You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/manage-nat-gateway.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ This article explains how to manage the following aspects of NAT gateway:
27
27
28
28
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
29
30
-
- An existing Azure Virtual Network. For information about creating an Azure Virtual Network, see [Quickstart: Create a virtual network using the Azure portal](/azure/virtual-network/quick-create-portal).
30
+
- An existing Azure Virtual Network. For information about creating an Azure Virtual Network, see [Quickstart: Create a virtual network using the Azure portal](../quick-create-portal.md).
31
31
32
32
- The example virtual network used in this article is named **myVNet**. Replace the example value with the name of your virtual network.
33
33
@@ -697,5 +697,4 @@ To learn more about Azure Virtual Network NAT and its capabilities, see the foll
697
697
698
698
-[NAT gateway and availability zones](nat-availability-zones.md)
699
699
700
-
-[Design virtual networks with NAT gateway](nat-gateway-resource.md)
701
-
700
+
-[Design virtual networks with NAT gateway](nat-gateway-resource.md)
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/nat-metrics.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,7 +259,7 @@ To create the alert, use the following steps:
259
259
11. Select **Create** to create the alert rule.
260
260
261
261
>[!NOTE]
262
-
>SNAT port exhaustion on your NAT gateway resource is uncommon. If you see SNAT port exhaustion, your NAT gateway's idle timeout timer may be holding on to SNAT ports too long or your may need to scale with additional public IPs. To troubleshoot these kinds of issues, refer to the [NAT gateway connectivity troubleshooting guide](/azure/virtual-network/nat-gateway/troubleshoot-nat-connectivity#snat-exhaustion-due-to-nat-gateway-configuration).
262
+
>SNAT port exhaustion on your NAT gateway resource is uncommon. If you see SNAT port exhaustion, your NAT gateway's idle timeout timer may be holding on to SNAT ports too long or your may need to scale with additional public IPs. To troubleshoot these kinds of issues, refer to the [NAT gateway connectivity troubleshooting guide](./troubleshoot-nat-connectivity.md#snat-exhaustion-due-to-nat-gateway-configuration).
263
263
264
264
## Network Insights
265
265
@@ -296,4 +296,4 @@ For more information on what each metric is showing you and how to analyze these
296
296
* Learn about [Virtual Network NAT](nat-overview.md)
297
297
* Learn about [NAT gateway resource](nat-gateway-resource.md)
298
298
* Learn about [Azure Monitor](../../azure-monitor/overview.md)
299
-
* Learn about [troubleshooting NAT gateway resources](troubleshoot-nat.md).
299
+
* Learn about [troubleshooting NAT gateway resources](troubleshoot-nat.md).
Copy file name to clipboardExpand all lines: articles/virtual-network/nat-gateway/quickstart-create-nat-gateway-portal.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This quickstart shows you how to use the Azure Virtual Network NAT service. You'
23
23
24
24
Before you deploy the NAT gateway resource and the other resources, a resource group is required to contain the resources deployed. In the following steps, you'll create a resource group, NAT gateway resource, and a public IP address. You can use one or more public IP address resources, public IP prefixes, or both.
25
25
26
-
For information about public IP prefixes and a NAT gateway, see [Manage NAT gateway](/azure/virtual-network/nat-gateway/manage-nat-gateway?tabs=manage-nat-portal#add-or-remove-a-public-ip-prefix).
26
+
For information about public IP prefixes and a NAT gateway, see [Manage NAT gateway](./manage-nat-gateway.md?tabs=manage-nat-portal#add-or-remove-a-public-ip-prefix).
27
27
28
28
1. Sign in to the [Azure portal](https://portal.azure.com).
29
29
@@ -44,7 +44,7 @@ For information about public IP prefixes and a NAT gateway, see [Manage NAT gate
44
44
| Availability Zone | Select **No Zone**. |
45
45
| Idle timeout (minutes) | Enter **10**. |
46
46
47
-
For information about availability zones and NAT gateway, see [NAT gateway and availability zones](/azure/virtual-network/nat-gateway/nat-availability-zones).
47
+
For information about availability zones and NAT gateway, see [NAT gateway and availability zones](./nat-availability-zones.md).
48
48
49
49
5. Select the **Outbound IP** tab, or select the **Next: Outbound IP** button at the bottom of the page.
50
50
@@ -205,4 +205,4 @@ the virtual network, virtual machine, and NAT gateway with the following steps:
205
205
206
206
For more information on Azure Virtual Network NAT, see:
Copy file name to clipboardExpand all lines: includes/active-directory-develop-quickstart-register-app.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,16 +22,16 @@ Get started with the Microsoft identity platform by registering an application i
22
22
The Microsoft identity platform performs identity and access management (IAM) only for registered applications. Whether it's a client application like a web or mobile app, or it's a web API that backs a client app, registering it establishes a trust relationship between your application and the identity provider, the Microsoft identity platform.
