Skip to content

Commit 19fe99e

Browse files
Merge pull request #209538 from rwike77/wiflink
fixed graph link
2 parents 0c53ffa + 009e028 commit 19fe99e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/27/2022
12+
ms.date: 08/29/2022
1313
ms.author: ryanwi
1414
ms.reviewer: shkhalid, udayh, vakarand
1515
ms.custom: aaddev
@@ -57,6 +57,6 @@ The Microsoft identity platform stores only the first 25 signing keys when they'
5757
## Next steps
5858
Learn more about how workload identity federation works:
5959
- How Azure AD uses the [OAuth 2.0 client credentials grant](v2-oauth2-client-creds-grant-flow.md#third-case-access-token-request-with-a-federated-credential) and a client assertion issued by another IdP to get a token.
60-
- How to create, delete, get, or update [federated identity credentials](/graph/api/resources/federatedidentitycredentials-overview?view=graph-rest-beta&preserve-view=true) on an app registration using Microsoft Graph.
60+
- How to create, delete, get, or update [federated identity credentials](/graph/api/resources/federatedidentitycredentials-overview) on an app registration using Microsoft Graph.
6161
- Read the [GitHub Actions documentation](https://docs.github.com/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure) to learn more about configuring your GitHub Actions workflow to get an access token from Microsoft identity provider and access Azure resources.
6262
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).

0 commit comments

Comments
 (0)