Skip to content

Commit 413d987

Browse files
committed
fix broken links
1 parent 386b9bb commit 413d987

File tree

3 files changed

+73
-50
lines changed

3 files changed

+73
-50
lines changed

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 23 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: infrastructure-services
1010
ms.topic: how-to
11-
ms.date: 01/02/2023
11+
ms.date: 03/16/2023
1212
ms.author: jomondi
1313
ms.reviewer: ludwignick
1414
ms.custom: seoapril2019, contperf-fy22q2
@@ -33,7 +33,8 @@ For federated users with cloud-enabled credentials, such as SMS sign-in or FIDO
3333
To configure HRD policy for an application in Azure AD, you need:
3434

3535
- An Azure account with an active subscription. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
36-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
- One of the following roles: Global Administrator, or owner of the service principal.
37+
3738
::: zone pivot="powershell-hrd"
3839
- The latest Azure AD PowerShell cmdlet preview.
3940
::: zone-end
@@ -229,32 +230,33 @@ Set the HRD policy using Microsoft Graph. See [homeRealmDiscoveryPolicy](/graph/
229230
230231
From the Microsoft Graph explorer window:
231232
232-
1. Grant consent to the *Policy.ReadWrite.ApplicationConfiguration* permission.
233-
1. Use the URL https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
234-
1. POST the new policy to this URL, or PATCH to https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policyID} if overwriting an existing one.
235-
1. POST or PATCH contents:
236-
237-
```json
238-
{
239-
"definition": [
240-
"{\"HomeRealmDiscoveryPolicy\":
241-
{\"AccelerateToFederatedDomain\":true,
242-
\"PreferredDomain\":\"federated.example.edu\",
243-
\"AlternateIdLogin\":{\"Enabled\":true}}}"
244-
],
245-
"displayName": "Home Realm Discovery auto acceleration",
246-
"isOrganizationDefault": true
247-
}
233+
1. Sign in with one of the roles listed in the prerequisites section.
234+
1. Grant consent to the `Policy.ReadWrite.ApplicationConfiguration` permission.
235+
1. Use the [Home realm discovery policy](/graph/api/resources/homerealmdiscoverypolicy?view=graph-rest-1.0) to create a new policy.
236+
1. POST the new policy, or PATCH to update an existing policy.
237+
238+
```http
239+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
240+
{
241+
"definition": [
242+
"{\"HomeRealmDiscoveryPolicy\":
243+
{\"AccelerateToFederatedDomain\":true,
244+
\"PreferredDomain\":\"federated.example.edu\",
245+
\"AlternateIdLogin\":{\"Enabled\":true}}}"
246+
],
247+
"displayName": "Home Realm Discovery auto acceleration",
248+
"isOrganizationDefault": true
249+
}
248250
```
249-
1. To see your new policy and get its ObjectID, run the following query:
251+
1. To view your new policy, run the following query:
250252
251253
```http
252-
GET https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
254+
GET /policies/homeRealmDiscoveryPolicies/{id}
253255
```
254256
1. To delete the HRD policy you created, run the query:
255257
256258
```http
257-
DELETE https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policy objectID}
259+
DELETE /policies/homeRealmDiscoveryPolicies/{id}
258260
```
259261
::: zone-end
260262

articles/active-directory/manage-apps/prevent-domain-hints-with-home-realm-discovery.md

Lines changed: 48 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: infrastructure-services
1010
ms.topic: how-to
11-
ms.date: 02/09/2022
11+
ms.date: 03/16/2023
1212
ms.author: jomondi
1313
ms.reviewer: ludwignick
1414
zone_pivot_groups: home-realm-discovery
@@ -51,7 +51,7 @@ Once a user has entered a username at the login page, they can use their managed
5151
To disable auto-acceleration sign-in for an application in Azure AD, you need:
5252

5353
- An Azure account with an active subscription. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
54-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
54+
- One of the following roles: Global Administrator, or owner of the service principal.
5555
::: zone pivot="powershell-hrd"
5656
- The latest Azure AD PowerShell cmdlet preview.
5757
::: zone-end
@@ -64,7 +64,9 @@ Admins of federated domains should set up this section of the HRD policy in a fo
6464

6565
::: zone pivot="graph-hrd"
6666

67-
```json
67+
```http
68+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
69+
6870
"DomainHintPolicy": {
6971
"IgnoreDomainHintForDomains": [ "testDomain.com" ],
7072
"RespectDomainHintForDomains": [],
@@ -77,15 +79,20 @@ Admins of federated domains should set up this section of the HRD policy in a fo
7779
::: zone pivot="powershell-hrd"
7880

7981
```powershell
80-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`" ], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": [] } } }") -DisplayName BasicBlockAccelerationPolicy -Type HomeRealmDiscoveryPolicy
82+
New-AzureADPolicy
83+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`" ], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": [] } } }")
84+
-DisplayName BasicBlockAccelerationPolicy
85+
-Type HomeRealmDiscoveryPolicy
8186
```
8287
::: zone-end
8388

8489
2. Gather feedback from the test domain users. Collect details for applications that broke as a result of this change - they have a dependency on domain hint usage, and should be updated. For now, add them to the `RespectDomainHintForApps` section:
8590

8691
::: zone pivot="graph-hrd"
8792

88-
```json
93+
```http
94+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
95+
8996
"DomainHintPolicy": {
9097
"IgnoreDomainHintForDomains": [ "testDomain.com" ],
9198
"RespectDomainHintForDomains": [],
@@ -98,15 +105,21 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPoli
98105
::: zone pivot="powershell-hrd"
99106

100107
```powershell
101-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`" ], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid] } } }") -DisplayName BasicBlockAccelerationPolicy -Type HomeRealmDiscoveryPolicy
108+
New-AzureADPolicy
109+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`" ], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid"] } } }")
110+
-DisplayName BasicBlockAccelerationPolicy
111+
-Type HomeRealmDiscoveryPolicy
102112
```
113+
103114
::: zone-end
104115

105116
3. Continue expanding rollout of the policy to new domains, collecting more feedback.
106117

107118
::: zone pivot="graph-hrd"
108119

109-
```json
120+
```http
121+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
122+
110123
"DomainHintPolicy": {
111124
"IgnoreDomainHintForDomains": [ "testDomain.com", "otherDomain.com", "anotherDomain.com"],
112125
"RespectDomainHintForDomains": [],
@@ -119,7 +132,10 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPoli
119132
::: zone pivot="powershell-hrd"
120133

121134
```powershell
122-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`", "otherDomain.com", "anotherDomain.com"], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid] } } }") -DisplayName BasicBlockAccelerationPolicy -Type HomeRealmDiscoveryPolicy
135+
New-AzureADPolicy
136+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"testDomain.com`", "otherDomain.com", "anotherDomain.com"], `"RespectDomainHintForDomains`": [], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid"] } } }")
137+
-DisplayName BasicBlockAccelerationPolicy
138+
-Type HomeRealmDiscoveryPolicy
123139
```
124140

125141
::: zone-end
@@ -128,7 +144,9 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPoli
128144

129145
::: zone pivot="graph-hrd"
130146

131-
```json
147+
```http
148+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
149+
132150
"DomainHintPolicy": {
133151
"IgnoreDomainHintForDomains": [ "*" ],
134152
"RespectDomainHintForDomains": ["guestHandlingDomain.com"],
@@ -142,7 +160,10 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPoli
142160
::: zone pivot="powershell-hrd"
143161

144162
```powershell
145-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"*`" ], `"RespectDomainHintForDomains`": [guestHandlingDomain.com], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid] } } }") -DisplayName BasicBlockAccelerationPolicy -Type HomeRealmDiscoveryPolicy
163+
New-AzureADPolicy
164+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"DomainHintPolicy`": { `"IgnoreDomainHintForDomains`": [ `"*`" ], `"RespectDomainHintForDomains`": [guestHandlingDomain.com], `"IgnoreDomainHintForApps`": [], `"RespectDomainHintForApps`": ["app1-clientID-Guid", "app2-clientID-Guid"] } } }")
165+
-DisplayName BasicBlockAccelerationPolicy
166+
-Type HomeRealmDiscoveryPolicy
146167
```
147168

148169
::: zone-end
@@ -153,23 +174,23 @@ After step 4 is complete all users, except those in `guestHandlingDomain.com`, c
153174

154175
## Configuring policy through Graph Explorer
155176

156-
Set the [Home Realm Discovery policy](/graph/api/resources/homeRealmDiscoveryPolicy) as usual, using Microsoft Graph.
157-
158-
1. Grant the Policy.ReadWrite.ApplicationConfiguration permission in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
159-
1. Use the URL `https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies`
160-
1. POST the new policy to this URL, or PATCH to `/policies/homerealmdiscoveryPolicies/{policyID}` if overwriting an existing one.
161-
162-
POST or PATCH contents:
163-
164-
```json
165-
{
166-
"displayName":"Home Realm Discovery Domain Hint Exclusion Policy",
167-
"definition":[
168-
"{\"HomeRealmDiscoveryPolicy\" : {\"DomainHintPolicy\": { \"IgnoreDomainHintForDomains\": [ \"Contoso.com\" ], \"RespectDomainHintForDomains\": [], \"IgnoreDomainHintForApps\": [\"sample-guid-483c-9dea-7de4b5d0a54a\"], \"RespectDomainHintForApps\": [] } } }"
169-
],
170-
"isOrganizationDefault":true
171-
}
172-
```
177+
Manage the [Home Realm Discovery policy](/graph/api/resources/homeRealmDiscoveryPolicy using [Microsoft Graph](https://developer.microsoft.com/graph/graph-explorer).
178+
179+
1. Sign in to Microsoft Graph explorer with one of the roles listed in the prerequisite section.
180+
1. Grant the `Policy.ReadWrite.ApplicationConfiguration` permission.
181+
1. Use the [Home realm discovery policy](/graph/api/resources/homerealmdiscoverypolicy?view=graph-rest-1.0) to create a new policy.
182+
1. POST the new policy, or PATCH to update an existing policy.
183+
184+
```http
185+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
186+
{
187+
"displayName":"Home Realm Discovery Domain Hint Exclusion Policy",
188+
"definition":[
189+
"{\"HomeRealmDiscoveryPolicy\" : {\"DomainHintPolicy\": { \"IgnoreDomainHintForDomains\": [\"Contoso.com\"], \"RespectDomainHintForDomains\": [], \"IgnoreDomainHintForApps\": [\"sample-guid-483c-9dea-7de4b5d0a54a\"], \"RespectDomainHintForApps\": [] } } }"
190+
],
191+
"isOrganizationDefault":true
192+
}
193+
```
173194
174195
Be sure to use slashes to escape the `Definition` JSON section when using Graph.
175196

articles/zone-pivot-groups.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1880,9 +1880,9 @@ groups:
18801880
prompt: Choose an option
18811881
pivots:
18821882
- id: powershell-hrd
1883-
title: PowerShell
1883+
title: Azure AD PowerShell
18841884
- id: graph-hrd
1885-
title: Graph
1885+
title: Microsoft Graph
18861886
## template with all
18871887
- id: enterprise-apps-all
18881888
title: Manage Enterprise apps

0 commit comments

Comments
 (0)