Skip to content

Commit 6c0f00f

Browse files
author
ecfan
committed
Fix links
1 parent e3b5b4b commit 6c0f00f

8 files changed

+16
-16
lines changed

articles/logic-apps/create-custom-built-in-connector-standard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,11 +113,11 @@ The following sections describe the methods that the example connector implement
113113
>
114114
> When you have sensitive information, such as connection strings that include usernames and passwords,
115115
> make sure to use the most secure authentication flow available. For example, Microsoft recommends that
116-
> you authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
116+
> you authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
117117
> when support is available, and assign a role that has the least required privilege.
118118
>
119119
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
120-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
120+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
121121
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
122122
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
123123
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/create-parameters-workflows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ In single-tenant Standard logic app workflows, you can work with environment var
4545
> When you have sensitive information, such as connection strings that include usernames and passwords,
4646
> make sure to use the most secure authentication flow available. For example, in Standard logic app workflows,
4747
> secure data types, such as `securestring` and `secureobject`, aren't supported. Microsoft recommends that you
48-
> authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
48+
> authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
4949
> when possible, and assign a role that has the least privilege necessary.
5050
>
5151
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
52-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
52+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
5353
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
5454
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
5555
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/custom-connector-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,11 +118,11 @@ The following sections provide more information about the methods that your conn
118118
>
119119
> When you have sensitive information, such as connection strings that include usernames and passwords,
120120
> make sure to use the most secure authentication flow available. For example, Microsoft recommends that
121-
> you authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
121+
> you authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
122122
> when support is available, and assign a role that has the least required privilege.
123123
>
124124
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
125-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
125+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
126126
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
127127
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
128128
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/devops-deployment-single-tenant-azure-logic-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,11 +101,11 @@ When you use a built-in operation for a service such as Azure Service Bus or Azu
101101
>
102102
> When you have sensitive information, such as connection strings that include usernames and passwords,
103103
> make sure to use the most secure authentication flow available. For example, Microsoft recommends that
104-
> you authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
104+
> you authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
105105
> when support is available, and assign a role that has the least required privilege.
106106
>
107107
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
108-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
108+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
109109
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
110110
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
111111
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/logic-apps-diagnosing-failures.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,11 +176,11 @@ The following list includes possible causes for these errors and steps to help t
176176
> When you have sensitive information, such as connection strings that include usernames and passwords,
177177
> make sure to use the most secure authentication flow available. For example, in Standard logic app workflows,
178178
> secure data types, such as `securestring` and `secureobject`, aren't supported. Microsoft recommends that you
179-
> authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
179+
> authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
180180
> when possible, and assign a role that has the least privilege necessary.
181181
>
182182
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
183-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
183+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
184184
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
185185
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
186186
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -271,11 +271,11 @@ The following recommendations apply to scaling Standard logic app workflows:
271271
> When you have sensitive information, such as connection strings that include usernames and passwords,
272272
> make sure to use the most secure authentication flow available. For example, in Standard logic app workflows,
273273
> secure data types, such as `securestring` and `secureobject`, aren't supported. Microsoft recommends that you
274-
> authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
274+
> authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
275275
> when possible, and assign a role that has the least privilege necessary.
276276
>
277277
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
278-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
278+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
279279
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
280280
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
281281
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/manage-logic-apps-with-azure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -373,11 +373,11 @@ Before you try to recover your deleted logic app, review the following considera
373373
> When you have sensitive information, such as connection strings that include usernames and passwords,
374374
> make sure to use the most secure authentication flow available. For example, in Standard logic app workflows,
375375
> secure data types, such as `securestring` and `secureobject`, aren't supported. Microsoft recommends that you
376-
> authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
376+
> authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
377377
> when possible, and assign a role that has the least privilege necessary.
378378
>
379379
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
380-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
380+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
381381
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
382382
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
383383
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

articles/logic-apps/set-up-sql-db-storage-single-tenant-standard-workflows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,11 +112,11 @@ The following table describes some reasons why you might want to use SQL:
112112
>
113113
> When you have sensitive information, such as connection strings that include usernames and passwords,
114114
> make sure to use the most secure authentication flow available. Microsoft recommends that you
115-
> authenticate access to Azure resources with a [managed identity](entra/identity/managed-identities-azure-resources/overview)
115+
> authenticate access to Azure resources with a [managed identity](/entra/identity/managed-identities-azure-resources/overview)
116116
> when possible, and assign a role that has the least privilege necessary.
117117
>
118118
> If this capability is unavailable, make sure to secure connection strings through other measures, such as
119-
> [Azure Key Vault](../key-vault/general/overview), which you can use with [app settings](edit-app-settings-host-settings.md).
119+
> [Azure Key Vault](../key-vault/general/overview.md), which you can use with [app settings](edit-app-settings-host-settings.md).
120120
> You can then [directly reference secure strings](../app-service/app-service-key-vault-references.md), such as connection
121121
> strings and keys. Similar to ARM templates, where you can define environment variables at deployment time, you can define
122122
> app settings within your [logic app workflow definition](/azure/templates/microsoft.logic/workflows).

0 commit comments

Comments
 (0)