Skip to content

Commit 4730e46

Browse files
authored
Merge pull request #245504 from alexbuckgit/alexbuckgit/docutune-autopr-20230719-174259-3244396
[BULK] DocuTune - Standardize formatting of Azure portal links
2 parents 85b6bb0 + bcaf3bb commit 4730e46

7 files changed

+15
-20
lines changed

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,6 @@ If you receive an error when you try to set a phone number for a user account in
162162
[rest-disable]: /graph/api/phoneauthenticationmethod-disablesmssignin
163163

164164
<!-- EXTERNAL LINKS -->
165-
[azure-portal]: https://portal.azure.com
166165
[office]: https://www.office.com
167166
[m365-firstline-workers-licensing]: https://www.microsoft.com/licensing/news/m365-firstline-workers
168167
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ During preview, you currently need *Global Administrator* permissions to enable
139139

140140
### Azure portal
141141

142-
1. Sign in to the [Azure portal][azure-portal] as a *Global Administrator*.
142+
1. Sign in to the [Azure portal](https://portal.azure.com) as a *Global Administrator*.
143143
1. Search for and select **Azure Active Directory**.
144144
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Azure AD Connect > Email as alternate login ID**.
145145

@@ -453,7 +453,6 @@ For more information on hybrid identity operations, see [how password hash sync]
453453
[sign-in-logs]: ../reports-monitoring/concept-sign-ins.md
454454
455455
<!-- EXTERNAL LINKS -->
456-
[azure-portal]: https://portal.azure.com
457456
[Install-Module]: /powershell/module/powershellget/install-module
458457
[Connect-AzureAD]: /powershell/module/azuread/connect-azuread
459458
[Get-AzureADPolicy]: /powershell/module/azuread/get-azureadpolicy

articles/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -587,7 +587,6 @@ Use the comments section that follows, to provide feedback and help us refine an
587587
[AAD-Auth-Libraries]: ./active-directory-authentication-libraries.md
588588
[AAD-Auth-Scenarios]:v1-authentication-scenarios.md
589589
[AAD-Integrating-Apps]:../develop/quickstart-register-app.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
590-
[AZURE-portal]: https://portal.azure.com
591590
592591
<!--Image references-->
593592
[AAD-Sign-In]:./media/active-directory-devhowto-multi-tenant-overview/sign-in-with-microsoft-light.png

articles/active-directory/develop/app-objects-and-service-principals.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The application object describes three aspects of an application:
3737
- The resources that the application might need to access
3838
- The actions that the application can take
3939

40-
You can use the **App registrations** page in the [Azure portal][azure-portal] to list and manage the application objects in your home tenant.
40+
You can use the **App registrations** page in the [Azure portal] to list and manage the application objects in your home tenant.
4141

4242
![App registrations blade](./media/app-objects-and-service-principals/app-registrations-blade.png)
4343

@@ -136,4 +136,4 @@ Learn how to create a service principal:
136136

137137
[ms-graph-app-entity]: /graph/api/resources/application
138138
[ms-graph-sp-entity]: /graph/api/resources/serviceprincipal
139-
[azure-portal]: https://portal.azure.com
139+
[Azure portal]: https://portal.azure.com

articles/active-directory/develop/developer-glossary.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ The application ID, or _[client ID](https://datatracker.ietf.org/doc/html/rfc674
4040

4141
## Application manifest
4242

43-
A feature provided by the [Azure portal][AZURE-portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
43+
A feature provided by the [Azure portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
4444

4545
## Application object
4646

47-
When you register/update an application in the [Azure portal][AZURE-portal], the portal creates/updates both an application object and a corresponding [service principal object](#service-principal-object) for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where it has access), providing a template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
47+
When you register/update an application in the [Azure portal], the portal creates/updates both an application object and a corresponding [service principal object](#service-principal-object) for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where it has access), providing a template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
4848

4949
For more information, see [Application and Service Principal Objects][AAD-App-SP-Objects].
5050

@@ -140,7 +140,7 @@ A [client application](#client-application) gains access to a [resource server](
140140

141141
They also surface during the [consent](#consent) process, giving the administrator or resource owner the opportunity to grant/deny the client access to resources in their tenant.
142142

143-
Permission requests are configured on the **API permissions** page for an application in the [Azure portal][AZURE-portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Administrator role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
143+
Permission requests are configured on the **API permissions** page for an application in the [Azure portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Administrator role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
144144

145145
## Refresh token
146146

@@ -170,15 +170,15 @@ Like [scopes](#scopes), app roles provide a way for a [resource server](#resourc
170170

