Skip to content

Commit 08dacad

Browse files
authored
Merge pull request #248276 from alexbuckgit/alexbuckgit/docutune-autopr-20230815-012944-0626238-ignore-build
[BULK] DocuTune - Update stale local links (part 6)
2 parents 92d9e3c + 405aa6c commit 08dacad

File tree

50 files changed

+133
-132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+133
-132
lines changed

articles/active-directory/devices/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ There are three ways to get a device identity:
2727
- Azure AD join
2828
- Hybrid Azure AD join
2929

30-
Device identities are a prerequisite for scenarios like [device-based Conditional Access policies](../conditional-access/require-managed-devices.md) and [Mobile Device Management with the Microsoft Intune family of products](/mem/endpoint-manager-overview).
30+
Device identities are a prerequisite for scenarios like [device-based Conditional Access policies](../conditional-access/concept-conditional-access-grant.md) and [Mobile Device Management with the Microsoft Intune family of products](/mem/endpoint-manager-overview).
3131

3232
## Modern device scenario
3333

@@ -58,4 +58,4 @@ Getting devices in to Azure AD can be done in a self-service manner or a control
5858
- Learn more about [Azure AD joined devices](concept-directory-join.md)
5959
- Learn more about [hybrid Azure AD joined devices](concept-hybrid-join.md)
6060
- To get an overview of how to manage device identities in the Azure portal, see [Managing device identities using the Azure portal](manage-device-identities.md).
61-
- To learn more about device-based Conditional Access, see [Configure Azure Active Directory device-based Conditional Access policies](../conditional-access/require-managed-devices.md).
61+
- To learn more about device-based Conditional Access, see [Configure Azure Active Directory device-based Conditional Access policies](../conditional-access/concept-conditional-access-grant.md).

articles/active-directory/devices/plan-device-deployment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The key benefits of giving your devices an Azure AD identity:
4545

4646
> [!VIDEO https://www.youtube-nocookie.com/embed/NcONUf-jeS4]
4747
48-
* Improve user experience – Provide your users with easy access to your organization’s cloud-based resources from both personal and corporate devices. Administrators can enable [Enterprise State Roaming](enterprise-state-roaming-overview.md) for a unified experience across all Windows devices.
48+
* Improve user experience – Provide your users with easy access to your organization’s cloud-based resources from both personal and corporate devices. Administrators can enable [Enterprise State Roaming](./enterprise-state-roaming-enable.md) for a unified experience across all Windows devices.
4949

5050
* Simplify deployment and management – Simplify the process of bringing devices to Azure AD with [Windows Autopilot](/windows/deployment/windows-autopilot/windows-10-autopilot), [bulk provisioning](/mem/intune/enrollment/windows-bulk-enroll), or [self-service: Out of Box Experience (OOBE)](https://support.microsoft.com/account-billing/join-your-work-device-to-your-work-or-school-network-ef4d6adb-5095-4e51-829e-5457430f3973). Manage devices with Mobile Device Management (MDM) tools like [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), and their identities in the [Azure portal](https://portal.azure.com/).
5151

@@ -55,7 +55,7 @@ Consider your organizational needs while you determine the strategy for this dep
5555

5656
### Engage the right stakeholders
5757

58-
When technology projects fail, they typically do because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders,](../fundamentals/deployment-plans.md) and that stakeholder roles in the project are well understood.
58+
When technology projects fail, they typically do because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders,](../architecture/deployment-plans.md) and that stakeholder roles in the project are well understood.
5959

6060
For this plan, add the following stakeholders to your list:
6161

@@ -72,7 +72,7 @@ Communication is critical to the success of any new service. Proactively communi
7272

7373
### Plan a pilot
7474

75-
We recommend that the initial configuration of your integration method is in a test environment, or with a small group of test devices. See [Best practices for a pilot](../fundamentals/deployment-plans.md).
75+
We recommend that the initial configuration of your integration method is in a test environment, or with a small group of test devices. See [Best practices for a pilot](../architecture/deployment-plans.md).
7676

7777
You may want to do a [targeted deployment of hybrid Azure AD join](hybrid-join-control.md) before enabling it across the entire organization.
7878

@@ -124,7 +124,7 @@ Conditional Access <br>(Require hybrid Azure AD joined devices) | | | ![Checkmar
124124

125125
Registered devices are often managed with [Microsoft Intune](/mem/intune/enrollment/device-enrollment). Devices are enrolled in Intune in several ways, depending on the operating system.
126126

