Skip to content

Commit 3290964

Browse files
committed
fixed build warnings
1 parent 696da7a commit 3290964

File tree

340 files changed

+1560
-1575
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

340 files changed

+1560
-1575
lines changed

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ After your RESTful service is protected by the client ID (username) and secret,
298298

299299
## Step 5: Upload the policy to your tenant
300300

301-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
301+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
302302
303303
2. Select **Identity Experience Framework**.
304304

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To support client certificate authentication in your custom policy, change the t
9696

9797
## Step 4: Upload the policy to your tenant
9898

99-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
99+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
100100

101101
2. Select **Identity Experience Framework**.
102102

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ After you add the new claim, the relying party code looks like this:
333333

334334
## Step 7: Upload the policy to your tenant
335335

336-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
336+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
337337
338338
1. Select **Identity Experience Framework**.
339339

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130130

131131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132132

133-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134134

135135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
136136

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom-dynamic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ To configure `ContentDefinition`, do the following:
213213
![Example XML snippet with LoadUri element highlighted](media/active-directory-b2c-ui-customization-custom-dynamic/aadb2c-ief-ui-customization-content-definition.png)
214214

215215
## Step 6: Upload the policy to your tenant
216-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
216+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
217217
218218
2. Select **Identity Experience Framework**.
219219

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ The following table lists the cookies used in Azure Active Directory B2C.
1919

2020
| Name | Domain | Expiration | Purpose |
2121
| ----------- | ------ | -------------------------- | --------- |
22-
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](active-directory-b2c-token-session-sso.md) | Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23-
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used to route requests to the appropriate production instance. |
24-
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25-
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for maintaining the SSO session. |
26-
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md), successful authentication | Used for maintaining the request state. |
27-
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Cross-Site Request Forgery token used for CRSF protection. |
28-
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for Azure AD B2C network routing. |
29-
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Context |
30-
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for storing membership data for the resource provider tenant. |
31-
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for storing the relay cookie. |
22+
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](session-behavior.md) | Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23+
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used to route requests to the appropriate production instance. |
24+
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25+
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for maintaining the SSO session. |
26+
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
27+
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Cross-Site Request Forgery token used for CRSF protection. |
28+
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for Azure AD B2C network routing. |
29+
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Context |
30+
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
31+
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
3232

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204204
### SubjectNamingInfo
205205

206206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207-
- **JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207+
- **JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](session-behavior.md).
208208
- **SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209209

210210
The **SubjectNamingInfo** element contains the following attribute:

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,6 @@ In this article, you used the Azure portal to configure and deploy resources usi
139139
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
140140
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
141141
[create-azure-ad-ds-instance]: tutorial-create-instance.md
142-
[template-overview]: ../azure-resource-manager/template-deployment-overview.md
143-
[deploy-powershell]: ../azure-resource-manager/resource-group-template-deploy.md
144-
[deploy-cli]: ../azure-resource-manager/resource-group-template-deploy-cli.md
142+
[template-overview]: ../azure-resource-manager/templates/overview.md
143+
[deploy-powershell]: ../azure-resource-manager/templates/deploy-powershell.md
144+
[deploy-cli]: ../azure-resource-manager/templates/deploy-cli.md

articles/active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2424

25-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
25+
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
2626

2727
In this article, using the Azure Resource Manager deployment template, you learn how to perform the following managed identities for Azure resources operations on an Azure VM:
2828

@@ -40,7 +40,7 @@ As with the Azure portal and scripting, [Azure Resource Manager](../../azure-res
4040
- Using a local [JSON editor (such as VS Code)](../../azure-resource-manager/resource-manager-create-first-template.md), and then uploading and deploying by using PowerShell or CLI.
4141
- Using the Visual Studio [Azure Resource Group project](../../azure-resource-manager/templates/create-visual-studio-deployment-project.md) to both create and deploy a template.
4242

43-
Regardless of the option you choose, template syntax is the same during initial deployment and redeployment. Enabling a system or user-assigned managed identity on a new or existing VM is done in the same manner. Also, by default, Azure Resource Manager does an [incremental update](../../azure-resource-manager/deployment-modes.md) to deployments.
43+
Regardless of the option you choose, template syntax is the same during initial deployment and redeployment. Enabling a system or user-assigned managed identity on a new or existing VM is done in the same manner. Also, by default, Azure Resource Manager does an [incremental update](../../azure-resource-manager/templates/deployment-modes) to deployments.
4444

4545
## System-assigned managed identity
4646

@@ -55,7 +55,7 @@ To enable system-assigned managed identity on a VM, your account needs the [Virt
5555
2. To enable system-assigned managed identity, load the template into an editor, locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section and add the `"identity"` property at the same level as the `"type": "Microsoft.Compute/virtualMachines"` property. Use the following syntax:
5656

