You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/planetary-computer/application-authentication.md
+17-3Lines changed: 17 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: prasadko
5
5
ms.author: prasadkomma
6
6
ms.service: planetary-computer-pro
7
7
ms.topic: how-to #Don't change
8
-
ms.date: 04/23/2025
8
+
ms.date: 01/09/2026
9
9
10
10
#customer intent: As a developer or administrator, I want to set up application authentication and access to Microsoft Planetary Computer Pro so that my applications can securely interact with its resources.
11
11
ms.custom:
@@ -19,6 +19,18 @@ This article provides step-by-step guidance for developers and administrators to
19
19
> [!NOTE]
20
20
> For applications that use Azure AD B2C or Microsoft Entra External ID supporting features like social identity providers, the applications need to continue using these identity solutions to proxy authentication traffic since Planetary Computer Pro doesn't support alternatives to Microsoft Entra ID authentication.
21
21
22
+
## Authentication options and recommendations
23
+
24
+
The following table summarizes the recommended authentication approach based on where your application runs and how it accesses resources:
25
+
26
+
| Application Hosting Environment | Access Type Required | Recommended Identity Type | Explanation |
|**Running on Azure** (VM, App Service, Functions, Container Apps, etc.) | App-Only (Application acts as itself) | Managed Identity (User-assigned recommended) |**Security & Manageability:** Eliminates the need to store and manage credentials (secrets or certificates) in code or configuration. Azure handles credential rotation automatically. User-assigned is preferred for sharing across multiple resources. |
29
+
|**Running on Azure** (VM, App Service, Functions, Container Apps, etc.) | Delegated (Application acts on behalf of a user) | Managed Identity (User-assigned recommended) |**Leverages Azure Integration:** Combines the security benefits of Managed Identity for the application itself with standard user authentication flows. Simplifies infrastructure setup within Azure. |
30
+
|**Running Outside Azure** (On-premises, other cloud, developer machine) | App-Only (Application acts as itself) | Service Principal |**Standard for External Apps:** The established method for non-Azure applications to authenticate with Microsoft Entra ID. Requires managing credentials (secrets or certificates) securely. |
31
+
|**Running Outside Azure** (On-premises, other cloud, developer machine) | Delegated (Application acts on behalf of a user) | Service Principal |**Standard for External Apps:** Enables standard OAuth 2.0 flows for user sign-in and consent for applications outside Azure, using the application's registered identity in Entra ID. |
32
+
|**Running Outside Azure (Alternative)**| App-Only or Delegated | Managed Identity |**Brings Azure Benefits:** By hosting the application in an Azure compute service (like a VM or Container App), it can use the enhanced security and manageability of Managed Identities, avoiding credential management even though the *origin* might be considered non-Azure. |
33
+
22
34
## Prerequisites
23
35
24
36
- Azure account with an active subscription - [create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn)
@@ -61,7 +73,7 @@ In this access scenario, a user signed into a client application. The client app
61
73
1. Select **Add a permission**
62
74
1. Select the **APIs my organization uses** tab
63
75
1. Type **Azure Orbital Planetary Computer** in the search field
64
-
1. Select on the matching entry (app ID should be 6388acc4-795e-43a9-a320-33075c1eb83b). It shows up as **Azure Orbital Microsoft Planetary Computer Pro**.
76
+
1. Select the matching entry (app ID should be 6388acc4-795e-43a9-a320-33075c1eb83b). It shows up as **Azure Orbital Microsoft Planetary Computer Pro**.
65
77
1. Select on **Delegated permissions** box. Check the box next to **user_impersonation**.
66
78
1. Select **Add permissions**
67
79
1. Select the "Grant admin consent" link (assuming your intent is to grant admin consent in the tenant for this permission)
@@ -119,8 +131,10 @@ If you can't use `DefaultAzureCredentials()` and instead use other methods such
119
131
## Next steps
120
132
121
133
> [!div class="nextstepaction"]
122
-
> [Build Applications with Microsoft Planetary Computer Pro](./use-explorer.md)
134
+
> [Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md)
123
135
124
136
## Related content
125
137
138
+
-[Build a web application with Microsoft Planetary Computer Pro](./build-web-application.md)
139
+
-[Use Azure Batch with Microsoft Planetary Computer Pro](./azure-batch.md)
126
140
-[Manage access for Microsoft Planetary Computer Pro](./manage-access.md)
Copy file name to clipboardExpand all lines: articles/planetary-computer/azure-batch.md
+30-12Lines changed: 30 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This quickstart shows you how to use Microsoft Planetary Computer P
4
4
author: meaghanlewis
5
5
ms.topic: quickstart
6
6
ms.service: planetary-computer-pro
7
-
ms.date: 04/24/2025
7
+
ms.date: 01/09/2026
8
8
ms.author: emiliod
9
9
#customer intent: I want to use Microsoft Planetary Computer Pro GeoCatalog in Azure Batch to process geospatial data.