127-
Azure AD registered devices provide support for Bring Your Own Devices (BYOD) and corporate owned devices to SSO to cloud resources. Access to resources is based on the Azure AD [Conditional Access policies](../conditional-access/require-managed-devices.md) applied to the device and the user.
127+
Azure AD registered devices provide support for Bring Your Own Devices (BYOD) and corporate owned devices to SSO to cloud resources. Access to resources is based on the Azure AD [Conditional Access policies](../conditional-access/concept-conditional-access-grant.md) applied to the device and the user.
128128

129129
### Registering devices
130130

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To troubleshoot other Windows clients, see [Troubleshoot hybrid Azure AD-joined
2929
This article assumes that you have [configured hybrid Azure AD-joined devices](hybrid-join-plan.md) to support the following scenarios:
3030

3131
- Device-based Conditional Access
32-
- [Enterprise state roaming](./enterprise-state-roaming-overview.md)
32+
- [Enterprise state roaming](./enterprise-state-roaming-enable.md)
3333
- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification)
3434

3535

@@ -149,7 +149,7 @@ Possible reasons for failure:
149149

150150
- The service connection point object is misconfigured or can't be read from the domain controller.
151151
- A valid service connection point object is required in the AD forest, to which the device belongs, that points to a verified domain name in Azure AD.
152-
- For more information, see the "Configure a service connection point" section of [Tutorial: Configure hybrid Azure Active Directory join for federated domains](hybrid-azuread-join-federated-domains.md#configure-hybrid-azure-ad-join).
152+
- For more information, see the "Configure a service connection point" section of [Tutorial: Configure hybrid Azure Active Directory join for federated domains](./how-to-hybrid-join.md#configure-hybrid-azure-ad-join).
153153
- Failure to connect to and fetch the discovery metadata from the discovery endpoint.
154154
- The device should be able to access `https://enterpriseregistration.windows.net`, in the system context, to discover the registration and authorization endpoints.
155155
- If the on-premises environment requires an outbound proxy, the IT admin must ensure that the computer account of the device can discover and silently authenticate to the outbound proxy.
@@ -163,7 +163,7 @@ Possible reasons for failure:
163163
| --- | --- | --- |
164164
| **DSREG_AUTOJOIN_ADCONFIG_READ_FAILED** (0x801c001d/-2145648611) | Unable to read the service connection point (SCP) object and get the Azure AD tenant information. | Refer to the [Configure a service connection point](hybrid-join-manual.md#configure-a-service-connection-point) section. |
165165
| **DSREG_AUTOJOIN_DISC_FAILED** (0x801c0021/-2145648607) | Generic discovery failure. Failed to get the discovery metadata from the data replication service (DRS). | To investigate further, find the sub-error in the next sections. |
166-
| **DSREG_AUTOJOIN_DISC_WAIT_TIMEOUT** (0x801c001f/-2145648609) | Operation timed out while performing discovery. | Ensure that `https://enterpriseregistration.windows.net` is accessible in the system context. For more information, see the [Network connectivity requirements](hybrid-azuread-join-managed-domains.md#prerequisites) section. |
166+
| **DSREG_AUTOJOIN_DISC_WAIT_TIMEOUT** (0x801c001f/-2145648609) | Operation timed out while performing discovery. | Ensure that `https://enterpriseregistration.windows.net` is accessible in the system context. For more information, see the [Network connectivity requirements](./how-to-hybrid-join.md#prerequisites) section. |
167167
| **DSREG_AUTOJOIN_USERREALM_DISCOVERY_FAILED** (0x801c003d/-2145648579) | Generic realm discovery failure. Failed to determine domain type (managed/federated) from STS. | To investigate further, find the sub-error in the next sections. |
168168
| | |
169169

@@ -206,8 +206,8 @@ Use Event Viewer logs to look for the phase and error code for the join failures
206206

207207
| Error code | Reason | Resolution |
208208
| --- | --- | --- |
209-
| **WININET_E_CANNOT_CONNECT** (0x80072efd/-2147012867) | Connection with the server couldn't be established. | Ensure network connectivity to the required Microsoft resources. For more information, see [Network connectivity requirements](hybrid-azuread-join-managed-domains.md#prerequisites). |
210-
| **WININET_E_TIMEOUT** (0x80072ee2/-2147012894) | General network timeout. | Ensure network connectivity to the required Microsoft resources. For more information, see [Network connectivity requirements](hybrid-azuread-join-managed-domains.md#prerequisites). |
209+
| **WININET_E_CANNOT_CONNECT** (0x80072efd/-2147012867) | Connection with the server couldn't be established. | Ensure network connectivity to the required Microsoft resources. For more information, see [Network connectivity requirements](./how-to-hybrid-join.md#prerequisites). |
210+
| **WININET_E_TIMEOUT** (0x80072ee2/-2147012894) | General network timeout. | Ensure network connectivity to the required Microsoft resources. For more information, see [Network connectivity requirements](./how-to-hybrid-join.md#prerequisites). |
211211
| **WININET_E_DECODING_FAILED** (0x80072f8f/-2147012721) | Network stack was unable to decode the response from the server. | Ensure that the network proxy isn't interfering and modifying the server response. |
212212
| | |
213213