171171
App roles can support two assignment types: "user" assignment implements role-based access control for users/groups that require access to the resource, while "application" assignment implements the same for [client applications](#client-application) that require access. An app role can be defined as user-assignable, app-assignabnle, or both.
172172

173-
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. The Azure portal is also used to assign users to "user" assignable roles, and configure client [application permissions](#permissions) to request "application" assignable roles.
173+
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. The Azure portal is also used to assign users to "user" assignable roles, and configure client [application permissions](#permissions) to request "application" assignable roles.
174174

175175
For a detailed discussion of the application roles exposed by the Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For a step-by-step implementation example, see [Add or remove Azure role assignments using the Azure portal][AAD-RBAC].
176176

177177
## Scopes
178178

179179
Like [roles](#roles), scopes provide a way for a [resource server](#resource-server) to govern access to its protected resources. Scopes are used to implement [scope-based][OAuth2-Access-Token-Scopes] access control, for a [client application](#client-application) that has been given delegated access to the resource by its owner.
180180

181-
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
181+
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
182182

183183
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For scopes exposed by Microsoft 365 services, see [Microsoft 365 API permissions reference][O365-Perm-Ref].
184184

@@ -188,7 +188,7 @@ A signed document containing claims, such as an OAuth 2.0 token or SAML 2.0 asse
188188

189189
## Service principal object
190190

191-
When you register/update an application in the [Azure portal][AZURE-portal], the portal creates/updates both an [application object](#application-object) and a corresponding service principal object for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where the associated application has been granted access), and is the template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
191+
When you register/update an application in the [Azure portal], the portal creates/updates both an [application object](#application-object) and a corresponding service principal object for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where the associated application has been granted access), and is the template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
192192

193193
For more information, see [Application and Service Principal Objects][AAD-App-SP-Objects].
194194

@@ -264,7 +264,7 @@ Many of the terms in this glossary are related to the OAuth 2.0 and OpenID Conne
264264
[AAD-Multi-Tenant-Overview]:howto-convert-app-to-be-multi-tenant.md
265265
[AAD-Security-Token-Claims]: ./active-directory-authentication-scenarios/#claims-in-azure-ad-security-tokens
266266
[AAD-Tokens-Claims]:access-tokens.md
267-
[AZURE-portal]: https://portal.azure.com
267+
[Azure portal]: https://portal.azure.com
268268
[AAD-RBAC]: ../../role-based-access-control/role-assignments-portal.md
269269
[JWT]: https://tools.ietf.org/html/rfc7519
270270
[Microsoft-Graph]: https://developer.microsoft.com/graph

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ You can also refer to the sample; [Build a multi-tenant SaaS web application tha
3232

3333
## Update registration to be multi-tenant
3434

35-
By default, web app/API registrations in Azure AD are single-tenant upon creation. To make the registration multi-tenant, look for the **Supported account types** section on the **Authentication** pane of the application registration in the [Azure portal][AZURE-portal]. Change the setting to **Accounts in any organizational directory**.
35+
By default, web app/API registrations in Azure AD are single-tenant upon creation. To make the registration multi-tenant, look for the **Supported account types** section on the **Authentication** pane of the application registration in the [Azure portal]. Change the setting to **Accounts in any organizational directory**.
3636

3737
When a single-tenant application is created via the Azure portal, one of the items listed on the **Overview** page is the **Application ID URI**. This is one of the ways an application is identified in protocol messages, and can be added at any time. The App ID URI for single tenant apps can be globally unique within that tenant. In contrast, for multi-tenant apps it must be globally unique across all tenants, which ensures that Azure AD can find the app across all tenants.
3838

@@ -79,7 +79,7 @@ When a single-tenant application validates a token, it checks the signature of t
7979

8080
## Understand user and admin consent and make appropriate code changes
8181

82-
For a user to sign in to an application in Azure AD, the application must be represented in the user’s tenant. This allows the organization to do things like apply unique policies when users from their tenant sign in to the application. For a single-tenant application, one can use the registration via the [Azure portal][AZURE-portal].
82+
For a user to sign in to an application in Azure AD, the application must be represented in the user’s tenant. This allows the organization to do things like apply unique policies when users from their tenant sign in to the application. For a single-tenant application, one can use the registration via the [Azure portal].
8383

8484
For a multi-tenant application, the initial registration for the application resides in the Azure AD tenant used by the developer. When a user from a different tenant signs in to the application for the first time, Azure AD asks them to consent to the permissions requested by the application. If they consent, then a representation of the application called a *service principal* is created in the user’s tenant, and sign-in can continue. A delegation is also created in the directory that records the user’s consent to the application. For details on the application's Application and ServicePrincipal objects, and how they relate to each other, see [Application objects and service principal objects][AAD-App-SP-Objects].
8585

