Skip to content

Commit 5d28eaf

Browse files
authored
Apply suggestions from PR review
1 parent 793e5cd commit 5d28eaf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/security/fundamentals/steps-secure-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ For more information, see the article [Blocking legacy authentication protocols
104104

105105
Using the verify explicitly principle, you should reduce the impact of compromised user credentials when they happen. For each app in your environment, consider the valid use cases: which groups, which networks, which devices and other elements are authorized – then block the rest. With Azure AD Conditional Access, you can control how authorized users access their apps and resources based on specific conditions you define.
106106

107-
For more information on how to use Conditional Access for your Cloud Apps and user actions see [Conditional Access Cloud apps, actions and authentication context](../../active-directory/conditional-access/concept-conditional-access-cloud-apps.md).
107+
For more information on how to use Conditional Access for your Cloud Apps and user actions, see [Conditional Access Cloud apps, actions, and authentication context](../../active-directory/conditional-access/concept-conditional-access-cloud-apps.md).
108108

109109
### Review and govern admin roles
110110

0 commit comments

Comments
 (0)