@@ -261,7 +261,7 @@ Use Event Viewer logs to locate the error code, sub-error code, server error cod
261261

262262
| Error code | Reason | Resolution |
263263
| --- | --- | --- |
264-
| **ERROR_ADAL_INTERNET_TIMEOUT** (0xcaa82ee2/-894947614) | General network timeout. | Ensure that `https://login.microsoftonline.com` is accessible in the system context. Ensure that the on-premises identity provider is accessible in the system context. For more information, see [Network connectivity requirements](hybrid-azuread-join-managed-domains.md#prerequisites). |
264+
| **ERROR_ADAL_INTERNET_TIMEOUT** (0xcaa82ee2/-894947614) | General network timeout. | Ensure that `https://login.microsoftonline.com` is accessible in the system context. Ensure that the on-premises identity provider is accessible in the system context. For more information, see [Network connectivity requirements](./how-to-hybrid-join.md#prerequisites). |
265265
| **ERROR_ADAL_INTERNET_CONNECTION_ABORTED** (0xcaa82efe/-894947586) | Connection with the authorization endpoint was aborted. | Retry the join after a while, or try joining from another stable network location. |
266266
| **ERROR_ADAL_INTERNET_SECURE_FAILURE** (0xcaa82f8f/-894947441) | The Transport Layer Security (TLS) certificate (previously known as the Secure Sockets Layer [SSL] certificate) sent by the server couldn't be validated. | Check the client time skew. Retry the join after a while, or try joining from another stable network location. |
267267
| **ERROR_ADAL_INTERNET_CANNOT_CONNECT** (0xcaa82efd/-894947587) | The attempt to connect to `https://login.microsoftonline.com` failed. | Check the network connection to `https://login.microsoftonline.com`. |

articles/active-directory/devices/troubleshoot-primary-refresh-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -467,4 +467,4 @@ The following procedure describes how to capture traces by using the [Time Trave
467467
[server-errors]: #common-server-error-codes-aadsts-prefix
468468
[view-event-ids]: #method-2-use-event-viewer-to-examine-azure-ad-analytic-and-operational-logs
469469
[alt-login-id]: /windows-server/identity/ad-fs/operations/configuring-alternate-login-id
470-
[hybrid-azure-ad-join-plan]: ./hybrid-azuread-join-plan.md
470+
[hybrid-azure-ad-join-plan]: ./hybrid-join-plan.md