23
23
24
24
> [!TIP]
25
-
> To register an application for Azure AD B2C, follow the steps in [Tutorial: Register a web application in Azure AD B2C](/azure/active-directory-b2c/tutorial-register-applications).
25
+
> To register an application for Azure AD B2C, follow the steps in [Tutorial: Register a web application in Azure AD B2C](../articles/active-directory-b2c/tutorial-register-applications.md).
26
26
27
27
## Prerequisites
28
28
29
29
- An Azure account that has an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
30
- The Azure account must have permission to manage applications in Azure Active Directory (Azure AD). Any of the following Azure AD roles include the required permissions:
- Completion of the [Set up a tenant](../articles/active-directory/develop/quickstart-create-new-tenant.md) quickstart.
35
35
36
36
## Register an application
37
37
@@ -101,19 +101,19 @@ To configure application settings based on the platform or device you're targeti
101
101
102
102
### Redirect URI restrictions
103
103
104
-
There are some restrictions on the format of the redirect URIs you add to an app registration. For details about these restrictions, see [Redirect URI (reply URL) restrictions and limitations](/azure/active-directory/develop/reply-url).
104
+
There are some restrictions on the format of the redirect URIs you add to an app registration. For details about these restrictions, see [Redirect URI (reply URL) restrictions and limitations](../articles/active-directory/develop/reply-url.md).
105
105
106
106
## Add credentials
107
107
108
-
Credentials are used by [confidential client applications](/azure/active-directory/develop/msal-client-applications) that access a web API. Examples of confidential clients are web apps, other web APIs, or service-type and daemon-type applications. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime.
108
+
Credentials are used by [confidential client applications](../articles/active-directory/develop/msal-client-applications.md) that access a web API. Examples of confidential clients are web apps, other web APIs, or service-type and daemon-type applications. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime.
109
109
110
110
You can add both certificates and client secrets (a string) as credentials to your confidential client app registration.
111
111
112
112
:::image type="content" source="../articles/active-directory/develop/media/quickstart-register-app/portal-05-app-reg-04-credentials.png" alt-text="Screenshot of the Azure portal, showing the Certificates and secrets pane in an app registration.":::
113
113
114
114
### Add a certificate
115
115
116
-
Sometimes called a _public key_, a certificate is the recommended credential type because they're considered more secure than client secrets. For more information about using a certificate as an authentication method in your application, see [Microsoft identity platform application authentication certificate credentials](/azure/active-directory/develop/active-directory-certificate-credentials).
116
+
Sometimes called a _public key_, a certificate is the recommended credential type because they're considered more secure than client secrets. For more information about using a certificate as an authentication method in your application, see [Microsoft identity platform application authentication certificate credentials](../articles/active-directory/develop/active-directory-certificate-credentials.md).
117
117
118
118
1. In the Azure portal, in **App registrations**, select your application.
@@ -135,12 +135,12 @@ Client secrets are considered less secure than certificate credentials. Applicat
135
135
1. Select **Add**.
136
136
1._Record the secret's value_ for use in your client application code. This secret value is _never displayed again_ after you leave this page.
137
137
138
-
For application security recommendations, see [Microsoft identity platform best practices and recommendations](/azure/active-directory/develop/identity-platform-integration-checklist#security).
138
+
For application security recommendations, see [Microsoft identity platform best practices and recommendations](../articles/active-directory/develop/identity-platform-integration-checklist.md#security).
139
139
140
140
141
141
### Add a federated credential
142
142
143
-
Federated identity credentials are a type of credential that allows workloads, such as GitHub Actions, workloads running on Kubernetes, or workloads running in compute platforms outside of Azure access Azure AD protected resources without needing to manage secrets using [workload identity federation](/azure/active-directory/develop/workload-identity-federation).
143
+
Federated identity credentials are a type of credential that allows workloads, such as GitHub Actions, workloads running on Kubernetes, or workloads running in compute platforms outside of Azure access Azure AD protected resources without needing to manage secrets using [workload identity federation](../articles/active-directory/develop/workload-identity-federation.md).
144
144
145
145
To add a federated credential, follow these steps:
146
146
@@ -149,9 +149,9 @@ To add a federated credential, follow these steps:
149
149
1. In the **Federated credential scenario** drop-down box, select one of the supported scenarios, and follow the corresponding guidance to complete the configuration.
150
150
151
151
-**Customer managed keys** for encrypt data in your tenant using Azure Key Vault in another tenant.
152
-
-**GitHub actions deploying Azure resources** to [configure a GitHub workflow](/azure/active-directory/develop/workload-identity-federation-create-trust#github-actions) to get tokens for your application and deploy assets to Azure.
153
-
-**Kubernetes accessing Azure resources** to configure a [Kubernetes service account](/azure/active-directory/develop/workload-identity-federation-create-trust#kubernetes) to get tokens for your application and access Azure resources.
154
-
-**Other issuer** to configure an identity managed by an external [OpenID Connect provider](/azure/active-directory/develop/workload-identity-federation-create-trust#other-identity-providers) to get tokens for your application and access Azure resources.