10
10
ms.custom:
@@ -13,7 +13,19 @@ ms.custom:
13
13
14
14
# Quickstart: Use Microsoft Planetary Computer Pro GeoCatalog in Azure Batch
15
15
16
-
In this quickstart, you learn how to use Microsoft Planetary Computer Pro GeoCatalog resource in Azure Batch to process geospatial data. Planetary Computer Pro GeoCatalog is a geospatial data catalog that provides a unified view of your geospatial data assets across your organization. You can use Planetary Computer Pro GeoCatalog to discover, manage, and analyze your geospatial data.
16
+
In this quickstart, you learn how to use a Microsoft Planetary Computer Pro GeoCatalog resource in Azure Batch to process geospatial data at scale.
17
+
18
+
Azure Batch is a cloud-based job scheduling service that enables you to run large-scale parallel and high-performance computing (HPC) workloads. By combining Azure Batch with Microsoft Planetary Computer Pro, you can:
19
+
20
+
- Process large volumes of geospatial data in parallel across multiple compute nodes
21
+
- Authenticate securely to GeoCatalog APIs using managed identities
22
+
- Scale processing power up or down based on workload demands
23
+
- Automate geospatial data pipelines without managing infrastructure
24
+
25
+
This quickstart demonstrates how to set up a Batch pool with a user-assigned managed identity, configure permissions to access your GeoCatalog, and run jobs that query the STAC API.
26
+
27
+
> [!TIP]
28
+
> For an overview of application development options with Microsoft Planetary Computer Pro, see [Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md).
17
29
18
30
## Prerequisites
19
31
@@ -25,7 +37,7 @@ Before you begin, ensure you meet the following requirements to complete this qu
25
37
- [Azure CLI](/cli/azure/install-azure-cli)
26
38
- `perl` package.
27
39
28
-
## Create a batch account
40
+
## Create a Batch account
29
41
30
42
Create a resource group:
31
43
@@ -86,7 +98,7 @@ az identity create \
86
98
--resource-group spatiobatchdemo
87
99
```
88
100
89
-
Create a pool of compute nodes using the Azure Portal:
101
+
Create a pool of compute nodes using the Azure portal:
90
102
91
103
1. In the Azure portal, navigate to your Batch account and select **Pools**:
92
104
[](media/batch-pools-overview.png#lightbox)
@@ -100,7 +112,7 @@ Create a pool of compute nodes using the Azure Portal:
100
112
[](media/start-task-configuration-page.png#lightbox)
101
113
1. Select **OK** to create the pool.
102
114
103
-
## Assign Permissions to the Managed Identity
115
+
## Assign permissions to the managed identity
104
116
105
117
You need to provide the managed identity access to the GeoCatalog. Go to your GeoCatalog, select on **Access control (IAM)** and select **Add role assignment**:
106
118
@@ -114,7 +126,7 @@ Select the managed identity you created and then select **Review + assign**.
114
126
115
127
[](media/select-review-assign.png#lightbox)
116
128
117
-
## Prepare the Batch Job
129
+
## Prepare the Batch job
118
130
119
131
Create a container in the storage account:
120
132
@@ -134,11 +146,11 @@ az storage blob upload \
134
146
--account-name spatiobatchstorage
135
147
```
136
148
137
-
## Run the Batch Jobs
149
+
## Run the Batch jobs
138
150
139
151
There are two examples in this quickstart: a **Python script**, and a **Bash script**. You can use either of them to create a job.
140
152
141
-
### Python Script Job
153
+
### Python script job
142
154
143
155
To execute the Python script job, execute the following commands:
144
156
@@ -182,7 +194,7 @@ az batch task file download \
182
194
--destination /dev/stdout
183
195
```
184
196
185
-
### Bash Job
197
+
### Bash job
186
198
187
199
To execute the Bash script job, run the following commands:
188
200
@@ -212,6 +224,12 @@ az batch task file download \
212
224
213
225
## Related content
214
226
215
-
- For more information about managed identities in batch pools, see [Configure managed identities in Batch pools](/azure/batch/managed-identity-pools) documentation.
216
-
217
-
- For more information about how to deploy files to your Batch account, see [Copy applications and data to pool nodes](/azure/batch/batch-applications-to-pool-nodes), [Deploy applications to compute nodes with Batch application packages](/azure/batch/batch-application-packages), and [Creating and using resource files](/azure/batch/resource-files).
227
+
-[Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md)
228
+
-[Configure application authentication for Microsoft Planetary Computer Pro](./application-authentication.md)
229
+
-[Build a web application with Microsoft Planetary Computer Pro](./build-web-application.md)
230
+
-[Use the Microsoft Planetary Computer Pro Explorer](./use-explorer.md)
231
+
-[Manage access to Microsoft Planetary Computer Pro](./manage-access.md)
232
+
-[Configure managed identities in Batch pools](/azure/batch/managed-identity-pools)
233
+
-[Copy applications and data to pool nodes](/azure/batch/batch-applications-to-pool-nodes)
234
+
-[Deploy applications to compute nodes with Batch application packages](/azure/batch/batch-application-packages)
235
+
-[Creating and using resource files](/azure/batch/resource-files)
0 commit comments