Skip to content

Commit 1480fc9

Browse files
[Azure AD] aad.portal removal
1 parent 59cd0f4 commit 1480fc9

File tree

87 files changed

+201
-200
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+201
-200
lines changed

articles/active-directory/app-provisioning/configure-automatic-user-provisioning-portal.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,9 @@ This article describes the general steps for managing automatic user account pro
2424

2525
Use the Azure Active Directory portal to view and manage all applications that are configured for single sign-on in a directory. Enterprise apps are apps that are deployed and used within your organization. Follow these steps to view and manage your enterprise applications:
2626

27-
1. Open the [Azure Active Directory portal](https://aad.portal.azure.com).
28-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
27+
1. Open the [Azure portal](https://portal.azure.com).
28+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
29+
1. A list of all configured apps is shown, including apps that were added from the gallery.
2930
1. Select any app to load its resource pane, where you can view reports and manage app settings.
3031
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3132

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,9 @@ You can customize the default attribute-mappings according to your business need
2929

3030
Follow these steps to access the **Mappings** feature of user provisioning:
3131

32-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com).
33-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
32+
1. Sign in to the [Azure portal](https://portal.azure.com).
33+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
34+
1. A list of all configured apps is shown, including apps that were added from the gallery.
3435
1. Select any app to load its app management pane, where you can view reports and manage app settings.
3536
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3637
1. Expand **Mappings** to view and edit the user attributes that flow between Azure AD and the target application. If the target application supports it, this section lets you optionally configure provisioning of groups and user accounts.
@@ -142,7 +143,7 @@ When you are editing the list of supported attributes, the following properties
142143

143144
#### Provisioning a custom extension attribute to a SCIM compliant application
144145
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:
145-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146+
1. Sign in to the [Azure portal](https://portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146147
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
147148
3. At the bottom of the page, select **Show advanced options**.
148149
4. Select **Edit attribute list for AppName**.

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1308,8 +1308,9 @@ Applications that support the SCIM profile described in this article can be conn
13081308

13091309
**To connect an application that supports SCIM:**
13101310

1311-
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
1311+
1. Sign in to the [Azure portal](https://portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
1313+
1. A list of all configured apps is shown, including apps that were added from the gallery.
13131314
1. Select **+ New application** > **+ Create your own application**.
13141315
1. Enter a name for your application, choose the option "*integrate any other application you don't find in the gallery*" and select **Add** to create an app object. The new app is added to the list of enterprise applications and opens to its app management screen.
13151316

@@ -1397,9 +1398,7 @@ The provisioning service supports the [authorization code grant](https://tools.i
13971398
> [!NOTE]
13981399
> OAuth v1 is not supported due to exposure of the client secret. OAuth v2 is supported.
13991400

1400-
Best practices (recommended, but not required):
1401-
* Support multiple redirect URLs. Administrators can configure provisioning from both "portal.azure.com" and "aad.portal.azure.com". Supporting multiple redirect URLs will ensure that users can authorize access from either portal.
1402-
* Support multiple secrets for easy renewal, without downtime.
1401+
Supportting multiple secrets for easy renewal, without downtime is recommended, but not required.
14031402

14041403
#### How to set up OAuth code grant flow
14051404

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,8 @@ Publish your proxy application as you would any other application and assign use
3333

3434
You now need to register your application in Azure AD, as follows:
3535

36-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Dashboard** for the **Azure Active Directory admin center** appears.
37-
1. In the sidebar, select **Azure Active Directory**. The **Azure Active Directory** overview page appears.
38-
1. In the Azure AD overview sidebar, select **App registrations**. The list of all app registrations appears.
36+
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Browse to **Azure Active Directory** > **App registrations**. The list of all app registrations appears.
3938
1. Select **New registration**. The **Register an application** page appears.
4039

4140
![Create a new app registration in the Azure portal](./media/application-proxy-configure-native-client-application/create.png)

articles/active-directory/app-proxy/application-proxy-ping-access-publishing-guide.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,8 @@ If you've enabled Application Proxy enabled and installed a connector already, y
4242

4343
The Application Proxy connector is a Windows Server service that directs the traffic from your remote employees to your published applications. For more detailed installation instructions, see [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md).
4444

45-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/) as an application administrator. The **Azure Active Directory admin center** page appears.
46-
1. Select **Azure Active Directory** > **Application proxy** > **Download connector service**. The **Application Proxy Connector Download** page appears.
45+
1. Sign in to the [Azure portal](https://portal.azure.com) as an Application Administrator.
46+
1. Browse to **Azure Active Directory** > **Application proxy** > **Download connector service**. The **Application Proxy Connector Download** page appears.
4747

4848
![Application proxy connector download](./media/application-proxy-configure-single-sign-on-with-ping-access/application-proxy-connector-download.png)
4949

@@ -66,8 +66,8 @@ You'll first have to publish your application. This action involves:
6666

6767
To publish your own on-premises application:
6868

69-
1. If you didn't in the last section, sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/) as an application administrator.
70-
1. Select **Enterprise applications** > **New application** > **Add an on-premises application**. The **Add your own on-premises application** page appears.
69+
1. If you didn't in the last section, sign in to the [Azure portal](https://portal.azure.com) as an Application Administrator.
70+
1. Browse to **Enterprise applications** > **New application** > **Add an on-premises application**. The **Add your own on-premises application** page appears.
7171

7272
![Add your own on-premises application](./media/application-proxy-configure-single-sign-on-with-ping-access/add-your-own-on-premises-application.png)
7373
1. Fill out the required fields with information about your new application. Use the guidance below for the settings.
@@ -158,8 +158,8 @@ To collect this information:
158158

159159
**Update the `acceptMappedClaims` field:**
160160

161-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/) as an application administrator.
162-
1. Select **Azure Active Directory** > **App registrations**. A list of applications appears.
161+
1. Sign in to the [Azure portal](https://portal.azure.com) as an Application Administrator.
162+
1. Browse to **Azure Active Directory** > **App registrations**. A list of applications appears.
163163
1. Select your application.
164164
1. From the sidebar of the **App registrations** page for your application, select **Manifest**. The manifest JSON code for your application's registration appears.
165165
1. Search for the `acceptMappedClaims` field, and change the value to `True`.

