Skip to content

Commit fc72d16

Browse files
authored
Merge pull request #132290 from atikmapari/broken-link-fix-sep28
Broken link fix
2 parents cdbee6e + bbf66a6 commit fc72d16

File tree

76 files changed

+197
-140
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+197
-140
lines changed

articles/active-directory/develop/brokered-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ keytool -exportcert -alias androiddebugkey -keystore %HOMEPATH%\.android\debug.k
9090

9191
Once you've generated a signature hash with *keytool*, use the Azure portal to generate the redirect URI:
9292

93-
1. Sign in to the [Azure portal](https://protal.azure.com) and select your Android app in **App registrations**.
93+
1. Sign in to the [Azure portal](https://portal.azure.com) and select your Android app in **App registrations**.
9494
1. Select **Authentication** > **Add a platform** > **Android**.
9595
1. In the **Configure your Android app** pane that opens, enter the **Signature hash** that you generated earlier and a **Package name**.
9696
1. Select the **Configure** button.

articles/active-directory/saas-apps/apple-business-manager-provision-tutorial.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
5353
2. Click Settings at the bottom of the sidebar click Data Source below Organization Settings, then click Connect to Data Source.
5454
3. Click Connect next to SCIM, carefully read the warning, click Copy, then click Close.
5555
[The Connect to SCIM window, which provides a token and a Copy button under it.]
56-
Leave this window open to copy the Tenant URL from Apple Business Manager to Azure AD, which is: https://federation.apple.com/feeds/business/scim
56+
Leave this window open to copy the Tenant URL from Apple Business Manager to Azure AD, which is: 'https://federation.apple.com/feeds/business/scim'
5757

5858
![Apple Business Manager](media/applebusinessmanager-provisioning-tutorial/scim-token.png)
5959

@@ -149,15 +149,15 @@ Once you've configured provisioning, use the following resources to monitor your
149149

150150
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
151151
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
152-
* [Review SCIM requirements for Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apdd88331cd6)
153-
* [How a Person ID is used in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd69e1e48e9)
154-
* [Use SCIM to import users into Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd3ec7b95ad)
155-
* [Resolve SCIM user account conflicts in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd313013d12)
156-
* [Delete Azure AD accounts that appear in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apdaa5798fbe)
157-
* [View SCIM activity in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd1bfd8dfde)
158-
* [Manage existing SCIM token and connections in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apdc9a823611)
159-
* [Disconnect the SCIM connection in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd609be3a61)
160-
* [Manage existing SCIM token and connections in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apdc9a8236e9)
152+
* [Review SCIM requirements for Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdd88331cd6)
153+
* [How a Person ID is used in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd69e1e48e9)
154+
* [Use SCIM to import users into Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd3ec7b95ad)
155+
* [Resolve SCIM user account conflicts in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd313013d12)
156+
* [Delete Azure AD accounts that appear in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdaa5798fbe)
157+
* [View SCIM activity in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd1bfd8dfde)
158+
* [Manage existing SCIM token and connections in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdc9a823611)
159+
* [Disconnect the SCIM connection in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd609be3a61)
160+
* [Manage existing SCIM token and connections in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdc9a8236e9)
161161
* [Troubleshooting the SCIM connection in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd403a0f3bd)
162162

163163
## Next steps

articles/active-directory/saas-apps/apple-school-manager-provision-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
5353
2. Click Settings at the bottom of the sidebar click Data Source below Organization Settings, then click Connect to Data Source.
5454
3. Click Connect next to SCIM, carefully read the warning, click Copy, then click Close.
5555
[The Connect to SCIM window, which provides a token and a Copy button under it.]
56-
Leave this window open to copy the Tenant URL from Apple Business Manager to Azure AD, which is: https://federation.apple.com/feeds/school/scim
56+
Leave this window open to copy the Tenant URL from Apple Business Manager to Azure AD, which is: 'https://federation.apple.com/feeds/school/scim'
5757

5858
![Apple School Manager](media/appleschoolmanager-provisioning-tutorial/scim-token.png)
5959

@@ -150,16 +150,16 @@ Once you've configured provisioning, use the following resources to monitor your
150150

151151
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
152152
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
153-
* [Review SCIM requirements for Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apdd88331cd6)
154-
* [How a Person ID is used in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd69e1e48e9)
155-
* [Use SCIM to import users into Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd3ec7b95ad)
156-
* [Resolve SCIM user account conflicts in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd313013d12)
157-
* [Delete Azure AD accounts that appear in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apdaa5798fbe)
158-
* [View SCIM activity in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd1bfd8dfde)
159-
* [Manage existing SCIM token and connections in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apdc9a823611)
160-
* [Disconnect the SCIM connection in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd609be3a61)
161-
* [Manage existing SCIM token and connections in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apdc9a8236e9)
162-
* [Troubleshooting the SCIM connection in Apple School Manager](URL=https://support.apple.com/guide/apple-school-manager/apd403a0f3bd)
153+
* [Review SCIM requirements for Apple School Manager](https://support.apple.com/guide/apple-school-manager/apdd88331cd6)
154+
* [How a Person ID is used in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd69e1e48e9)
155+
* [Use SCIM to import users into Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd3ec7b95ad)
156+
* [Resolve SCIM user account conflicts in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd313013d12)
157+
* [Delete Azure AD accounts that appear in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apdaa5798fbe)
158+
* [View SCIM activity in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd1bfd8dfde)
159+
* [Manage existing SCIM token and connections in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apdc9a823611)
160+
* [Disconnect the SCIM connection in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd609be3a61)
161+
* [Manage existing SCIM token and connections in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apdc9a8236e9)
162+
* [Troubleshooting the SCIM connection in Apple School Manager](https://support.apple.com/guide/apple-school-manager/apd403a0f3bd)
163163

