You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/planetary-computer/authorize-cross-tenant-partner-applications.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ A service principal is the representation of an application in your Microsoft En
98
98
99
99
## Grant admin consent to the partner application
100
100
101
-
Admin consent authorizes the partner application to use the permissions it has requested. This step is required before the application can authenticate against your tenant. Your partner should provide a link to perform this action as part of the application onboarding process.
101
+
Admin consent authorizes the partner application to use the requested permissions. This step is required before the application can authenticate against your tenant. Your partner should provide a link to perform this action as part of the application onboarding process.
102
102
103
103
> [!NOTE]
104
104
> You can optionally contruct this URL yourself:
@@ -138,7 +138,7 @@ You can also grant admin consent through the Microsoft Entra admin center:
138
138
The service principal for your data or service provider needs the appropriate role in order to interact with your GeoCatalog resources. Assign the **GeoCatalog Reader** role to applications that only need read access to your GeoCatalog. Assign the **GeoCatalog Administrator** role to applications that need to create collections, ingest data, and manage items in your GeoCatalog.
139
139
140
140
> [!NOTE]
141
-
> The partner application integration features is currently in preview and does not support a specific, limited access role for data or service provider partners. For this reason, it is recommended during the preview period that customers create a GeoCatalog resource dedicated to a specific partner to prevent access to other, organizational private, data.
141
+
> The partner application integration feature is currently in preview and doesn't support a specific, limited access role for data or service provider partners. For this reason, it's recommended during the preview period that customers create a GeoCatalog resource dedicated to a specific partner to prevent access to other, organizational private, data.
@@ -279,9 +279,9 @@ After completing the authorization steps, verify that the partner can access you
279
279
1. Notify your partner that authorization is complete. Provide them with:
280
280
- The GeoCatalog URI (found in the Azure portal on your GeoCatalog resource's Overview page)
281
281
282
-
## Grant access to additional GeoCatalogs
282
+
## Grant access to more GeoCatalogs
283
283
284
-
To grant the same partner access to additional GeoCatalog resources, repeat only the [Assign the GeoCatalog Administrator role](#assign-the-geocatalog-administrator-role) section for each resource. The service principal and admin consent only need to be configured once per tenant.
284
+
To grant the same partner access to more GeoCatalog resources, repeat only the [Assign the appropriate GeoCatalog role](#assign-the-appropriate-geocatalog-role) section for each resource. The service principal and admin consent only need to be configured once per tenant.
285
285
286
286
## Revoke partner access
287
287
@@ -294,7 +294,7 @@ To revoke access to a specific GeoCatalog while preserving access to others:
294
294
```azurecli
295
295
az role assignment delete --assignee $SP_ID --scope $GEOCATALOG_RESOURCE_ID --role "GeoCatalog Administrator"
296
296
```
297
-
or
297
+
Or
298
298
299
299
```azurecli
300
300
az role assignment delete --assignee $SP_ID --scope $GEOCATALOG_RESOURCE_ID --role "GeoCatalog Reader"
@@ -319,7 +319,7 @@ az ad sp delete --id $SP_ID
319
319
If you receive an error when creating the service principal, verify that:
320
320
321
321
- The partner's application ID is correct
322
-
- The partner's application is configured for multi-tenant access
322
+
- The partner's application is configured for multitenant access
323
323
- You have Application Administrator or Global Administrator role
0 commit comments