@@ -102,7 +102,7 @@ Certain delegated permissions also require a tenant administrator’s consent. F
102102

103103
If your application uses permissions that require admin consent, consider adding a button or link where the admin can initiate the action. The request your application sends for this action is the usual OAuth2/OpenID Connect authorization request that also includes the `prompt=consent` query string parameter. Once the admin has consented and the service principal is created in the customer’s tenant, subsequent sign-in requests don't need the `prompt=consent` parameter. Since the administrator has decided the requested permissions are acceptable, no other users in the tenant are prompted for consent from that point forward.
104104

105-
A tenant administrator can disable the ability for regular users to consent to applications. If this capability is disabled, admin consent is always required for the application to be used in the tenant. If you want to test your application with end-user consent disabled, you can find the configuration switch in the [Azure portal][AZURE-portal] in the **[User settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/)** section under **Enterprise applications**.
105+
A tenant administrator can disable the ability for regular users to consent to applications. If this capability is disabled, admin consent is always required for the application to be used in the tenant. If you want to test your application with end-user consent disabled, you can find the configuration switch in the [Azure portal] in the **[User settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/)** section under **Enterprise applications**.
106106

107107
The `prompt=consent` parameter can also be used by applications that request permissions that don't require admin consent. An example of when this would be used is if the application requires an experience where the tenant admin “signs up” one time, and no other users are prompted for consent from that point on.
108108

@@ -144,7 +144,7 @@ The following diagram provides an overview of consent for a multi-tier app regis
144144
Users and administrators can revoke consent to your application at any time:
145145

146146
* Users revoke access to individual applications by removing them from their [Access Panel Applications][AAD-Access-Panel] list.
147-
* Administrators revoke access to applications by removing them using the [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps) section of the [Azure portal][AZURE-portal].
147+
* Administrators revoke access to applications by removing them using the [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps) section of the [Azure portal].
148148

149149
If an administrator consents to an application for all users in a tenant, users can't revoke access individually. Only the administrator can revoke access, and only for the whole application.
150150

@@ -179,7 +179,6 @@ To learn more about making API calls to Azure AD and Microsoft 365 services like
179179
[AAD-Integrating-Apps]:quickstart-v1-integrate-apps-with-azure-ad.md
180180
[AAD-Samples-MT]: /samples/browse/?products=azure-active-directory
181181
[AAD-Why-To-Integrate]: ./active-directory-how-to-integrate.md
182-
[AZURE-portal]: https://portal.azure.com
183182
[MSFT-Graph-overview]: /graph/
184183
[MSFT-Graph-permission-scopes]: /graph/permissions-reference
185184

@@ -199,7 +198,7 @@ To learn more about making API calls to Azure AD and Microsoft 365 services like
199198
[AAD-Security-Token-Claims]: ./active-directory-authentication-scenarios/#claims-in-azure-ad-security-tokens
200199
[AAD-Tokens-Claims]:access-tokens.md
201200
[AAD-V2-Dev-Guide]: v2-overview.md
202-
[AZURE-portal]: https://portal.azure.com
201+
[Azure portal]: https://portal.azure.com
203202
[Duyshant-Role-Blog]: http://www.dushyantgill.com/blog/2014/12/10/roles-based-access-control-in-cloud-applications-using-azure-ad/
204203
[JWT]: https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32
205204
[O365-Perm-Ref]: /graph/permissions-reference

articles/active-directory/develop/reference-app-manifest.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -634,7 +634,6 @@ Use the following comments section to provide feedback that helps refine and sha
634634
[AAD-DEVELOPER-GLOSSARY]:developer-glossary.md
635635
[AAD-GROUPS-FOR-AUTHORIZATION]: http://www.dushyantgill.com/blog/2014/12/10/authorization-cloud-applications-using-ad-groups/
636636
[ADD-UPD-RMV-APP]:quickstart-v1-integrate-apps-with-azure-ad.md
637-
[AZURE-PORTAL]: https://portal.azure.com
638637
[DEV-GUIDE-TO-AUTH-WITH-ARM]: http://www.dushyantgill.com/blog/2015/05/23/developers-guide-to-auth-with-azure-resource-manager-api/
639638
[GRAPH-API]: /graph/migrate-azure-ad-graph-planning-checklist
640639
[IMPLICIT-GRANT]:v1-oauth2-implicit-grant-flow.md

0 commit comments

Comments
 (0)