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ import-module MSOnline
343343
Connect-MsolService
344344
New-MsolServicePrincipal -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -DisplayName "Azure Multi-Factor Auth Client"
345345
```
346-
Once done , go to https://aad.portal.azure.com > "Enterprise Applications" > Search for "Azure Multi-Factor Auth Client" > Check properties for this app > Confirm if the service principal is enabled or disabled > Click on the application entry > Go to Properties of the app > If the option "Enabled for users to sign-in? is set to No in Properties of this app , please set it to Yes.
346+
Once done , go to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **Enterprise Applications** > Search for "Azure Multi-Factor Auth Client" > Check properties for this app > Confirm if the service principal is enabled or disabled > Click on the application entry > Go to Properties of the app > If the option "Enabled for users to sign-in? is set to No in Properties of this app , please set it to Yes.
347347

348348
Run the `AzureMfaNpsExtnConfigSetup.ps1` script again and it should not return the `Service principal was not found` error.
349349

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ Below are some common issues that may occur during the process.
3535
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
3636

3737
- **I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
38-
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant.
39-
2. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
38+
1. Sign in to the [Azure portal](https://portal.azure.com) using a user account in your organization's primary tenant.
39+
1. Browse to **Azure Active Directory** > [Roles and administrators](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
4040
3. Select the desired admin role.
4141
4. The list of users assigned that role will be displayed.
4242

articles/active-directory/devices/enterprise-state-roaming-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ The country/region value is set as part of the Azure AD directory creation proce
4949

5050
Follow these steps to view a per-user device sync status report.
5151

52-
1. Sign in to [Azure AD admin center](https://aad.portal.azure.com/).
53-
1. Select **Azure Active Directory** > **Users** > **All users**.
52+
1. Sign in to the [Azure portal](https://portal.azure.com/).
53+
1. Browse to **Azure Active Directory** > **Users** > **All users**.
5454
1. Select the user, and then select **Devices**.
5555
1. Select **View devices syncing settings and app data** to show sync status.
5656
1. Devices syncing for the user are shown and can be downloaded.

articles/active-directory/enterprise-users/directory-delete-howto.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Check the following conditions:
4141
4242
## Delete the organization
4343

44-
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com) with an account that is the global administrator for your organization.
44+
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is the Global Administrator for your organization.
4545
1. Select **Azure Active Directory**.
4646
1. On a tenant's **Overview** page, select **Manage tenants**.
4747

@@ -183,7 +183,8 @@ Product state | Data | Access to data
183183

184184
You can put a self-service sign-up product like Microsoft Power BI or Azure RMS into a **Delete** state to be immediately deleted in the Azure AD portal:
185185

186-
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) with an account that is a global administrator in the organization. If you're trying to delete the Contoso organization that has the initial default domain `contoso.onmicrosoft.com`, sign in with a UPN such as `[email protected]`.
186+
1. Sign in to the [Azure portal](https://portal.azure.com/) with an account that is a global administrator in the organization. If you're trying to delete the Contoso organization that has the initial default domain `contoso.onmicrosoft.com`, sign in with a UPN such as `[email protected]`.
187+
1. Browse to **Azure Active Directory**.
187188

188189
1. Select **Licenses**, and then select **Self-service sign-up products**. You can see all the self-service sign-up products separately from the seat-based subscriptions. Choose the product that you want to permanently delete. Here's an example in Microsoft Power BI:
189190

articles/active-directory/enterprise-users/domains-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,12 @@ To delete a custom domain name, you must first ensure that no resources in your
6464

6565
You must change or delete any such resource in your Azure AD organization before you can delete the custom domain name.
6666

67-
> [!Note]
67+
> [!NOTE]
6868
> To delete the custom domain, use a Global Administrator account that is based on either the default domain (onmicrosoft.com) or a different custom domain (mydomainname.com).
6969
7070
## ForceDelete option
7171

72-
You can **ForceDelete** a domain name in the [Azure AD Admin Center](https://aad.portal.azure.com) or using [Microsoft Graph API](/graph/api/domain-forcedelete). These options use an asynchronous operation and update all references from the custom domain name like “[email protected]” to the initial default domain name such as “[email protected].”
72+
You can **ForceDelete** a domain name in the [Azure portal](https://portal.azure.com) or using [Microsoft Graph API](/graph/api/domain-forcedelete). These options use an asynchronous operation and update all references from the custom domain name like “[email protected]” to the initial default domain name such as “[email protected].”
7373

7474
To call **ForceDelete** in the Azure portal, you must ensure that there are fewer than 1000 references to the domain name, and any references where Exchange is the provisioning service must be updated or removed in the [Exchange Admin Center](https://outlook.office365.com/ecp/). This includes Exchange Mail-Enabled Security Groups and distributed lists. For more information, see [Removing mail-enabled security groups](/Exchange/recipients/mail-enabled-security-groups#Remove%20mail-enabled%20security%20groups&preserve-view=true). Also, the **ForceDelete** operation won't succeed if either of the following is true:
7575

0 commit comments

Comments
 (0)