Adding template to demonstrate Azure AI integration of users, applications and enterprise data, using OAuth 2.0 token intelligence#773
Conversation
There was a problem hiding this comment.
Pull request overview
Adds a new community azd template entry to the Awesome azd gallery for the Curity autonomous AI agent sample, along with an associated preview image asset.
Changes:
- Added a new template card entry to
website/static/templates.jsonforcurityio/azd-ai-autonomous-agent - Added a new preview image asset under
website/static/templates/images/
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated 3 comments.
| File | Description |
|---|---|
| website/static/templates.json | Registers the new template in the gallery, including tags, services, IaC, and preview image reference |
| website/static/templates/images/curity-autonomous-ai-agent.jpg | Adds the template’s preview image asset |
| "authorUrl": "https://curity.io", | ||
| "author": "Curity Team", | ||
| "source": "https://github.com/curityio/azd-ai-autonomous-agent", | ||
| "tags": [ |
There was a problem hiding this comment.
I came here to say the same! Thank you @hemarina and @v-xuto.
Notes:
- README hits everything in our standards 🙌
- Please check:
infra/hooks/gateway-internal/preprovision.shlines 28-29, the CONTAINER_REGISTRY_NAME is used before it's set. The external gateway script has these two lines in the correct order. Fix: swap lines 28 and 29.
There was a problem hiding this comment.
Cool - I fixed that up.
The parent script infra/hooks/preprovision.sh loads environmental values to use in its logic.
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
|
@microsoft-github-policy-service agree company="Curity" |
Thanks @v-xuto, I believe I have provided resolutions in the issues you raised, so I wonder if you can retry when you get some time? I will then close the issues if you don't disagree. |
@v-xuto will you re-test and sign off once you confirm? |
|
@gary-archer Issue#2 has been verified as fixed. Issue#1 still has a minor problem; We’ve added comments—please review. In addition, during retesting we found a new issue; please review it as well. |
Yes, we will retest. If everything looks good, we will add the relevant comments. |
|
Great - thanks for all of your efforts, which have resulted in some nice improvements. This GitHub repo provides a quite complex end-to-end Azure deployment. You have the local flow working, and hopefully we are not far from getting the deployed flow working. There are 3 open issues and I have updated them all. The first two of these have straightforward resolutions and hopefully we can close them quickly:
The third issue seems to be more complex. Perhaps your Microsoft environment may differ to mine when it comes to Entra ID. So I'll need you to check a few things about your environment to enable us to resolve that issue. Hopefully my suggestions lead us to a resolution. When you get some time, could you please check them and report back. Regards. |
Noted, I have pinged the team on this. |
|
hey @v-xuto, will you share an update on your latest testing? |
|
An update from me: @weikanglim provided some insights in this issue and suggested that we use the following test flow to avoid prompts:
To avoid secrets on disk, I updated the local deployment to save secrets to an Azure key vault. This enables ENTRA ID ISSUE In previous testing, though, you experienced this unexplained Entra ID issue, which seems to prevent you from completing the deployment. I wondered if @x-vuto could troubleshoot this, starting by double checking that you have an Entra ID tenant. I would be happy to jump on a call of that helps, @kristenwomack. |
Please fill out this template! There are three different types of contributions, feel free to delete the checklists that are not applicable to your contribution type.
If you are submitting a new
azdtemplate to the galleryFill this out if you want your template to be added to the awesome-azd gallery!
Your template repository
Place your template repository link here: https://github.com/curityio/azd-ai-autonomous-agent
[✓] Template title - Azure AI integration of customer users with C# applications and enterprise data, using OAuth 2.0 token intelligence.
[✓] Description - A secured A2A and MCP flow, where customer users send commands to backend agents and resource servers apply token-based authorization. Includes a container apps deployment where tokens enable agents to complete complex flows, while resource servers and API gateways can apply dynamic access controls.
[✓] Architecture Diagram or Application Screenshot - Added to
website/static/templates/images/curity-autonomous-ai-agent.png[✓] Link to Author's GitHub or other relevant website - https://curity.io
[✓] Author's Name - Curity Team / Gary Archer
[✓] Link to template source - Link to the template GitHub repo
[✓] Tags -
community,a2a,mcp,ai,oauth2[✓] Languages Tags -
dotnetCsharp[✓] Azure Services Tags -
aca,aifoundry,managedidentity,azuresql,vnets[✓] ID -
4218b822-4eca-451e-8b9b-c89a9be0dec5Required tags:
"msft") or Community-authored ("community") - community"bicep"or"terraform") - bicep"new"tag for any newly authored templates - newPoints of Interest