Skip to content

Commit 5ce1bf1

Browse files
committed
fixes to the inline code samples
1 parent 596f1d0 commit 5ce1bf1

1 file changed

Lines changed: 24 additions & 4 deletions

File tree

articles/planetary-computer/authorize-cross-tenant-partner-applications.md

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -119,17 +119,37 @@ Admin consent authorizes the partner application to use the requested permission
119119
1. Verify that admin consent was granted by checking the service principal's permissions:
120120
121121
```azurecli
122-
az ad sp show --id $SP_ID --query "oauth2PermissionGrants" -o table
122+
az rest --method GET --url "https://graph.microsoft.com/v1.0/servicePrincipals/$SP_ID/oauth2PermissionGrants"
123123
```
124124
125+
Example output when consent has been granted:
126+
127+
```json
128+
{
129+
"value": [
130+
{
131+
"clientId": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
132+
"consentType": "AllPrincipals",
133+
"id": "abc123def456",
134+
"principalId": null,
135+
"resourceId": "98765432-abcd-ef12-3456-7890abcdef12",
136+
"scope": "User.Read"
137+
}
138+
]
139+
}
140+
```
141+
142+
If the `value` array is empty, admin consent hasn't been granted yet.
143+
125144
### Alternative: Grant consent via Azure portal
126145
127146
You can also grant admin consent through the Microsoft Entra admin center:
128147
129148
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/)
130149
1. Navigate to **Identity** > **Applications** > **Enterprise applications**
131-
1. Find and select the partner application by name or application ID
132-
1. Select **Permissions** in the left sidebar
150+
1. Select the **Application Type** filter and set to value "All Applications"
151+
1. Find the partner application by using the search bar to enter the application name or ID. Select the partner application from the filtered list.
152+
1. Select **Security** > **Permissions** in the left sidebar
133153
1. Select **Grant admin consent for [your tenant]**
134154
1. Review and accept the permissions
135155
@@ -253,7 +273,7 @@ You can also assign roles through the Azure portal:
253273
1. Navigate to your GeoCatalog resource
254274
1. Select **Access control (IAM)** in the left sidebar
255275
1. Select **Add** > **Add role assignment**
256-
1. Select **GeoCatalog Administrator** or **GeoCatalog Reader ** from the list of roles
276+
1. Select **GeoCatalog Administrator** or **GeoCatalog Reader** from the list of roles
257277
1. Select **Next**
258278
1. Select **User, group, or service principal**
259279
1. Select **Select members** and search for the partner application name

0 commit comments

Comments
 (0)