Skip to content

Commit 1985a69

Browse files
authored
Merge pull request #214930 from cmcclister/cm-linkfix-20221018-7
LinkFix: azure-docs-pr (2022-10) - 7
2 parents 6c2cb67 + b24a8a8 commit 1985a69

File tree

50 files changed

+195
-210
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+195
-210
lines changed

articles/storage/blobs/lifecycle-management-policy-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -224,9 +224,9 @@ A lifecycle management policy must be read or written in full. Partial updates a
224224
> A lifecycle management policy can't change the tier of a blob that uses an encryption scope.
225225
226226
> [!NOTE]
227-
> The delete action of a lifecycle management policy won't work with any blob in an immutable container. With an immutable policy, objects can be created and read, but not modified or deleted. For more information, see [Store business-critical blob data with immutable storage](/azure/storage/blobs/immutable-storage-overview).
227+
> The delete action of a lifecycle management policy won't work with any blob in an immutable container. With an immutable policy, objects can be created and read, but not modified or deleted. For more information, see [Store business-critical blob data with immutable storage](./immutable-storage-overview.md).
228228
229229
## See also
230230

231231
- [Optimize costs by automatically managing the data lifecycle](lifecycle-management-overview.md)
232-
- [Hot, Cool, and Archive access tiers for blob data](access-tiers-overview.md)
232+
- [Hot, Cool, and Archive access tiers for blob data](access-tiers-overview.md)

articles/storage/blobs/storage-blob-javascript-get-started.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,12 +82,12 @@ To authorize passwordless access with Azure AD, you'll need to use an Azure cred
8282
|--|--|
8383
|Developer environment|[Visual Studio Code](/azure/developer/javascript/sdk/authentication/local-development-environment-developer-account?tabs=azure-portal%2Csign-in-vscode)|
8484
|Developer environment|[Service principal](../common/identity-library-acquire-token.md)|
85-
|Azure-hosted apps|[Azure-hosted apps setup](/azure/storage/blobs/authorize-managed-identity)|
86-
|On-premises|[On-premises app setup](/azure/storage/common/storage-auth-aad-app?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&tabs=dotnet)|
85+
|Azure-hosted apps|[Azure-hosted apps setup](./authorize-managed-identity.md)|
86+
|On-premises|[On-premises app setup](../common/storage-auth-aad-app.md?tabs=dotnet&toc=%2fazure%2fstorage%2fblobs%2ftoc.json)|
8787
8888
### Set up storage account roles
8989
90-
Your storage resource needs to have one or more of the following [Azure RBAC](/azure/role-based-access-control/built-in-roles) roles assigned to the identity resource you plan to connect with. [Setup the Azure Storage roles](assign-azure-role-data-access.md?tabs=portal) for each identity you created in the previous step: Azure cloud, local development, on-premises.
90+
Your storage resource needs to have one or more of the following [Azure RBAC](../../role-based-access-control/built-in-roles.md) roles assigned to the identity resource you plan to connect with. [Setup the Azure Storage roles](assign-azure-role-data-access.md?tabs=portal) for each identity you created in the previous step: Azure cloud, local development, on-premises.
9191
9292
After you complete the setup, each identity needs at least one of the appropriate roles:
9393
@@ -185,4 +185,4 @@ The following guides show you how to use each of these clients to build your app
185185
- [Samples](../common/storage-samples-javascript.md?toc=/azure/storage/blobs/toc.json#blob-samples)
186186
- [API reference](/javascript/api/@azure/storage-blob/)
187187
- [Library source code](https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/storage/storage-blob)
188-
- [Give Feedback](https://github.com/Azure/azure-sdk-for-js/issues)
188+
- [Give Feedback](https://github.com/Azure/azure-sdk-for-js/issues)

articles/storage/blobs/storage-quickstart-blobs-dotnet.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,12 @@ Additional resources:
3131
- [API reference documentation](/dotnet/api/azure.storage.blobs)
3232
- [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/storage/Azure.Storage.Blobs)
3333
- [Package (NuGet)](https://www.nuget.org/packages/Azure.Storage.Blobs)
34-
- [Samples](/azure/storage/common/storage-samples-dotnet?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json#blob-samples)
34+
- [Samples](../common/storage-samples-dotnet.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json#blob-samples)
3535

3636
## Prerequisites
3737

3838
- Azure subscription - [create one for free](https://azure.microsoft.com/free/)
39-
- Azure storage account - [create a storage account](/azure/storage/common/storage-account-create)
39+
- Azure storage account - [create a storage account](../common/storage-account-create.md)
4040
- Current [.NET Core SDK](https://dotnet.microsoft.com/download/dotnet-core) for your operating system. Be sure to get the SDK and not the runtime.
4141

