Skip to content

Commit 343a5e9

Browse files
authored
Merge pull request #239689 from davidmu1/entapprolemanage1
rename of active-directory-enterprise-app-role-management
2 parents 02c64a8 + 1f6f4c6 commit 343a5e9

File tree

3 files changed

+9
-4
lines changed

3 files changed

+9
-4
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-enterprise-app-role-management.md",
5+
"redirect_url": "/azure/active-directory/develop/enterprise-app-role-management",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/develop/active-directory-schema-extensions.md",
510
"redirect_url": "/azure/active-directory/develop/schema-extensions",

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,7 @@
455455
- name: Configure optional claims
456456
href: optional-claims.md
457457
- name: Configure role claim
458-
href: active-directory-enterprise-app-role-management.md
458+
href: enterprise-app-role-management.md
459459
- name: Customize JWT claims
460460
href: jwt-claims-customization.md
461461
- name: Customize SAML claims
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
2020

2121
## Prerequisites
2222

23-
- An Azure AD subscription with a set up tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
23+
- An Azure AD subscription with a configured tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
2424
- An enterprise application that has been added to the tenant. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
2525
- Single sign-on (SSO) configured for the application. For more information, see [Enable single sign-on for an enterprise application](../manage-apps/add-application-portal-setup-sso.md).
26-
- A user account that will be assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
26+
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
2727

2828
> [!NOTE]
2929
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
@@ -43,7 +43,7 @@ Use the following steps to locate the enterprise application:
4343

4444
Use the Microsoft Graph Explorer to add roles to an enterprise application.
4545

46-
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the global admin or co-admin credentials for your tenant.
46+
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the administrator credentials for your tenant.
4747

4848
> [!NOTE]
4949
> The Cloud App Administrator and App Administrator role won't work in this scenario. The Global Admin permissions are needed for directory read and write.

0 commit comments

Comments
 (0)