From 914fb832acefac3d0fe41977b7cc6bff8aceb33d Mon Sep 17 00:00:00 2001 From: Ryan Puffer Date: Tue, 30 Aug 2016 16:33:48 -0700 Subject: [PATCH 1/3] Fixed broken links to DC appendix and Role Capabilities info --- jea/end-to-end---active-directory.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/jea/end-to-end---active-directory.md b/jea/end-to-end---active-directory.md index f3dbaf50ab2f..5f16b49e1027 100644 --- a/jea/end-to-end---active-directory.md +++ b/jea/end-to-end---active-directory.md @@ -23,7 +23,6 @@ This section will walk through authoring a Session Configuration and Role Capabi To follow this section step-by-step, you'll need to be operating on a domain controller. If you don't have access to your domain controller, don't worry. Try to follow along with by working against some other scenario or role with which you are familiar. -If you want to quickly set up a new domain controller, check out the [Creating a Domain Controller appendix](#creating-a-domain-controller). ## Steps to Make a new Role Capability and Session Configuration @@ -159,7 +158,7 @@ Set-ADUser -Identity $Identity -ChangePasswordAtLogon Now, your users can simply call `Reset-ContosoUserPassword` and not have to remember the syntax to create a secure string inline. ## Step 4: Edit the Role Capability File -In the [Role Capability Creation](#role-capability-creation) section, you created a blank Role Capability file. +In the [Role Capability Creation](./role-capabilities.md#role-capability-creation) section, you created a blank Role Capability file. In this section, you will fill in the values in that file. Start by opening the role capability file in PowerShell ISE. From 51ab69255ed3bb68d9b2a91acd1a6df10ca5ed59 Mon Sep 17 00:00:00 2001 From: Ryan Puffer Date: Tue, 30 Aug 2016 16:34:44 -0700 Subject: [PATCH 2/3] Revert "Fixed broken links to DC appendix and Role Capabilities info" This reverts commit 914fb832acefac3d0fe41977b7cc6bff8aceb33d. --- jea/end-to-end---active-directory.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/jea/end-to-end---active-directory.md b/jea/end-to-end---active-directory.md index 5f16b49e1027..f3dbaf50ab2f 100644 --- a/jea/end-to-end---active-directory.md +++ b/jea/end-to-end---active-directory.md @@ -23,6 +23,7 @@ This section will walk through authoring a Session Configuration and Role Capabi To follow this section step-by-step, you'll need to be operating on a domain controller. If you don't have access to your domain controller, don't worry. Try to follow along with by working against some other scenario or role with which you are familiar. +If you want to quickly set up a new domain controller, check out the [Creating a Domain Controller appendix](#creating-a-domain-controller). ## Steps to Make a new Role Capability and Session Configuration @@ -158,7 +159,7 @@ Set-ADUser -Identity $Identity -ChangePasswordAtLogon Now, your users can simply call `Reset-ContosoUserPassword` and not have to remember the syntax to create a secure string inline. ## Step 4: Edit the Role Capability File -In the [Role Capability Creation](./role-capabilities.md#role-capability-creation) section, you created a blank Role Capability file. +In the [Role Capability Creation](#role-capability-creation) section, you created a blank Role Capability file. In this section, you will fill in the values in that file. Start by opening the role capability file in PowerShell ISE. From 33e92c7fd6039a1e3f5f784470c7bd0e43a7f030 Mon Sep 17 00:00:00 2001 From: Ryan Puffer Date: Tue, 30 Aug 2016 16:35:34 -0700 Subject: [PATCH 3/3] Fixed broken links to DC appendix and Role Capability info --- jea/end-to-end---active-directory.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/jea/end-to-end---active-directory.md b/jea/end-to-end---active-directory.md index f3dbaf50ab2f..6f44b7a48a90 100644 --- a/jea/end-to-end---active-directory.md +++ b/jea/end-to-end---active-directory.md @@ -23,7 +23,7 @@ This section will walk through authoring a Session Configuration and Role Capabi To follow this section step-by-step, you'll need to be operating on a domain controller. If you don't have access to your domain controller, don't worry. Try to follow along with by working against some other scenario or role with which you are familiar. -If you want to quickly set up a new domain controller, check out the [Creating a Domain Controller appendix](#creating-a-domain-controller). +If you want to quickly set up a new domain controller, check out the [Creating a Domain Controller appendix](.\creating-a-domain-controller.md). ## Steps to Make a new Role Capability and Session Configuration @@ -159,7 +159,7 @@ Set-ADUser -Identity $Identity -ChangePasswordAtLogon Now, your users can simply call `Reset-ContosoUserPassword` and not have to remember the syntax to create a secure string inline. ## Step 4: Edit the Role Capability File -In the [Role Capability Creation](#role-capability-creation) section, you created a blank Role Capability file. +In the [Role Capability Creation](./role-capabilities.md#role-capability-creation) section, you created a blank Role Capability file. In this section, you will fill in the values in that file. Start by opening the role capability file in PowerShell ISE.