Skip to content

Commit 6ece047

Browse files
author
Ken Withee
committed
Fixes link.
1 parent 0e4a273 commit 6ece047

9 files changed

+11
-11
lines changed

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
2828

2929
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3030

31-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
31+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
3232
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
3333
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
3434
1. Select **Download connector service**.

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ To use Application Proxy, install a connector on each Windows server you're usin
153153
154154
To install the connector:
155155
156-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
156+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
157157
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
158158
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
159159
1. Select **Download connector service**.
@@ -186,7 +186,7 @@ You can use the Microsoft Entra admin center or your Windows server to confirm t
186186
187187
To confirm the connector installed and registered correctly:
188188
189-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
189+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
190190
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
191191
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
192192
1. View a connector to verify its details. The connectors should be expanded by default. If the connector you want to view isn't expanded, expand the connector to view the details. An active green label indicates that your connector can connect to the service. However, even though the label is green, a network issue could still block the connector from receiving messages.
@@ -211,7 +211,7 @@ To confirm the connector installed and registered correctly:
211211
## Add an on-premises app to Azure AD
212212
213213
Now that you've prepared your environment and installed a connector, you're ready to add on-premises applications to Azure AD.
214-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
214+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
215215
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
216216
1. Select **New application**.
217217
1. Select **Add an on-premises application** button, which appears about halfway down the page in the **On-premises applications** section. Alternatively, you can select **Create your own application** at the top of the page and then select **Configure Application Proxy for secure remote access to an on-premises application**.

articles/active-directory/app-proxy/application-proxy-config-sso-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Single sign-on (SSO) allows your users to access an application without authenti
2020
## How to configure single-sign on
2121
To configure SSO, first make sure that your application is configured for Pre-Authentication through Azure Active Directory.
2222

23-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
23+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
2424
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
2525
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
2626

articles/active-directory/app-proxy/application-proxy-configure-cookie-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Additionally, if your back-end application has cookies that need to be available
4646

4747
To set the cookie settings using the Microsoft Entra admin center:
4848

49-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
49+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
5050
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
5151
5. Under **Additional Settings**, set the cookie setting to **Yes** or **No**.
5252
6. Click **Save** to apply your changes.

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Publish your proxy application as you would any other application and assign use
3535
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3636

3737
You now need to register your application in Azure AD, as follows:
38-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
3939
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
4040
1. Browse to **Identity** > **Applications** > **App registrations**. The list of all app registrations appears.
4141
1. Select **New registration**. The **Register an application** page appears.

articles/active-directory/app-proxy/application-proxy-configure-single-sign-on-password-vaulting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You should already have published and tested your app with Application Proxy. If
2525

2626
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
2727

28-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
28+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
2929
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
3030
1. From the list, select the app that you want to set up with SSO.
3131
1. Select **Application Proxy**.

articles/active-directory/app-proxy/application-proxy-network-topology.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In order to optimize the traffic flow and reduce latency to a connector group as
4040
> [!IMPORTANT]
4141
> Connectors must be using at least version 1.5.1975.0 to use this capability.
4242
43-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
4444
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
4545
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
4646
1. Select **New Connector Group**, provide a **Name** for the connector group.

articles/active-directory/app-proxy/application-proxy-ping-access-publishing-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ To collect this information:
159159

160160
**Update the `acceptMappedClaims` field:**
161161

162-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
162+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
163163
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
164164
1. Browse to **Identity** > **Applications** > **App registrations** and select your application.
165165
1. From the sidebar of the **App registrations** page for your application, select **Manifest**. The manifest JSON code for your application's registration appears.

articles/active-directory/app-proxy/application-proxy-sign-in-bad-gateway-timeout-error.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ As a first quick step, double check and fix the internal URL by opening the appl
5959
## Check the application is assigned to a working Connector Group
6060

6161
To verify the application is assigned to a working Connector Group:
62-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference).md#application-administrator).
62+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
6363
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
6464
1. Look at the Connector Group field. If there are no active connectors in the group, you see a warning. If you don't see any warnings, move on to verify all [required ports](application-proxy-add-on-premises-application.md) are allowed.
6565
1. If the wrong Connector Group is showing, use the drop-down to select the correct group, and confirm you no longer see any warnings. If the intended Connector Group is showing, click the warning message to open the page with Connector management.

0 commit comments

Comments
 (0)