Proposed Pull Request Change

title description author ms.author ms.topic ms.date ai-usage ms.subservice
Configure Authentication for Edge RAG Preview Enabled by Azure Arc Learn how to configure authentication for Edge RAG deployment in Azure, including app registration, roles, and user assignments. cwatson-cat cwatson how-to 10/28/2025 ai-assisted edge-rag
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Configure Authentication for Edge RAG Preview Enabled by Azure Arc description: "Learn how to configure authentication for Edge RAG deployment in Azure, including app registration, roles, and user assignments." author: cwatson-cat ms.author: cwatson ms.topic: how-to ms.date: 10/28/2025 ai-usage: ai-assisted ms.subservice: edge-rag #CustomerIntent: As a cloud administrator, I want to prepare and configure authentication for Edge RAG so that I can securely connect to and manage the chat solution. --- # Configure authentication for Edge RAG Preview enabled by Azure Arc For your Edge RAG deployment, register an application, create app roles, and assign users or groups in Microsoft Entra ID. This article is part of the [deployment prerequisites checklist](complete-prerequisites.md) and also a prerequisite of [Quickstart: Install Edge RAG](quickstart-edge-rag.md). You might need to work with your Microsoft Entra or cloud administrator to configure authentication. [!INCLUDE [preview-notice](includes/preview-notice.md)] ## Prerequisites Before you begin, make sure you have: - An active Azure subscription. If you don't have a service subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) before you begin. - Microsoft Entra ID permissions: - Permissions to create a Microsoft Enterprise Entra [application](/entra/identity/enterprise-apps/add-application-portal). - Ability to add new or existing Microsoft Entra [users and groups](/entra/identity/enterprise-apps/add-application-portal-assign-users) to the application. ## Register an application in Entra ID Create and configure an application registration for Edge RAG in your Microsoft Entra ID tenant. 1. In the [Azure portal](https://portal.azure.com/), go to **Microsoft Entra ID**. 1. Go to the appropriate tenant and select **Manage** > **App registrations**. 1. Select **New registration** to create an application registration. :::image type="content" source="media/prepare-authentication/new-app-registration.png" alt-text="Screenshot that shows the new registration option on the top of the application registration page."::: 1. Enter *EdgeRAG* for **Name**. 1. Select **Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant**). 1. Select **Register**. :::image type="content" source="media/prepare-authentication/register-app.png" alt-text="Screenshot that shows the fields on the register an application page where you add an application name and select supported account types."::: 1. After the application is registered, go to the registration and select **Manage** > **Authentication**. 1. Select **Add a platform** > **Single-page application**. 1. Specify your domain name (for example, `https://arcrag.contoso.com/`) as the **Redirect URIs**. :::image type="content" source="media/prepare-authentication/configure-application.png" alt-text="Screenshot that shows the single-page application page where you configure redirect URLs and more." lightbox="media/prepare-authentication/configure-application.png"::: 1. Select **Configure**. 1. For **Supported account types**, select **Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)**. :::image type="content" source="media/prepare-authentication/supported-account-types.png" alt-text="Screenshot that shows the options for the supported account types with the last option selected."::: 1. Select **+ Add a platform** > **Mobile and desktop applications**. 1. For **Redirect URIs**, select `https://login.microsoftonline.com/common/oauth2/nativeclient`. 1. Select **Configure**. ## Create app roles for Edge RAG Within the Edge RAG app registration, create app roles for AI application developers and end users of the chat endpoint. 1. In the app registration, on the left-hand side menu, under **Manage**, select **App roles**. 1. Create two app roles. One for *EdgeRAGDeveloper* and another for *EdgeRAGEndUser*. Use the appropriate values listed in the table that follows the image. :::image type="content" source="media/prepare-authentication/app-roles.png" alt-text="Screenshot that shows the two app roles created for the developer and user."::: | Field | Value | |--------|-------| | Display name | *EdgeRAGDeveloper* or *EdgeRAGEndUser* | | Allowed member types | User/Groups | | Value | *EdgeRAGDeveloper* or *EdgeRAGEndUser* | | Description | *EdgeRAGDeveloper* or *EdgeRAGEndUser* | | Do you want to enable this app role? | Checked | 1. When complete, close the **App roles** page. ## Assign users or groups to roles Next, in the Microsoft Entra ID tenant, assign users or groups to the roles you created for Edge RAG. 1. In the Microsoft Entra ID tenant, on the left-hand side menu under **Manage**, select **Enterprise applications**. 1. Search for and select the *EdgeRag* application you created. 1. Go to **Manage** > **Properties**. 1. Disable **Assignment Required**. 1. On the left-hand side menu, select **Users and groups** > **Add user/group**. 1. Select users and/or groups and assign **EdgeRAGDeveloper** or **EdgeRAGEndUser** role as appropriate. Assign both roles to the developers working on the chat solution. 1. When complete, close the **Users and groups** page. ## (Optional) Get app and tenant IDs If you plan to use the [quickstart](quickstart-edge-rag.md) or want to deploy Edge RAG by using the command line, get the application ID for the registration you created and the tenant ID. 1. In the [Azure portal](https://portal.azure.com/), search for **app registration**. 1. Select the Edge RAG registration you created. 1. Copy the **Application (client) ID** and **Directory (tenant) ID**. 1. Paste the values to an app like Windows Notepad to use later. ## Next step > [!div class="nextstepaction"] > [Install networking and observability components](prepare-networking-observability.md)
Success! Branch created successfully. Create Pull Request on GitHub
Error: