Skip to content

Commit 57c2a2a

Browse files
author
Paweena Tongbai (Lionbridge Technologies Inc)
committed
fix broken links
1 parent 194fbcd commit 57c2a2a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

includes/active-directory-msi-cross-tenant-cmk-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ Operations in Phase 1 would be a one-time setup for most service provider applic
4646

4747
| Step | Description | Minimum role in Azure RBAC | Minimum role in Azure AD RBAC |
4848
| -- | ----------------------------------- | -------------- | --------------|
49-
| 1. | Create a new multi-tenant Azure AD application registration or start with an existing application registration. Note the application ID (client ID) of the application registration using [Azure portal](/azure/active-directory/develop/quickstart-register-app), [Microsoft Graph API](/graph/api/application-post-applications), [Azure PowerShell](/powershell/module/azuread/new-azureadapplication), or [Azure CLI](/cli/azure/ad/app#az_ad_app_create)| None | [Application Developer](/azure/active-directory/roles/permissions-reference.md#application-developer) |
50-
| 2. | Create a user-assigned managed identity (to be used as a Federated Identity Credential). <br> [Azure portal](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp&preserve-view=true) / [Azure CLI](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli&preserve-view=true) / [Azure PowerShell](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell&preserve-view=true)/ [Azure Resource Manager Templates](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm&preserve-view=true) | [Manage identity contributor](/azure/role-based-access-control/built-in-roles.md#managed-identity-contributor&preserve-view=true) | None |
49+
| 1. | Create a new multi-tenant Azure AD application registration or start with an existing application registration. Note the application ID (client ID) of the application registration using [Azure portal](/azure/active-directory/develop/quickstart-register-app), [Microsoft Graph API](/graph/api/application-post-applications), [Azure PowerShell](/powershell/module/azuread/new-azureadapplication), or [Azure CLI](/cli/azure/ad/app#az_ad_app_create)| None | [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer) |
50+
| 2. | Create a user-assigned managed identity (to be used as a Federated Identity Credential). <br> [Azure portal](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp&preserve-view=true) / [Azure CLI](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli&preserve-view=true) / [Azure PowerShell](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell&preserve-view=true)/ [Azure Resource Manager Templates](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm&preserve-view=true) | [Manage identity contributor](/azure/role-based-access-control/built-in-role#managed-identity-contributor&preserve-view=true) | None |
5151
| 3. | Configure user-assigned managed identity as a *federated identity credential* on the application, so that it can impersonate the identity of the application. <br> [Graph API reference](https://aka.ms/fedcredentialapi)/ [Azure portal](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp)/ [Azure CLI](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azcli)/ [Azure PowerShell](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-powershell) | None | Owner of the application |
5252
| 4. | Share the application name and application ID with the customer, so that they can install and authorize the application. | None | None|
5353

0 commit comments

Comments
 (0)