5757
```JSON
58-
"identity": {
58+
"identity": {
5959
"type": "SystemAssigned"
6060
},
6161
```
@@ -76,7 +76,7 @@ To enable system-assigned managed identity on a VM, your account needs the [Virt
7676
"type": "SystemAssigned",
7777
},
7878
},
79-
79+
8080
//The following appears only if you provisioned the optional VM extension (to be deprecated)
8181
{
8282
"type": "Microsoft.Compute/virtualMachines/extensions",
@@ -106,9 +106,9 @@ After you have enabled system-assigned managed identity on your VM, you may want
106106
To assign a role to your VM's system-assigned identity, your account needs the [User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) role assignment.
107107

108108
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
109-
109+
110110
2. Load the template into an [editor](#azure-resource-manager-templates) and add the following information to give your VM **Reader** access to the resource group in which it was created. Your template structure may vary depending on the editor and the deployment model you choose.
111-
111+
112112
Under the `parameters` section add the following:
113113

114114
```JSON
@@ -152,15 +152,15 @@ To remove system-assigned managed identity from a VM, your account needs the [Vi
152152
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
153153

154154
2. Load the template into an [editor](#azure-resource-manager-templates) and locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section. If you have a VM that only has system-assigned managed identity, you can disable it by changing the identity type to `None`.
155-
155+
156156
**Microsoft.Compute/virtualMachines API version 2018-06-01**
157157

158158
If your VM has both system and user-assigned managed identities, remove `SystemAssigned` from the identity type and keep `UserAssigned` along with the `userAssignedIdentities` dictionary values.
159159

160160
**Microsoft.Compute/virtualMachines API version 2018-06-01**
161-
161+
162162
If your `apiVersion` is `2017-12-01` and your VM has both system and user-assigned managed identities, remove `SystemAssigned` from the identity type and keep `UserAssigned` along with the `identityIds` array of the user-assigned managed identities.
163-
163+
164164
The following example shows you how remove a system-assigned managed identity from a VM with no user-assigned managed identities:
165165

166166
```JSON
@@ -169,7 +169,7 @@ The following example shows you how remove a system-assigned managed identity fr
169169
"type": "Microsoft.Compute/virtualMachines",
170170
"name": "[parameters('vmName')]",
171171
"location": "[resourceGroup().location]",
172-
"identity": {
172+
"identity": {
173173
"type": "None"
174174
}
175175
}
@@ -206,11 +206,11 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
206206
}
207207
}
208208
```
209-
209+
210210
**Microsoft.Compute/virtualMachines API version 2017-12-01**
211-
211+
212212
If your `apiVersion` is `2017-12-01`, your user-assigned managed identities are stored in the `identityIds` array and the `<USERASSIGNEDIDENTITYNAME>` value must be stored in a variable defined in the `variables` section of your template.
213-
213+
214214
```JSON
215215
{
216216
"apiVersion": "2017-12-01",
@@ -225,9 +225,9 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
225225
}
226226
}
227227
```
228-
228+
229229
3. When you're done, the following sections should added to the `resource` section of your template and it should resemble the following:
230-
230+
231231
**Microsoft.Compute/virtualMachines API version 2018-06-01**
232232

233233
```JSON
@@ -267,7 +267,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
267267
]
268268
```
269269
**Microsoft.Compute/virtualMachines API version 2017-12-01**
270-
270+
271271
```JSON
272272
"resources": [
273273
{
@@ -283,7 +283,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
283283
]
284284
}
285285
},
286-
286+
287287
//The following appears only if you provisioned the optional VM extension (to be deprecated)
288288
{
289289
"type": "Microsoft.Compute/virtualMachines/extensions",
@@ -313,33 +313,33 @@ To remove a user-assigned identity from a VM, your account needs the [Virtual Ma
313313
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
314314

315315
2. Load the template into an [editor](#azure-resource-manager-templates) and locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section. If you have a VM that only has user-assigned managed identity, you can disable it by changing the identity type to `None`.
316-
316+
317317
The following example shows you how remove all user-assigned managed identities from a VM with no system-assigned managed identities:
318-
318+
319319
```json
320320
{
321321
"apiVersion": "2018-06-01",
322322
"type": "Microsoft.Compute/virtualMachines",
323323
"name": "[parameters('vmName')]",
324324
"location": "[resourceGroup().location]",
325-
"identity": {
325+
"identity": {
326326
"type": "None"
327327
},
328328
}
329329
```
330-
330+
331331
**Microsoft.Compute/virtualMachines API version 2018-06-01**
332-
332+
333333
To remove a single user-assigned managed identity from a VM, remove it from the `useraAssignedIdentities` dictionary.
334334

335335
If you have a system-assigned managed identity, keep it in the in the `type` value under the `identity` value.
336-
336+
337337
**Microsoft.Compute/virtualMachines API version 2017-12-01**
338338

339339
To remove a single user-assigned managed identity from a VM, remove it from the `identityIds` array.
340340

341341
If you have a system-assigned managed identity, keep it in the in the `type` value under the `identity` value.
342-
342+
343343
## Next steps
344344

345345
- [Managed identities for Azure resources overview](overview.md).

0 commit comments

Comments
 (0)