4242
## Setting up
@@ -441,4 +441,4 @@ To see Blob storage sample apps, continue to:
441441
> [Azure Blob Storage SDK .NET samples](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/storage/Azure.Storage.Blobs/samples)
442442
443443
- For tutorials, samples, quick starts and other documentation, visit [Azure for .NET and .NET Core developers](/dotnet/azure/).
444-
- To learn more about .NET Core, see [Get started with .NET in 10 minutes](https://dotnet.microsoft.com/learn/dotnet/hello-world-tutorial/intro).
444+
- To learn more about .NET Core, see [Get started with .NET in 10 minutes](https://dotnet.microsoft.com/learn/dotnet/hello-world-tutorial/intro).

articles/storage/blobs/storage-quickstart-blobs-java.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ The order and locations in which `DefaultAzureCredential` looks for credentials
219219

220220
:::image type="content" source="./media/storage-quickstart-blobs-java/defaultazurecredential-flow-java.png" alt-text="A diagram of the credential flow.":::
221221

222-
For example, your app can authenticate using your Visual Studio Code sign-in credentials with when developing locally. Your app can then use a [managed identity](/azure/active-directory/managed-identities-azure-resources/overview) once it has been deployed to Azure. No code changes are required for this transition.
222+
For example, your app can authenticate using your Visual Studio Code sign-in credentials with when developing locally. Your app can then use a [managed identity](../../active-directory/managed-identities-azure-resources/overview.md) once it has been deployed to Azure. No code changes are required for this transition.
223223

224224
#### Assign roles to your Azure AD user account
225225

@@ -284,7 +284,7 @@ You can authorize access to data in your storage account using the following ste
284284
A connection string includes the storage account access key and uses it to authorize requests. Always be careful to never expose the keys in an unsecure location.
285285
286286
> [!NOTE]
287-
> If you plan to use connection strings, you'll need permissions for the following Azure RBAC action: [Microsoft.Storage/storageAccounts/listkeys/action](/azure/role-based-access-control/resource-provider-operations#microsoftstorage). The least privilege built-in role with permissions for this action is [Storage Account Key Operator Service Role](/azure/role-based-access-control/built-in-roles#storage-account-key-operator-service-role), but any role which includes this action will work.
287+
> If you plan to use connection strings, you'll need permissions for the following Azure RBAC action: [Microsoft.Storage/storageAccounts/listkeys/action](../../role-based-access-control/resource-provider-operations.md#microsoftstorage). The least privilege built-in role with permissions for this action is [Storage Account Key Operator Service Role](../../role-based-access-control/built-in-roles.md#storage-account-key-operator-service-role), but any role which includes this action will work.
288288
289289
[!INCLUDE [retrieve credentials](../../../includes/retrieve-credentials.md)]
290290
@@ -448,4 +448,4 @@ To see Blob storage sample apps, continue to:
448448
> [Azure Blob Storage SDK for Java samples](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/storage/azure-storage-blob/src/samples/java/com/azure/storage/blob)
449449
450450
- To learn more, see the [Azure SDK for Java](https://github.com/Azure/azure-sdk-for-java/blob/master/README.md).
451-
- For tutorials, samples, quickstarts, and other documentation, visit [Azure for Java cloud developers](/azure/developer/java/).
451+
- For tutorials, samples, quickstarts, and other documentation, visit [Azure for Java cloud developers](/azure/developer/java/).

articles/storage/common/migrate-azure-credentials.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,12 +38,12 @@ Many Azure services support passwordless connections through Azure AD and Role B
3838
3939
`DefaultAzureCredential` supports multiple authentication methods and automatically determines which should be used at runtime. This approach enables your app to use different authentication methods in different environments (local dev vs. production) without implementing environment-specific code.
4040

41-
The order and locations in which `DefaultAzureCredential` searches for credentials can be found in the [Azure Identity library overview](/dotnet/api/overview/azure/Identity-readme#defaultazurecredential) and varies between languages. For example, when working locally with .NET, `DefaultAzureCredential` will generally authenticate using the account the developer used to sign-in to Visual Studio. When the app is deployed to Azure, `DefaultAzureCredential` will automatically switch to use a [managed identity](/azure/active-directory/managed-identities-azure-resources/overview). No code changes are required for this transition.
41+
The order and locations in which `DefaultAzureCredential` searches for credentials can be found in the [Azure Identity library overview](/dotnet/api/overview/azure/Identity-readme#defaultazurecredential) and varies between languages. For example, when working locally with .NET, `DefaultAzureCredential` will generally authenticate using the account the developer used to sign-in to Visual Studio. When the app is deployed to Azure, `DefaultAzureCredential` will automatically switch to use a [managed identity](../../active-directory/managed-identities-azure-resources/overview.md). No code changes are required for this transition.
4242

