Skip to content

Commit c8acd40

Browse files
authored
Merge pull request #309161 from prasadko/build-web-application
Add quickstart: Build a web application with Microsoft Planetary Computer Pro
2 parents 14369dc + 365ecee commit c8acd40

20 files changed

Lines changed: 789 additions & 73 deletions

articles/planetary-computer/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,14 +73,16 @@
7373
href: queryables-for-explorer-custom-search-filter.md
7474
- name: Supported color maps
7575
href: supported-colormaps.md
76-
- name: Build and use applications
76+
- name: Connect and build applications
7777
items:
78-
- name: Build applications
78+
- name: Connect and build applications with your data
7979
href: build-applications-with-planetary-computer-pro.md
8080
- name: Use the explorer
8181
href: use-explorer.md
8282
- name: Application authentication
8383
href: application-authentication.md
84+
- name: Build a web application
85+
href: build-web-application.md
8486
- name: Connect to ArcGIS Pro
8587
href: create-connection-arc-gis-pro.md
8688
- name: Connect to QGIS

articles/planetary-computer/application-authentication.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: prasadko
55
ms.author: prasadkomma
66
ms.service: planetary-computer-pro
77
ms.topic: how-to #Don't change
8-
ms.date: 04/23/2025
8+
ms.date: 01/09/2026
99

1010
#customer intent: As a developer or administrator, I want to set up application authentication and access to Microsoft Planetary Computer Pro so that my applications can securely interact with its resources.
1111
ms.custom:
@@ -19,6 +19,18 @@ This article provides step-by-step guidance for developers and administrators to
1919
> [!NOTE]
2020
> For applications that use Azure AD B2C or Microsoft Entra External ID supporting features like social identity providers, the applications need to continue using these identity solutions to proxy authentication traffic since Planetary Computer Pro doesn't support alternatives to Microsoft Entra ID authentication.
2121
22+
## Authentication options and recommendations
23+
24+
The following table summarizes the recommended authentication approach based on where your application runs and how it accesses resources:
25+
26+
| Application Hosting Environment | Access Type Required | Recommended Identity Type | Explanation |
27+
| :------------------------------ | :------------------- | :------------------------------- | :-------------------------------------------------------------------------------------------------------------------------------------------------------- |
28+
| **Running on Azure** (VM, App Service, Functions, Container Apps, etc.) | App-Only (Application acts as itself) | Managed Identity (User-assigned recommended) | **Security & Manageability:** Eliminates the need to store and manage credentials (secrets or certificates) in code or configuration. Azure handles credential rotation automatically. User-assigned is preferred for sharing across multiple resources. |
29+
| **Running on Azure** (VM, App Service, Functions, Container Apps, etc.) | Delegated (Application acts on behalf of a user) | Managed Identity (User-assigned recommended) | **Leverages Azure Integration:** Combines the security benefits of Managed Identity for the application itself with standard user authentication flows. Simplifies infrastructure setup within Azure. |
30+
| **Running Outside Azure** (On-premises, other cloud, developer machine) | App-Only (Application acts as itself) | Service Principal | **Standard for External Apps:** The established method for non-Azure applications to authenticate with Microsoft Entra ID. Requires managing credentials (secrets or certificates) securely. |
31+
| **Running Outside Azure** (On-premises, other cloud, developer machine) | Delegated (Application acts on behalf of a user) | Service Principal | **Standard for External Apps:** Enables standard OAuth 2.0 flows for user sign-in and consent for applications outside Azure, using the application's registered identity in Entra ID. |
32+
| **Running Outside Azure (Alternative)** | App-Only or Delegated | Managed Identity | **Brings Azure Benefits:** By hosting the application in an Azure compute service (like a VM or Container App), it can use the enhanced security and manageability of Managed Identities, avoiding credential management even though the *origin* might be considered non-Azure. |
33+
2234
## Prerequisites
2335

2436
- Azure account with an active subscription - [create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn)
@@ -61,7 +73,7 @@ In this access scenario, a user signed into a client application. The client app
6173
1. Select **Add a permission**
6274
1. Select the **APIs my organization uses** tab
6375
1. Type **Azure Orbital Planetary Computer** in the search field
64-
1. Select on the matching entry (app ID should be 6388acc4-795e-43a9-a320-33075c1eb83b). It shows up as **Azure Orbital Microsoft Planetary Computer Pro**.
76+
1. Select the matching entry (app ID should be 6388acc4-795e-43a9-a320-33075c1eb83b). It shows up as **Azure Orbital Microsoft Planetary Computer Pro**.
6577
1. Select on **Delegated permissions** box. Check the box next to **user_impersonation**.
6678
1. Select **Add permissions**
6779
1. Select the "Grant admin consent" link (assuming your intent is to grant admin consent in the tenant for this permission)
@@ -119,8 +131,10 @@ If you can't use `DefaultAzureCredentials()` and instead use other methods such
119131
## Next steps
120132

121133
> [!div class="nextstepaction"]
122-
> [Build Applications with Microsoft Planetary Computer Pro](./use-explorer.md)
134+
> [Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md)
123135
124136
## Related content
125137

138+
- [Build a web application with Microsoft Planetary Computer Pro](./build-web-application.md)
139+
- [Use Azure Batch with Microsoft Planetary Computer Pro](./azure-batch.md)
126140
- [Manage access for Microsoft Planetary Computer Pro](./manage-access.md)

articles/planetary-computer/azure-batch.md

Lines changed: 30 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This quickstart shows you how to use Microsoft Planetary Computer P
44
author: meaghanlewis
55
ms.topic: quickstart
66
ms.service: planetary-computer-pro
7-
ms.date: 04/24/2025
7+
ms.date: 01/09/2026
88
ms.author: emiliod
99
#customer intent: I want to use Microsoft Planetary Computer Pro GeoCatalog in Azure Batch to process geospatial data.
1010
ms.custom:
@@ -13,7 +13,19 @@ ms.custom:
1313

