Skip to content

Commit 3f01468

Browse files
committed
[BULK] - DocuTune: Fix stale and broken links
1 parent a3e1f0b commit 3f01468

File tree

9 files changed

+16
-17
lines changed

9 files changed

+16
-17
lines changed

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
8484
:::image type="content" source="media/tutorial-create-tenant/review-and-create-tenant.png" alt-text="Screenshot of create tenant form in with example values in Azure portal.":::
8585

8686
1. Select **Review + create**.
87-
1. Review your directory settings. Then select **Create**. Learn more about [troubleshooting deployment errors](../azure-resource-manager/templates/common-deployment-errors.md).
87+
1. Review your directory settings. Then select **Create**. Learn more about [troubleshooting deployment errors](../azure-resource-manager/troubleshooting/common-deployment-errors.md).
8888

8989
You can link multiple Azure AD B2C tenants to a single Azure subscription for billing purposes. To link a tenant, you must be an admin in the Azure AD B2C tenant and be assigned at least a Contributor role within the Azure subscription. See [Link an Azure AD B2C tenant to a subscription](billing.md#link-an-azure-ad-b2c-tenant-to-a-subscription).
9090

articles/active-directory-b2c/user-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ The following types of accounts are available:
2929

3030
## Work account
3131

32-
A work account is created the same way for all tenants based on Azure AD. To create a work account, you can use the information in [Quickstart: Add new users to Azure Active Directory](../active-directory/fundamentals/add-users-azure-active-directory.md). A work account is created using the **New user** choice in the Azure portal.
32+
A work account is created the same way for all tenants based on Azure AD. To create a work account, you can use the information in [Quickstart: Add new users to Azure Active Directory](../active-directory/fundamentals/add-users.md). A work account is created using the **New user** choice in the Azure portal.
3333

3434
When you add a new work account, you need to consider the following configuration settings:
3535

3636
- **Name** and **User name** - The **Name** property contains the given and surname of the user. The **User name** is the identifier that the user enters to sign in. The user name includes the full domain. The domain name portion of the user name must either be the initial default domain name *your-domain.onmicrosoft.com*, or a verified, non-federated [custom domain](../active-directory/fundamentals/add-custom-domain.md) name such as *contoso.com*.
3737
- **Email** - The new user can also sign in using an email address. We do not support special characters or multibyte characters in email, for example Japanese characters.
3838
- **Profile** - The account is set up with a profile of user data. You have the opportunity to enter a first name, last name, job title, and department name. You can edit the profile after the account is created.
39-
- **Groups** - Use groups to perform management tasks such as assigning licenses or permissions to many users, or devices at once. You can put the new account into an existing [group](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md) in your tenant.
39+
- **Groups** - Use groups to perform management tasks such as assigning licenses or permissions to many users, or devices at once. You can put the new account into an existing [group](../active-directory/fundamentals/how-to-manage-groups.md) in your tenant.
4040
- **Directory role** - You need to specify the level of access that the user account has to resources in your tenant. The following permission levels are available:
4141

4242
- **User** - Users can access assigned resources but cannot manage most tenant resources.
@@ -47,21 +47,21 @@ When you add a new work account, you need to consider the following configuratio
4747

4848
You can use the following information to create a new work account:
4949

50-
- [Azure portal](../active-directory/fundamentals/add-users-azure-active-directory.md)
50+
- [Azure portal](../active-directory/fundamentals/add-users.md)
5151
- [Microsoft Graph](/graph/api/user-post-users)
5252

5353
### Update a user profile
5454

5555
You can use the following information to update the profile of a user:
5656

57-
- [Azure portal](../active-directory/fundamentals/active-directory-users-profile-azure-portal.md)
57+
- [Azure portal](../active-directory/fundamentals/how-to-manage-user-profile-info.md)
5858
- [Microsoft Graph](/graph/api/user-update)
5959

6060
### Reset a password for a user
6161

6262
You can use the following information to reset the password of a user:
6363

64-
- [Azure portal](../active-directory/fundamentals/active-directory-users-reset-password-azure-portal.md)
64+
- [Azure portal](../active-directory/fundamentals/users-reset-password-azure-portal.md)
6565
- [Microsoft Graph](/graph/api/user-update)
6666

