Skip to content

Commit 35ae37a

Browse files
authored
Consistency changes
1 parent 703ab25 commit 35ae37a

5 files changed

+8
-8
lines changed

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To use the Azure portal to set up your app to require client certificates:
4242

4343
### [Azure CLI](#tab/azurecli)
4444

45-
To use the Azure CLI, run the following command in the [Cloud Shell](https://shell.azure.com):
45+
To use the Azure CLI, run the following command in [Azure Cloud Shell](https://shell.azure.com):
4646

4747
```azurecli-interactive
4848
az webapp update --set clientCertEnabled=true --name <app-name> --resource-group <group-name>

articles/app-service/configure-authentication-oauth-tokens.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ When your provider's access token (not the [session token](#extend-session-token
4242
- **X**: Access tokens don't expire (see [OAuth FAQ](https://developer.x.com/en/docs/authentication/faq)).
4343
- **Microsoft**: In [https://resources.azure.com](https://resources.azure.com), do the following steps:
4444
1. At the top of the pane, select **Read/Write**.
45-
1. On the explorer menu, go to **subscriptions** > **_\<subscription\_name>_** > **resourceGroups** > **_\<resource\_group\_name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app\_name>_** > **config** > **authsettingsV2**.
45+
1. On the explorer menu, go to **subscriptions** > *subscription name* > **resourceGroups** > *resource group name* > **providers** > **Microsoft.Web** > **sites** > *app name* > **config** > **authsettingsV2**.
4646
1. Select **Edit**.
4747
1. Modify the following property:
4848

@@ -59,7 +59,7 @@ When your provider's access token (not the [session token](#extend-session-token
5959
1. Select **Put**.
6060

6161
> [!NOTE]
62-
> The scope that gives you a refresh token is [offline_access](../active-directory/develop/v2-permissions-and-consent.md#offline_access). See how it's used in [Tutorial: Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md). The other scopes are already requested by App Service by default. For information on these default scopes, see [OpenID Connect Scopes](../active-directory/develop/v2-permissions-and-consent.md#openid-connect-scopes).
62+
> The scope that gives you a refresh token is [offline_access](../active-directory/develop/v2-permissions-and-consent.md#offline_access). See how it's used in [Tutorial: Authenticate and authorize users end to end in Azure App Service](tutorial-auth-aad.md). The other scopes are already requested by App Service by default. For information on these default scopes, see [OpenID Connect Scopes](../active-directory/develop/v2-permissions-and-consent.md#openid-connect-scopes).
6363

6464
After your provider is configured, you can [find the refresh token and the expiration time for the access token](#retrieve-tokens-in-app-code) in the token store.
6565

@@ -84,7 +84,7 @@ The authenticated session expires after 8 hours. After an authenticated session
8484

8585
If 72 hours isn't enough time for you, you can extend this expiration window. Extending the expiration over a long period could have significant security implications (such as when an authentication token is leaked or stolen). We recommend that you leave the setting at the default 72 hours or set the extension period to the smallest value.
8686

87-
To extend the default expiration window, run the following command in the [Cloud Shell](../cloud-shell/overview.md).
87+
To extend the default expiration window, run the following command in [Azure Cloud Shell](../cloud-shell/overview.md).
8888

8989
```azurecli-interactive
9090
az webapp auth update --resource-group <group_name> --name <app_name> --token-refresh-extension-hours <hours>
@@ -96,4 +96,4 @@ az webapp auth update --resource-group <group_name> --name <app_name> --token-re
9696
9797
## Related content
9898

99-
- [Tutorial: Authenticate and authorize users end-to-end](tutorial-auth-aad.md)
99+
- [Tutorial: Authenticate and authorize users end to end](tutorial-auth-aad.md)

articles/app-service/configure-authentication-user-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,4 +142,4 @@ If the [token store](overview-authentication-authorization.md#token-store) is en
142142

143143
## Related content
144144

145-
- [Tutorial: Authenticate and authorize users end-to-end](tutorial-auth-aad.md)
145+
- [Tutorial: Authenticate and authorize users end to end](tutorial-auth-aad.md)

articles/app-service/overview-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ App Service authentication and authorization support multiple authentication pro
5555
When you authenticate against a back-end service, App Service provides two mechanisms depending on your need:
5656

5757
- **Service identity**: Sign in to the remote resource by using the identity of the app itself. In App Service, you can easily create a [managed identity](overview-managed-identity.md), which you can use to authenticate with other services, such as [Azure SQL Database](/azure/sql-database/) or [Azure Key Vault](/azure/key-vault/). For an end-to-end tutorial of this approach, see [Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md).
58-
- **On behalf of (OBO)**: Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as to [Microsoft Graph](/graph/overview) or to a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md).
58+
- **On behalf of (OBO)**: Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as to [Microsoft Graph](/graph/overview) or to a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end to end in Azure App Service](tutorial-auth-aad.md).
5959

6060
## Connectivity to remote resources
6161

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Some examples in this article are provided for both WebJobs version 3.*x* and We
3232

3333
Source code repositories for both Azure Functions and the WebJobs SDK use the WebJobs SDK numbering. Several sections of this article link to Azure Functions documentation.
3434

35-
For more information, see [Compare the WebJobs SDK and Azure Functions](../azure-functions/functions-compare-logic-apps-ms-flow-webjobs.md#compare-functions-and-webjobs)
35+
For more information, see [Compare the WebJobs SDK and Azure Functions](../azure-functions/functions-compare-logic-apps-ms-flow-webjobs.md#compare-functions-and-webjobs).
3636

3737
## WebJobs host
3838

0 commit comments

Comments
 (0)