Skip to content

Commit 63d394d

Browse files
committed
address build errors and acrolynx issues.
1 parent 44927f5 commit 63d394d

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

articles/planetary-computer/authorizing-cross-tenant-partner-applications.md renamed to articles/planetary-computer/authorize-cross-tenant-partner-applications.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ A service principal is the representation of an application in your Microsoft En
9898
9999
## Grant admin consent to the partner application
100100
101-
Admin consent authorizes the partner application to use the permissions it has requested. This step is required before the application can authenticate against your tenant. Your partner should provide a link to perform this action as part of the application onboarding process.
101+
Admin consent authorizes the partner application to use the requested permissions. This step is required before the application can authenticate against your tenant. Your partner should provide a link to perform this action as part of the application onboarding process.
102102
103103
> [!NOTE]
104104
> You can optionally contruct this URL yourself:
@@ -138,7 +138,7 @@ You can also grant admin consent through the Microsoft Entra admin center:
138138
The service principal for your data or service provider needs the appropriate role in order to interact with your GeoCatalog resources. Assign the **GeoCatalog Reader** role to applications that only need read access to your GeoCatalog. Assign the **GeoCatalog Administrator** role to applications that need to create collections, ingest data, and manage items in your GeoCatalog.
139139
140140
> [!NOTE]
141-
> The partner application integration features is currently in preview and does not support a specific, limited access role for data or service provider partners. For this reason, it is recommended during the preview period that customers create a GeoCatalog resource dedicated to a specific partner to prevent access to other, organizational private, data.
141+
> The partner application integration feature is currently in preview and doesn't support a specific, limited access role for data or service provider partners. For this reason, it's recommended during the preview period that customers create a GeoCatalog resource dedicated to a specific partner to prevent access to other, organizational private, data.
142142
143143
### [GeoCatalog Administrator](#tab/geocatalog-administrator)
144144
1. Get your GeoCatalog resource ID:
@@ -279,9 +279,9 @@ After completing the authorization steps, verify that the partner can access you
279279
1. Notify your partner that authorization is complete. Provide them with:
280280
- The GeoCatalog URI (found in the Azure portal on your GeoCatalog resource's Overview page)
281281
282-
## Grant access to additional GeoCatalogs
282+
## Grant access to more GeoCatalogs
283283
284-
To grant the same partner access to additional GeoCatalog resources, repeat only the [Assign the GeoCatalog Administrator role](#assign-the-geocatalog-administrator-role) section for each resource. The service principal and admin consent only need to be configured once per tenant.
284+
To grant the same partner access to more GeoCatalog resources, repeat only the [Assign the appropriate GeoCatalog role](#assign-the-appropriate-geocatalog-role) section for each resource. The service principal and admin consent only need to be configured once per tenant.
285285
286286
## Revoke partner access
287287
@@ -294,7 +294,7 @@ To revoke access to a specific GeoCatalog while preserving access to others:
294294
```azurecli
295295
az role assignment delete --assignee $SP_ID --scope $GEOCATALOG_RESOURCE_ID --role "GeoCatalog Administrator"
296296
```
297-
or
297+
Or
298298

299299
```azurecli
300300
az role assignment delete --assignee $SP_ID --scope $GEOCATALOG_RESOURCE_ID --role "GeoCatalog Reader"
@@ -319,7 +319,7 @@ az ad sp delete --id $SP_ID
319319
If you receive an error when creating the service principal, verify that:
320320

321321
- The partner's application ID is correct
322-
- The partner's application is configured for multi-tenant access
322+
- The partner's application is configured for multitenant access
323323
- You have Application Administrator or Global Administrator role
324324

325325
### Admin consent fails

0 commit comments

Comments
 (0)