articles/active-directory/enterprise-users/TOC.yml

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@
99
- name: Quickstarts
1010
items:
1111
- name: Add users to Azure AD
12-
href: ../fundamentals/add-users-azure-active-directory.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
12+
href: ../fundamentals/add-users.md?context=/azure/active-directory/enterprise-users/context/ugr-context
1313
- name: Assign licenses to users
14-
href: ../fundamentals/license-users-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
14+
href: ../fundamentals/license-users-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
1515
- name: Set groups expiration
1616
href: groups-quickstart-expiration.md
1717
- name: Set groups naming policy
@@ -24,22 +24,22 @@
2424
expanded: true
2525
items:
2626
- name: Compare default user permissions
27-
href: ../fundamentals/users-default-permissions.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
27+
href: ../fundamentals/users-default-permissions.md?context=/azure/active-directory/enterprise-users/context/ugr-context
2828
- name: Group-based licensing basics
29-
href: ../fundamentals/active-directory-licensing-whatis-azure-portal.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
29+
href: ../fundamentals/licensing-whatis-azure-portal.md?context=/azure/active-directory/enterprise-users/context/ugr-context
3030
- name: Manage access with groups
31-
href: ../fundamentals/active-directory-manage-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
31+
href: ../fundamentals/concept-learn-about-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
3232
- name: How-to guides
3333
expanded: true
3434
items:
3535
- name: Users
3636
items:
3737
- name: Create a user
38-
href: ../fundamentals/add-users-azure-active-directory.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
38+
href: ../fundamentals/add-users.md?context=/azure/active-directory/enterprise-users/context/ugr-context
3939
- name: Create users in bulk
4040
href: users-bulk-add.md
4141
- name: Manage user profiles
42-
href: ../fundamentals/active-directory-users-profile-azure-portal.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
42+
href: ../fundamentals/how-to-manage-user-profile-info.md?context=/azure/active-directory/enterprise-users/context/ugr-context
4343
- name: Add custom data using extensions - Microsoft Graph
4444
href: /graph/extensibility-overview?toc=/azure/active-directory/enterprise-users/toc.json&bc=/azure/active-directory/enterprise-users/breadcrumb/toc.json
4545
- name: Assign custom security attributes
@@ -49,33 +49,33 @@
4949
- name: Share user accounts
5050
href: users-sharing-accounts.md
5151
- name: Assign users to admin roles
52-
href: ../fundamentals/active-directory-users-assign-role-azure-portal.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
52+
href: ../fundamentals/how-subscriptions-associated-directory.md?context=/azure/active-directory/enterprise-users/context/ugr-context
5353
- name: User management enhancements
5454
href: users-search-enhanced.md
5555
- name: Delete users in bulk
5656
href: users-bulk-delete.md
5757
- name: Restore a deleted user
58-
href: ../fundamentals/active-directory-users-restore.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
58+
href: ../fundamentals/users-restore.md?context=/azure/active-directory/enterprise-users/context/ugr-context
5959
- name: Restore users in bulk
6060
href: users-bulk-restore.md
6161
- name: Revoke a user's access
6262
href: users-revoke-access.md
6363
- name: Close an account in an unmanaged directory
6464
href: users-close-account.md
6565
- name: Add guest users
66-
href: ../external-identities/what-is-b2b.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
66+
href: ../external-identities/what-is-b2b.md?context=/azure/active-directory/enterprise-users/context/ugr-context
6767
- name: Restrict guest user access
6868
href: users-restrict-guest-permissions.md
6969
- name: Clean up unmanaged accounts
7070
href: clean-up-unmanaged-accounts.md
7171
- name: Clean up stale guest accounts
7272
href: clean-up-stale-guest-accounts.md
7373
- name: Dynamic groups and guests
74-
href: ../external-identities/use-dynamic-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
74+
href: ../external-identities/use-dynamic-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
7575
- name: Organization (tenant)
7676
items:
7777
- name: Azure AD tenant organizations
78-
href: ../fundamentals/active-directory-whatis.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
78+
href: ../fundamentals/whatis.md?context=/azure/active-directory/enterprise-users/context/ugr-context
7979
- name: Delete a tenant
8080
href: directory-delete-howto.md
8181
- name: Multiple tenants
@@ -89,13 +89,13 @@
8989
- name: Self-service sign-up
9090
href: directory-self-service-signup.md
9191
- name: Azure AD Connect
92-
href: ../hybrid/whatis-hybrid-identity.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
92+
href: ../hybrid/whatis-hybrid-identity.md?context=/azure/active-directory/enterprise-users/context/ugr-context
9393
- name: Groups
9494
items:
9595
- name: Learn about groups and access rights
96-
href: ../fundamentals/concept-learn-about-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
96+
href: ../fundamentals/concept-learn-about-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
9797
- name: Manage access with groups
98-
href: ../fundamentals/how-to-manage-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
98+
href: ../fundamentals/how-to-manage-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
9999
- name: Manage groups PowerShell for Graph (v2)
100100
href: groups-settings-v2-cmdlets.md
101101
- name: Manage groups with PowerShell MSOnline
@@ -141,7 +141,7 @@
141141
- name: Licenses
142142
items:
143143
- name: Assign licenses to users
144-
href: ../fundamentals/license-users-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
144+
href: ../fundamentals/license-users-groups.md?context=/azure/active-directory/enterprise-users/context/ugr-context
145145
- name: Use Admin center to assign licenses to groups
146146
href: licensing-admin-center.md
147147
- name: Assign licenses to a group
@@ -163,7 +163,7 @@
163163
- name: Sign-in
164164
items:
165165
- name: Customize company branding
166-
href: ../fundamentals/how-to-customize-branding.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
166+
href: ../fundamentals/how-to-customize-branding.md?context=/azure/active-directory/enterprise-users/context/ugr-context
167167
- name: Sign-in options
168168
href: signin-account-support.md
169169
- name: Home Realm Discovery
@@ -177,7 +177,7 @@
177177
- name: Troubleshoot
178178
items:
179179
- name: Get support for Azure AD
180-
href: ../fundamentals/how-to-get-support.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
180+
href: ../fundamentals/how-to-get-support.md?context=/azure/active-directory/enterprise-users/context/ugr-context
181181
- name: Troubleshoot groups
182182
href: groups-troubleshooting.md
183183
- name: Troubleshoot group licensing

0 commit comments

Comments
 (0)