4343
:::image type="content" source="https://raw.githubusercontent.com/Azure/azure-sdk-for-net/main/sdk/identity/Azure.Identity/images/mermaidjs/DefaultAzureCredentialAuthFlow.svg" alt-text="Diagram of the credential flow.":::
4444

4545
> [!NOTE]
46-
> A managed identity provides a security identity to represent an app or service. The identity is managed by the Azure platform and does not require you to provision or rotate any secrets. You can read more about managed identities in the [overview](/azure/active-directory/managed-identities-azure-resources/overview) documentation.
46+
> A managed identity provides a security identity to represent an app or service. The identity is managed by the Azure platform and does not require you to provision or rotate any secrets. You can read more about managed identities in the [overview](../../active-directory/managed-identities-azure-resources/overview.md) documentation.
4747
4848
The following code example demonstrates how to connect to an Azure Storage account using passwordless connections. The next section describes how to migrate to this setup in more detail.
4949

@@ -110,7 +110,7 @@ The following steps demonstrate how to create a system-assigned managed identity
110110

111111
### [Service Connector](#tab/service-connector)
112112

113-
Some app hosting environments support Service Connector, which helps you connect Azure compute services to other backing services. Service Connector automatically configures network settings and connection information. You can learn more about Service Connector and which scenarios are supported on the [overview page](/azure/service-connector/overview).
113+
Some app hosting environments support Service Connector, which helps you connect Azure compute services to other backing services. Service Connector automatically configures network settings and connection information. You can learn more about Service Connector and which scenarios are supported on the [overview page](../../service-connector/overview.md).
114114

115115
The following compute services are currently supported:
116116

@@ -332,7 +332,7 @@ In this tutorial, you learned how to migrate an application to passwordless conn
332332

333333
You can read the following resources to explore the concepts discussed in this article in more depth:
334334

335-
* For more information on authorizing access with managed identity, visit [Authorize access to blob data with managed identities for Azure resources](/azure/storage/blobs/authorize-managed-identity).
336-
* [Authorize with Azure roles](/azure/storage/blobs/authorize-access-azure-active-directory)
335+
* For more information on authorizing access with managed identity, visit [Authorize access to blob data with managed identities for Azure resources](../blobs/authorize-managed-identity.md).
336+
* [Authorize with Azure roles](../blobs/authorize-access-azure-active-directory.md)
337337
* To learn more about .NET Core, see [Get started with .NET in 10 minutes](https://dotnet.microsoft.com/learn/dotnet/hello-world-tutorial/intro).
338-
* To learn more about authorizing from a web application, visit [Authorize from a native or web application](/azure/storage/common/storage-auth-aad-app)
338+
* To learn more about authorizing from a web application, visit [Authorize from a native or web application](./storage-auth-aad-app.md)

articles/storage/common/multiple-identity-scenarios.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: devx-track-csharp, ignite-2022
1616

1717
Applications often require secure connections between multiple Azure services simultaneously. For example, an enterprise Azure App Service instance might connect to several different storage accounts, an Azure SQL database instance, a service bus, and more.
1818

19-
[Managed identities](/azure/active-directory/managed-identities-azure-resources/overview) are the recommended authentication option for secure, passwordless connections between Azure resources. Developers do not have to manually track and manage many different secrets for managed identities, since most of these tasks are handled internally by Azure. This tutorial explores how to manage connections between multiple services using managed identities and the Azure Identity client library.
19+
[Managed identities](../../active-directory/managed-identities-azure-resources/overview.md) are the recommended authentication option for secure, passwordless connections between Azure resources. Developers do not have to manually track and manage many different secrets for managed identities, since most of these tasks are handled internally by Azure. This tutorial explores how to manage connections between multiple services using managed identities and the Azure Identity client library.
2020

2121
## Compare the types of managed identities
2222

@@ -25,7 +25,7 @@ Azure provides the following types of managed identities:
2525
* **System-assigned managed identities** are directly tied to a single Azure resource. When you enable a system-assigned managed identity on a service, Azure will create a linked identity and handle administrative tasks for that identity internally. When the Azure resource is deleted, the identity is also deleted.
2626
* **User-assigned managed identities** are independent identities that are created by an administrator and can be associated with one or more Azure resources. The lifecycle of the identity is independent of those resources.
2727