164164
## Next steps
165165

articles/active-directory/saas-apps/maverics-identity-orchestrator-saml-connector-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This tutorial demonstrates how to migrate an on-premises web application that's
3131
4. Set up an Azure key vault, and configure Maverics to use it as its secrets management provider.
3232
5. Demonstrate user migration and session abstraction by using Maverics to provide access to an on-premises Java web application.
3333

34-
For additional installation and configuration instructions, go to the [Strata website](https://strata.io/docs).
34+
For additional installation and configuration instructions, go to the [Strata website](https://www.strata.io).
3535

3636
## Prerequisites
3737

@@ -41,7 +41,7 @@ subscription. To obtain the Maverics software, contact [Strata sales](mailto:sal
4141

4242
## Install Maverics Identity Orchestrator
4343

44-
To get started with the Maverics Identity Orchestrator installation, see the [installation instructions](https://strata.io/docs).
44+
To get started with the Maverics Identity Orchestrator installation, see the [installation instructions](https://www.strata.io).
4545

4646
### System requirements
4747
* Supported operating systems

articles/active-directory/saas-apps/myday-provision-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.author: Zhchia
2020

2121
# Tutorial: Configure myday for automatic user provisioning
2222

23-
This tutorial describes the steps you need to perform in both myday and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [myday](https://www.mydaycloud.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
23+
This tutorial describes the steps you need to perform in both myday and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [myday](https://go.mydaycloud.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
2424

2525

2626
## Capabilities supported

articles/app-service/security-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,8 @@ This article contains security recommendations for Azure App Service. Implementi
5353

5454
| Recommendation | Comments |
5555
|-|-|
56-
|Use Azure Security Center standard tier | [Azure Security Center](../security-center/security-center-app-services.md) is natively integrated with Azure App Service. It can run assessments and provide security recommendations. |
56+
|Use Azure Security Center standard tier | [Azure Security Center](https://docs.microsoft.com/azure/security-center/defender-for-app-service-introduction) is natively integrated with Azure App Service. It can run assessments and provide security recommendations. |
5757

5858
## Next steps
5959

60-
Check with your application provider to see if there are additional security requirements. For more information on developing secure applications, see [Secure Development Documentation](https://azure.microsoft.com/resources/develop-secure-applications-on-azure/).
60+
Check with your application provider to see if there are additional security requirements. For more information on developing secure applications, see [Secure Development Documentation](https://azure.microsoft.com/resources/develop-secure-applications-on-azure/).

articles/azure-arc/data/create-data-controller-using-azdata.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ To create a data controller on Azure Red Hat OpenShift, you will need to execute
149149
> [!NOTE]
150150
> Use the same namespace here and in the `azdata arc dc create` command below. Example is `arc`.
151151
152-
First, download the custom security context constraint (SCC) from [GitHub](https://raw.githubusercontent.com/microsoft/azure_arc/master/data_services/deployment/yaml/arc-data-scc.yaml) and apply it to your cluster.
152+
First, download the custom security context constraint (SCC) from [GitHub](https://github.com/microsoft/azure_arc/tree/master/arc_data_services/deploy/yaml) and apply it to your cluster.
153153

154154
You can run the following command to create the data controller:
155155
> [!NOTE]

articles/azure-arc/data/create-postgresql-hyperscale-server-group-kubernetes-native-tools.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To create a PostgreSQL Hyperscale server group, you need to create a Kubernetes
2929

3030
## Create a yaml file
3131

32-
You can use the [template yaml](https://raw.githubusercontent.com/microsoft/azure_arc/master/arc_data_services/deploy/yaml/postgresql.yaml) file as a starting point to create your own custom PostgreSQL Hyperscale server group yaml file. Download this file to your local computer and open it in a text editor. It is useful to use a text editor such as [VS Code](https://code.visualstudio.com/download) that support syntax highlighting and linting for yaml files.
32+
You can use the [template yaml](https://raw.githubusercontent.com/microsoft/azure_arc/master/arc_data_services/deploy/yaml/postsgresql.yaml) file as a starting point to create your own custom PostgreSQL Hyperscale server group yaml file. Download this file to your local computer and open it in a text editor. It is useful to use a text editor such as [VS Code](https://code.visualstudio.com/download) that support syntax highlighting and linting for yaml files.
3333

3434
This is an example yaml file:
3535

articles/azure-arc/data/delete-azure-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,4 +92,4 @@ az resource delete --name <data controller name> --resource-type Microsoft.Azure
9292

9393
### Delete a resource group using the Azure CLI
9494

95-
You can also use the Azure CLI to [delete a resource group](/azure-resource-manager/management/delete-resource-group).
95+
You can also use the Azure CLI to [delete a resource group](/azure/azure-resource-manager/management/delete-resource-group).

articles/azure-arc/data/retrieve-the-username-password-for-data-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,4 +56,4 @@ Run the following command to retrieve the password:
5656

5757
## Next steps
5858

59-
Try out other [scenarios](https://github.com/microsoft/Azure-data-services-on-Azure-Arc/tree/master/scenarios)
59+
Try out other [scenarios](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory-domain-services/scenarios.md)

0 commit comments

Comments
 (0)