Skip to content

Commit 0ffb474

Browse files
committed
fix blocking issues
1 parent dc41ca9 commit 0ffb474

File tree

7 files changed

+9
-395
lines changed

7 files changed

+9
-395
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5486,6 +5486,11 @@
54865486
"redirect_url": "/azure/active-directory/develop/application-consent-experience",
54875487
"redirect_document_id": false
54885488
},
5489+
{
5490+
"source_path_from_root": "/articles/active-directory/develop/v2-permissions-and-consent.md",
5491+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
5492+
"redirect_document_id": false
5493+
},
54895494
{
54905495
"source_path_from_root": "/articles/active-directory/manage-apps/consent-and-permissions-overview.md",
54915496
"redirect_url": "/azure/active-directory/manage-apps/user-admin-consent-overview",

articles/active-directory/develop/application-consent-experience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Non-admin users will be blocked from granting consent to the application, and th
9090

9191
In this scenario, an administrator consents to all of the permissions that an application requests, which can include delegated permissions on behalf of all users in the tenant. The Administrator grants consent through the **API permissions** page of the application registration in the [Azure portal](https://portal.azure.com).
9292

93-
:::image type="content" source="./media/consent-framework/grant-consent.png" alt-text="Grant permissions for explicit admin consent" lightbox="./media/consent-framework/grant-consent.png":::
93+
:::image type="content" source="./media/consent-framework/grant-consent.png" alt-text="Screenshot of explicit admin consent through the Azure portal" lightbox="./media/consent-framework/grant-consent.png":::
9494

9595
All users in that tenant won't see the consent dialog unless the application requires new permissions. To learn which administrator roles can consent to delegated permissions, see [Administrator role permissions in Azure AD](../roles/permissions-reference.md).
9696

articles/active-directory/develop/consent-types-developer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You can also configure permissions on your own resources to require admin consen
8787
Some organizations may change the default user consent policy for the tenant. When your application requests access to permissions they're evaluated against these policies. The user may need to request admin consent even when not required by default. To learn how administrators manage consent policies for applications, see [Manage app consent policies](../manage-apps/manage-app-consent-policies.md).
8888

8989
>[!NOTE]
90-
>In requests to the authorization, token or consent endpoints for the Microsoft Identity platform, if the resource identifier is omitted in the scope parameter, the resource is assumed to be Microsoft Graph. For example, scope=User.Read is equivalent to https://graph.microsoft.com/User.Read.
90+
>In requests to the authorization, token or consent endpoints for the Microsoft Identity platform, if the resource identifier is omitted in the scope parameter, the resource is assumed to be Microsoft Graph. For example, scope=User.Read is equivalent to `https://graph.microsoft.com/User.Read`.
9191
9292
### Admin Consent for Application permissions
9393

articles/active-directory/develop/Delegated-access.md renamed to articles/active-directory/develop/delegated-access-primer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft identity platform delegated access scenario.
2+
title: Microsoft identity platform delegated access scenario
33
description: Learn about delegated access in the Microsoft identity platform endpoint.
44
services: active-directory
55
author: omondiatieno

articles/active-directory/develop/scopes-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft identity platform scopes and permissions.
2+
title: Microsoft identity platform scopes and permissions
33
description: Learn about openID connect scopes and permissions in the Microsoft identity platform endpoint.
44
services: active-directory
55
author: omondiatieno

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 0 additions & 391 deletions
This file was deleted.

0 commit comments

Comments
 (0)