6767
## Guest user

articles/active-directory-b2c/view-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ To download the list of activity events in a comma-separated values (CSV) file,
8080

8181
## Get audit logs with the Azure AD reporting API
8282

83-
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](/graph/api/directoryaudit-list). For more information, see [Get started with the Azure Active Directory reporting API](../active-directory/reports-monitoring/concept-reporting-api.md).
83+
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](/graph/api/directoryaudit-list). For more information, see [Get started with the Azure Active Directory reporting API](../active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md).
8484

8585
### Enable reporting API access
8686

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3434
- [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md) - [Azure AD B2C] Azure AD B2C Go-Local opt-in feature
3535
- [Tutorial: Configure security analytics for Azure Active Directory B2C data with Microsoft Sentinel](configure-security-analytics-sentinel.md) - Removing product name from filename and links.
3636
- [Tutorial: Configure Azure Active Directory B2C with Azure Web Application Firewall](partner-web-application-firewall.md) - Removing product name from filename and links.
37-
- [Title not found in: #240919](azure-ad-external-identities-videos.md) - Delete azure-ad-external-identities-videos.md
37+
- [Title not found in: #240919](./external-identities-videos.md) - Delete azure-ad-external-identities-videos.md
3838
- [Build a global identity solution with funnel-based approach](b2c-global-identity-funnel-based-design.md) - Removing product name from filename and links.
3939
- [Azure Active Directory B2C global identity framework proof of concept for funnel-based configuration](b2c-global-identity-proof-of-concept-funnel.md) - Removing product name from filename and links.
4040
- [Azure Active Directory B2C global identity framework proof of concept for region-based configuration](b2c-global-identity-proof-of-concept-regional.md) - Removing product name from filename and links.
@@ -56,6 +56,5 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
5656
- [Configure Asignio with Azure Active Directory B2C for multifactor authentication](partner-asignio.md)
5757
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
5858
- [Configure WhoIAM Rampart with Azure Active Directory B2C](partner-whoiam-rampart.md)
59-
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
59+
- [Build a global identity solution with funnel-based approach](./b2c-global-identity-funnel-based-design.md)
6060
- [Use the Azure portal to create and delete consumer users in Azure AD B2C](manage-users-portal.md)
61-

articles/active-directory-domain-services/ad-auth-no-join-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,5 +230,5 @@ Now you are ready to use AD authentication on your Linux VM.
230230

231231
<!-- INTERNAL LINKS -->
232232
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
233-
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
233+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
234234
[create-azure-ad-ds-instance]: tutorial-create-instance.md

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,10 +103,10 @@ To get started, [create an Azure AD DS managed domain][create-instance].
103103
[password-policy]: password-policy.md
104104
[hybrid-phs]: tutorial-configure-password-hash-sync.md#enable-synchronization-of-password-hashes
105105
[secure-domain]: secure-your-domain.md
106-
[azure-ad-password-sync]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
106+
[azure-ad-password-sync]: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
107107
[create-instance]: tutorial-create-instance.md
108108
[tutorial-create-instance-advanced]: tutorial-create-instance-advanced.md
109-
[concepts-forest]: concepts-resource-forest.md
109+
[concepts-forest]: ./concepts-forest-trust.md
110110
[concepts-trust]: concepts-forest-trust.md
111111

112112
<!-- EXTERNAL LINKS -->

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,4 @@ Create a replacement secure LDAP certificate by following the steps to [create a
5959
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
6060

6161
<!-- INTERNAL LINKS -->
62-
[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md
62+
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md

articles/active-directory-domain-services/alert-nsg.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,5 +87,5 @@ It takes a few moments for the security rule to be added and show in the list.
8787
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
8888

8989
<!-- INTERNAL LINKS -->
90-
[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md
90+
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
9191
[configure-ldaps]: tutorial-configure-ldaps.md

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ After you delete both applications, the Azure platform automatically recreates t
108108
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
109109
110110
<!-- INTERNAL LINKS -->
111-
[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md
111+
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
112112
113113
<!-- EXTERNAL LINKS -->
114-
[New-AzureAdServicePrincipal]: /powershell/module/AzureAD/New-AzureADServicePrincipal
114+
[New-AzureAdServicePrincipal]: /powershell/module/azuread/new-azureadserviceprincipal

0 commit comments

Comments
 (0)