Skip to content

Commit 6400218

Browse files
[Microsoft Entra] Global Secure Access branding updates
1 parent 48ba44c commit 6400218

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/global-secure-access/how-to-source-ip-restoration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Source IP restoration in Global Secure Access (preview) allows backward compatib
3636

3737
To enable the required setting to allow source IP restoration, an administrator must take the following steps.
3838

39-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](../roles/permissions-reference.md#global-secure-access-administrator).
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
4040
1. Browse to **Global Secure Access** > **Global settings** > **Session management** > **Adaptive Access**.
4141
1. Select the toggle to **Enable Global Secure Access signaling in Conditional Access**.
4242

articles/global-secure-access/how-to-universal-tenant-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ For more information to configure these policies, see the article [Set up tenant
7272

7373
Once you have created the tenant restriction v2 policies, you can utilize Global Secure Access to apply tagging for tenant restrictions v2. An administrator with both the [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference) and [Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator) roles must take the following steps to enable enforcement with Global Secure Access.
7474

75-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](../roles/permissions-reference.md#global-secure-access-administrator).
75+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
7676
1. Browse to **Global Secure Access** > **Global Settings** > **Session Management** > **Tenant Restrictions**.
7777
1. Select the toggle to **Enable tagging to enforce tenant restrictions on your network**.
7878
1. Select **Save**.

0 commit comments

Comments
 (0)