Skip to content

Commit 61b803b

Browse files
Merge pull request #269960 from JasonWHowell/fixincludes
FIx build errors
2 parents 0c41b42 + 1f970bd commit 61b803b

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

articles/azure-monitor/alerts/action-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -468,7 +468,7 @@ For an overview of Microsoft Entra applications and service principals, see [Mic
468468
> Basic authentication isn't supported for `SecureWebhook`. To use basic authentication, you must use `Webhook`.
469469
If you use the webhook action, your target webhook endpoint must be able to process the various JSON payloads that different alert sources emit. If the webhook endpoint expects a specific schema, for example, the Microsoft Teams schema, use the Logic Apps action to transform the alert schema to meet the target webhook's expectations.
470470

471-
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
471+
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
472472

473473
1. Create a Microsoft Entra application for your protected web API. For more information, see [Protected web API: App registration](../../active-directory/develop/scenario-protected-web-api-app-registration.md). Configure your protected API to be called by a daemon app and expose application permissions, not delegated permissions. For more information about these permissions, see [If your web API is called by a service or daemon app](../../active-directory/develop/scenario-protected-web-api-app-registration.md#if-your-web-api-is-called-by-a-service-or-daemon-app).
474474

articles/data-factory/enable-aad-authentication-azure-ssis-ir.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use an existing Microsoft Entra group or create a new one using Azure AD
5555
-MailNickName "NotSet"
5656
```
5757

58-
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
58+
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
5959

6060
The result looks like the following example, which also displays the variable value:
6161

articles/industry/agriculture/ingest-historical-telemetry-data-in-azure-farmbeats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Follow these steps:
6868
Connect-AzureAD
6969
```
7070
71-
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
71+
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
7272
7373
7. Run the following command. This downloads a script to your home directory.
7474

articles/virtual-desktop/virtual-desktop-fall-2019/deploy-diagnostics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ This section will show you how to use PowerShell to create the Microsoft Entra a
6262
4. Go to the [RDS-Templates GitHub repo](https://github.com/Azure/RDS-Templates/tree/master/wvd-templates/diagnostics-sample/deploy/scripts) and run the **CreateADAppRegistrationforDiagnostics.ps1** script in PowerShell.
6363
5. When the script asks you to name your app, enter a unique app name.
6464

65-
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
65+
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6666

6767
After the script successfully runs, it should show the following things in its output:
6868

articles/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Get started by signing in to both the Az and Azure AD PowerShell modules. Here's
5555
Connect-AzureAD
5656
```
5757
58-
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
58+
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
5959
6060
4. After that, navigate to the folder where you saved the two PowerShell scripts from the RDS-Templates GitHub repo.
6161

0 commit comments

Comments
 (0)