1414
# Quickstart: Use Microsoft Planetary Computer Pro GeoCatalog in Azure Batch
1515

16-
In this quickstart, you learn how to use Microsoft Planetary Computer Pro GeoCatalog resource in Azure Batch to process geospatial data. Planetary Computer Pro GeoCatalog is a geospatial data catalog that provides a unified view of your geospatial data assets across your organization. You can use Planetary Computer Pro GeoCatalog to discover, manage, and analyze your geospatial data.
16+
In this quickstart, you learn how to use a Microsoft Planetary Computer Pro GeoCatalog resource in Azure Batch to process geospatial data at scale.
17+
18+
Azure Batch is a cloud-based job scheduling service that enables you to run large-scale parallel and high-performance computing (HPC) workloads. By combining Azure Batch with Microsoft Planetary Computer Pro, you can:
19+
20+
- Process large volumes of geospatial data in parallel across multiple compute nodes
21+
- Authenticate securely to GeoCatalog APIs using managed identities
22+
- Scale processing power up or down based on workload demands
23+
- Automate geospatial data pipelines without managing infrastructure
24+
25+
This quickstart demonstrates how to set up a Batch pool with a user-assigned managed identity, configure permissions to access your GeoCatalog, and run jobs that query the STAC API.
26+
27+
> [!TIP]
28+
> For an overview of application development options with Microsoft Planetary Computer Pro, see [Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md).
1729
1830
## Prerequisites
1931

@@ -25,7 +37,7 @@ Before you begin, ensure you meet the following requirements to complete this qu
2537
- [Azure CLI](/cli/azure/install-azure-cli)
2638
- `perl` package.
2739

28-
## Create a batch account
40+
## Create a Batch account
2941

3042
Create a resource group:
3143

@@ -86,7 +98,7 @@ az identity create \
8698
--resource-group spatiobatchdemo
8799
```
88100

89-
Create a pool of compute nodes using the Azure Portal:
101+
Create a pool of compute nodes using the Azure portal:
90102

91103
1. In the Azure portal, navigate to your Batch account and select **Pools**:
92104
[ ![Screenshot of the Azure portal showing the Pools section of a Batch account, with options to add and manage pools.](media/batch-pools-overview.png) ](media/batch-pools-overview.png#lightbox)
@@ -100,7 +112,7 @@ Create a pool of compute nodes using the Azure Portal:
100112
[ ![Screenshot of the Start Task configuration page for a Batch pool. The page includes fields to specify a command line script, elevation level, and other settings for initializing compute nodes.](media/start-task-configuration-page.png) ](media/start-task-configuration-page.png#lightbox)
101113
1. Select **OK** to create the pool.
102114

103-
## Assign Permissions to the Managed Identity
115+
## Assign permissions to the managed identity
104116

105117
You need to provide the managed identity access to the GeoCatalog. Go to your GeoCatalog, select on **Access control (IAM)** and select **Add role assignment**:
106118

@@ -114,7 +126,7 @@ Select the managed identity you created and then select **Review + assign**.
114126

115127
[ ![Screenshot of the Azure portal showing the Select identity page. The page includes a list of available managed identities, allowing users to choose the identity they want to assign to the Batch pool.](media/select-review-assign.png) ](media/select-review-assign.png#lightbox)
116128

117-
## Prepare the Batch Job
129+
## Prepare the Batch job
118130

119131
Create a container in the storage account:
120132

@@ -134,11 +146,11 @@ az storage blob upload \
134146
--account-name spatiobatchstorage
135147
```
136148

137-
## Run the Batch Jobs
149+
## Run the Batch jobs
138150

139151
There are two examples in this quickstart: a **Python script**, and a **Bash script**. You can use either of them to create a job.
140152

141-
### Python Script Job
153+
### Python script job
142154

143155
To execute the Python script job, execute the following commands:
144156

@@ -182,7 +194,7 @@ az batch task file download \
182194
--destination /dev/stdout
183195
```
184196

185-
### Bash Job
197+
### Bash job
186198

187199
To execute the Bash script job, run the following commands:
188200

@@ -212,6 +224,12 @@ az batch task file download \
212224

213225
## Related content
214226

215-
- For more information about managed identities in batch pools, see [Configure managed identities in Batch pools](/azure/batch/managed-identity-pools) documentation.
216-
217-
- For more information about how to deploy files to your Batch account, see [Copy applications and data to pool nodes](/azure/batch/batch-applications-to-pool-nodes), [Deploy applications to compute nodes with Batch application packages](/azure/batch/batch-application-packages), and [Creating and using resource files](/azure/batch/resource-files).
227+
- [Connect and build applications with your data](./build-applications-with-planetary-computer-pro.md)
228+
- [Configure application authentication for Microsoft Planetary Computer Pro](./application-authentication.md)
229+
- [Build a web application with Microsoft Planetary Computer Pro](./build-web-application.md)
230+
- [Use the Microsoft Planetary Computer Pro Explorer](./use-explorer.md)
231+
- [Manage access to Microsoft Planetary Computer Pro](./manage-access.md)
232+
- [Configure managed identities in Batch pools](/azure/batch/managed-identity-pools)
233+
- [Copy applications and data to pool nodes](/azure/batch/batch-applications-to-pool-nodes)
234+
- [Deploy applications to compute nodes with Batch application packages](/azure/batch/batch-application-packages)
235+
- [Creating and using resource files](/azure/batch/resource-files)

0 commit comments

Comments
 (0)