retrieve the access tokens:
187+
Use the OAuth2 client credentials flow to acquire a token for the GeoCatalog scope. For Python based application, it's recommended to use the MSAL libraries to retrieve the access tokens:
188188

189189
**Python example using MSAL:**
190190

0 commit comments

Comments
 (0)