152
+
-**GitHub actions deploying Azure resources** to [configure a GitHub workflow](../articles/active-directory/develop/workload-identity-federation-create-trust.md#github-actions) to get tokens for your application and deploy assets to Azure.
153
+
-**Kubernetes accessing Azure resources** to configure a [Kubernetes service account](../articles/active-directory/develop/workload-identity-federation-create-trust.md#kubernetes) to get tokens for your application and access Azure resources.
154
+
-**Other issuer** to configure an identity managed by an external [OpenID Connect provider](../articles/active-directory/develop/workload-identity-federation-create-trust.md#other-identity-providers) to get tokens for your application and access Azure resources.
155
155
156
156
157
-
For more information, how to get an access token with a federated credential, check out the [Microsoft identity platform and the OAuth 2.0 client credentials flow](/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#third-case-access-token-request-with-a-federated-credential) article.
157
+
For more information, how to get an access token with a federated credential, check out the [Microsoft identity platform and the OAuth 2.0 client credentials flow](../articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md#third-case-access-token-request-with-a-federated-credential) article.
Copy file name to clipboardExpand all lines: includes/active-directory-policy-deploy-template.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,5 +7,4 @@ ms.author: joflore
7
7
---
8
8
## Template deployment
9
9
10
-
Organizations can choose to deploy this policy using the steps outlined below or using the [Conditional Access templates (Preview)](/azure/active-directory/conditional-access/concept-conditional-access-policy-common#conditional-access-templates-preview).
11
-
10
+
Organizations can choose to deploy this policy using the steps outlined below or using the [Conditional Access templates (Preview)](../articles/active-directory/conditional-access/concept-conditional-access-policy-common.md#conditional-access-templates-preview).
Copy file name to clipboardExpand all lines: includes/active-directory-policy-exclude-user.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,6 @@ ms.author: joflore
10
10
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
11
11
12
12
-**Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
13
-
- More information can be found in the article, [Manage emergency access accounts in Azure AD](/azure/active-directory/roles/security-emergency-access).
13
+
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../articles/active-directory/roles/security-emergency-access.md).
14
14
-**Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals aren't blocked by Conditional Access.
15
-
- If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](/azure/active-directory/managed-identities-azure-resources/overview). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
15
+
- If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../articles/active-directory/managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
Copy file name to clipboardExpand all lines: includes/dms-ads-sqlmi-prereq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,6 +55,6 @@ ms.date: 09/30/2022
55
55
56
56
- If you use a self-hosted integration runtime, make sure that the computer on which the runtime is installed can connect to the source SQL Server instance and the network file share where backup files are located.
57
57
58
-
- Enable outbound port 445 to allow access to the network file share. For more information, see [recommendations for using a self-hosted integration runtime](/azure/dms/migration-using-azure-data-studio.md#recommendations-for-using-a-self-hosted-integration-runtime-for-database-migrations).
58
+
- Enable outbound port 445 to allow access to the network file share. For more information, see [recommendations for using a self-hosted integration runtime](../articles/dms/migration-using-azure-data-studio.md#recommendations-for-using-a-self-hosted-integration-runtime-for-database-migrations).
59
59
60
-
- If you're using Database Migration Service for the first time, make sure that the Microsoft.DataMigration resource provider is registered in your subscription. You can complete the steps to [register the resource provider](/azure/dms/quickstart-create-data-migration-service-portal.md#register-the-resource-provider).
60
+
- If you're using Database Migration Service for the first time, make sure that the Microsoft.DataMigration resource provider is registered in your subscription. You can complete the steps to [register the resource provider](../articles/dms/quickstart-create-data-migration-service-portal.md#register-the-resource-provider).
Copy file name to clipboardExpand all lines: includes/dms-ads-sqlvm-prereq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,6 @@ ms.date: 09/30/2022
57
57
58
58
- If you use a self-hosted integration runtime, make sure that the computer on which the runtime is installed can connect to the source SQL Server instance and the network file share where backup files are located.
59
59
60
-
- Enable outbound port 445 to allow access to the network file share. For more information, see [recommendations for using a self-hosted integration runtime](/azure/dms/migration-using-azure-data-studio.md#recommendations-for-using-a-self-hosted-integration-runtime-for-database-migrations).
60
+
- Enable outbound port 445 to allow access to the network file share. For more information, see [recommendations for using a self-hosted integration runtime](../articles/dms/migration-using-azure-data-studio.md#recommendations-for-using-a-self-hosted-integration-runtime-for-database-migrations).
61
61
62
-
- If you're using Azure Database Migration Service for the first time, make sure that the Microsoft.DataMigration [resource provider is registered in your subscription](/azure/dms/quickstart-create-data-migration-service-portal.md#register-the-resource-provider).
62
+
- If you're using Azure Database Migration Service for the first time, make sure that the Microsoft.DataMigration [resource provider is registered in your subscription](../articles/dms/quickstart-create-data-migration-service-portal.md#register-the-resource-provider).
0 commit comments