28-
You can read more about best practices and when to use system-assigned identities versus user-assigned identities in the [identities best practice recommendations](/azure/active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations).
28+
You can read more about best practices and when to use system-assigned identities versus user-assigned identities in the [identities best practice recommendations](../../active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md).
2929

3030
## Explore DefaultAzureCredential
3131

@@ -480,13 +480,13 @@ You can also associate a user-assigned managed identity as well as a system-assi
480480

481481
:::image type="content" lightbox="media/user-and-system-assigned-identities-small.png" source="media/user-and-system-assigned-identities.png" alt-text="Diagram showing user-assigned and system-assigned managed identities.":::
482482

483-
These types of scenarios are explored in more depth in the [identities best practice recommendations](/azure/active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations).
483+
These types of scenarios are explored in more depth in the [identities best practice recommendations](../../active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md).
484484

485485
## Next steps
486486

487487
In this tutorial, you learned how to migrate an application to passwordless connections. You can read the following resources to explore the concepts discussed in this article in more depth:
488488

489-
* For more information on authorizing access with managed identity, visit [Authorize access to blob data with managed identities for Azure resources](/azure/storage/blobs/authorize-managed-identity).
490-
* [Authorize with Azure roles](/azure/storage/blobs/authorize-access-azure-active-directory)
489+
* For more information on authorizing access with managed identity, visit [Authorize access to blob data with managed identities for Azure resources](../blobs/authorize-managed-identity.md).
490+
* [Authorize with Azure roles](../blobs/authorize-access-azure-active-directory.md)
491491
* To learn more about .NET Core, see [Get started with .NET in 10 minutes](https://dotnet.microsoft.com/learn/dotnet/hello-world-tutorial/intro).
492-
* To learn more about authorizing from a web application, visit [Authorize from a native or web application](/azure/storage/common/storage-auth-aad-app).
492+
* To learn more about authorizing from a web application, visit [Authorize from a native or web application](./storage-auth-aad-app.md).

articles/storage/common/storage-c-plus-plus-enumeration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,4 +196,4 @@ For more information about Azure Storage and Client Library for C++, see the fol
196196
- [How to use Queue Storage from C++](../queues/storage-c-plus-plus-how-to-use-queues.md)
197197
- [Azure Storage Client Library for C++ API documentation.](https://azure.github.io/azure-storage-cpp/)
198198
- [Azure Storage Team Blog](/archive/blogs/windowsazurestorage/)
199-
- [Azure Storage Documentation](/azure/storage/)
199+
- [Azure Storage Documentation](../index.yml)

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following table lists the share-level permissions and how they align with th
5151

5252
## Share-level permissions for specific Azure AD users or groups
5353

54-
If you intend to use a specific Azure AD user or group to access Azure file share resources, that identity must be a [hybrid identity](/azure/active-directory/hybrid/whatis-hybrid-identity) that exists in both on-premises AD DS and Azure AD. For example, say you have a user in your AD that is [email protected] and you have synced to Azure AD as [email protected] using Azure AD Connect sync. For this user to access Azure Files, you must assign the share-level permissions to [email protected]. The same concept applies to groups or service principals.
54+
If you intend to use a specific Azure AD user or group to access Azure file share resources, that identity must be a [hybrid identity](../../active-directory/hybrid/whatis-hybrid-identity.md) that exists in both on-premises AD DS and Azure AD. For example, say you have a user in your AD that is [email protected] and you have synced to Azure AD as [email protected] using Azure AD Connect sync. For this user to access Azure Files, you must assign the share-level permissions to [email protected]. The same concept applies to groups or service principals.
5555

5656
> [!IMPORTANT]
5757
> **Assign permissions by explicitly declaring actions and data actions as opposed to using a wildcard (\*) character.** If a custom role definition for a data action contains a wildcard character, all identities assigned to that role are granted access for all possible data actions. This means that all such identities will also be granted any new data action added to the platform. The additional access and permissions granted through new actions or data actions may be unwanted behavior for customers using wildcard. To mitigate any unintended future impact, we highly recommend declaring actions and data actions explicitly as opposed to using the wildcard.
@@ -161,4 +161,4 @@ You could also assign permissions to all authenticated Azure AD users and specif
161161

162162
Now that you've assigned share-level permissions, you must configure directory and file-level permissions. Continue to the next article.
163163

164-
[Part three: configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md)
164+
[Part three: configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md)

0 commit comments

Comments
 (0)