Skip to content

Commit 1bec7e5

Browse files
authored
update
1 parent 56729db commit 1bec7e5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/azure-signalr/signalr-howto-authorize-application.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ ms.custom: subject-rbac-steps
1212

1313
# Authorize requests to Azure SignalR Service resources with Microsoft Entra applications
1414

15-
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Microsoft Entra applications](https://learn.microsoft.com/entra/identity-platform/app-objects-and-service-principals).
15+
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Microsoft Entra applications](../../entra/identity-platform/app-objects-and-service-principals).
1616

1717
This article shows how to configure your Azure SignalR Service resource and codes to authorize requests to the resource from a Microsoft Entra application.
1818

1919
## Register an application in Microsoft Entra ID
2020

21-
The first step is to [Register an application in Microsoft Entra ID](https://learn.microsoft.com/entra/identity-platform/quickstart-register-app):
21+
The first step is to [Register an application in Microsoft Entra ID](../../entra/identity-platform/quickstart-register-app):
2222

2323
After you register your application, you can find the **Application (client) ID** and **Directory (tenant) ID** values on the application's overview page. These GUIDs can be useful in the following steps.
2424

@@ -28,9 +28,9 @@ After you register your application, you can find the **Application (client) ID*
2828

2929
After registering an app, you can add **certificates, client secrets (a string), or federated identity credentials** as credentials to your confidential client app registration. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime, and are used by confidential client applications that access a web API.
3030

31-
- [Add a certificate](https://learn.microsoft.com/entra/identity-platform/quickstart-register-app?tabs=certificate#add-credentials)
32-
- [Add a client secret](https://learn.microsoft.com/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
33-
- [Add a federated credential](https://learn.microsoft.com/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
31+
- [Add a certificate](../../entra/identity-platform/quickstart-register-app?tabs=certificate#add-credentials)
32+
- [Add a client secret](../../entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
33+
- [Add a federated credential](../../entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
3434

3535

3636
## Add role assignments in the Azure portal
@@ -100,7 +100,7 @@ services.AddSignalR().AddAzureSignalR(option =>
100100

101101
> [!NOTE]
102102
> Configure an application to trust a managed identity is a preview feature.
103-
> To learn more about it, see [Configure an application to trust a managed identity (preview)](https://learn.microsoft.com/en-us/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity).
103+
> To learn more about it, see [Configure an application to trust a managed identity (preview)](../../entra/workload-id/workload-identity-federation-config-app-trust-managed-identity).
104104
105105
```csharp
106106
services.AddSignalR().AddAzureSignalR(option =>

0 commit comments

Comments
 (0)