Skip to content

Commit 7030899

Browse files
Merge pull request #250998 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230912-031929-6910665-ignore-build
[BULK] - DocuTune: Fix stale and broken links (part 7)
2 parents b2e9840 + 1945e44 commit 7030899

File tree

8 files changed

+14
-14
lines changed

8 files changed

+14
-14
lines changed

articles/active-directory-b2c/partner-grit-iam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Check the authentication [scenarios](#scenario-description) in your applications
109109

110110
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
111111

112-
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](custom-policy-get-started.md?tabs=applications)
112+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
113113

114114
- [SAAS Platform - Organization Application Onboarding Portal](https://app.archbee.com/doc/G_YZFq_VwvgMlmX-_efmX/8m90WVb2M6Yi0gCe7yor2)
115115

articles/active-directory-b2c/partner-hypr.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Tutorial for configuring HYPR with Azure Active Directory B2C
1818

19-
In this tutorial, learn to configure Azure Active Directory B2C (Azure AD B2C) with [HYPR](https://get.hypr.com). When Azure AD B2C is the identity provider (IdP), you can integrate HYPR with customer applications for passwordless authentication. HYPR replaces passwords with public key encryptions that help prevent fraud, phishing, and credential reuse.
19+
In this tutorial, learn to configure Azure Active Directory B2C (Azure AD B2C) with [HYPR](https://www.hypr.com/). When Azure AD B2C is the identity provider (IdP), you can integrate HYPR with customer applications for passwordless authentication. HYPR replaces passwords with public key encryptions that help prevent fraud, phishing, and credential reuse.
2020

2121
## Prerequisites
2222

@@ -26,9 +26,9 @@ To get started, you'll need:
2626
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
2727
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
2828
- A HYPR cloud tenant
29-
- Request a HYPR [custom demo](https://get.hypr.com/free-trial)
29+
- Request a HYPR [custom demo](https://get.hypr.com/get-a-demo)
3030
- A user mobile device registered using the HYPR REST APIs, or the HYPR Device Manager in your HYPR tenant
31-
- For example, see [HYPR SDK for Java Web](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk)
31+
- For example, see [HYPR SDK for Java Web](https://docs.hypr.com/integratinghypr/docs/sdk-java-web)
3232

3333
## Scenario description
3434

articles/active-directory-b2c/partner-idology.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The following architecture diagram shows the implementation.
6363

6464
### Part 1 - Deploy the API
6565

66-
Deploy the provided [API code](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/IDology/Api) to an Azure service. The code can be published from Visual Studio, following these [instructions](/visualstudio/deployment/quickstart-deploy-to-azure).
66+
Deploy the provided [API code](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/IDology/Api) to an Azure service. The code can be published from Visual Studio, following these [instructions](/visualstudio/deployment/quickstart-deploy-aspnet-web-app).
6767

6868
You'll need the URL of the deployed service to configure Azure AD with the required settings.
6969

articles/active-directory-b2c/partner-itsme.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Please clarify step 1 in the description below - we don't have steps in this tut
5959

6060
1. After activation of your itsme partner account, you'll receive an email with a one-time link to the **client secret**.
6161

62-
1. Follow the instructions at [itsme](https://business.itsme.be/en) to complete the configuration.
62+
1. Follow the instructions at [itsme](https://www.itsme-id.com/en-BE/business) to complete the configuration.
6363

6464
## Integrate with Azure AD B2C
6565

articles/active-directory-b2c/partner-keyless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To get started, you'll need:
3131
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
3232
* An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to the Azure subscription
3333
* A Keyless cloud tenant
34-
* Go to keyless.io to [Request a demo](https://keyless.io/go)
34+
* Go to keyless.io to [Request a demo](https://keyless.io/demo-request)
3535
* The Keyless Authenticator app installed on a user device
3636

3737
## Scenario description

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Tutorial: Configure Ping Identity with Azure Active Directory B2C for secure hybrid access
1818

19-
In this tutorial, learn how to extend the capabilities of Azure Active Directory B2C (Azure AD B2C) with [PingAccess](https://www.pingidentity.com/en/software/pingaccess.html) and [PingFederate](https://www.pingidentity.com/en/software/pingfederate.html). PingAccess provides access to applications and APIs, and a policy engine for authorized user access. PingFederate is an enterprise federation server for user authentication and single sign-on, an authority that permits customers, employees, and partners to access applications from devices. Use them together to enable secure hybrid access (SHA).
19+
In this tutorial, learn how to extend the capabilities of Azure Active Directory B2C (Azure AD B2C) with [PingAccess](https://www.pingidentity.com/en/platform/capabilities/web-api-access/pingaccess.html) and [PingFederate](https://www.pingidentity.com/en/platform/capabilities/authentication-authority/pingfederate.html). PingAccess provides access to applications and APIs, and a policy engine for authorized user access. PingFederate is an enterprise federation server for user authentication and single sign-on, an authority that permits customers, employees, and partners to access applications from devices. Use them together to enable secure hybrid access (SHA).
2020

2121
Many e-commerce sites and web applications exposed to the internet are deployed behind proxy systems, or a reverse-proxy system. These proxy systems pre-authenticate, enforce policy, and route traffic. Typical scenarios include protecting web applications from inbound web traffic and providing a uniform session management across distributed server deployments.
2222

@@ -33,7 +33,7 @@ If you want to modernize an identity platform in such configurations, there migh
3333
- Drive the end-user experience consistency
3434
- Provide a single sign-in experience across applications
3535

36-
In answer to these concerns, the approach in this tutorial is an Azure AD B2C, [PingAccess](https://www.pingidentity.com/en/software/pingaccess.html), and [PingFederate](https://www.pingidentity.com/en/software/pingfederate.html) integration.
36+
In answer to these concerns, the approach in this tutorial is an Azure AD B2C, [PingAccess](https://www.pingidentity.com/en/platform/capabilities/web-api-access/pingaccess.html), and [PingFederate](https://www.pingidentity.com/en/platform/capabilities/authentication-authority/pingfederate.html) integration.
3737

3838
## Shared environment
3939

articles/active-directory-b2c/partner-saviynt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Learn more: [Application and service principal objects in Azure AD](../active-di
118118

119119
1. Install the latest version of Microsoft Graph PowerShell Module on a Windows workstation or server.
120120

121-
For more information, see [Microsoft Graph PowerShell documentation](/powershell/microsoftgraph).
121+
For more information, see [Microsoft Graph PowerShell documentation](/powershell/microsoftgraph/).
122122

123123
2. Connect to the PowerShell module and execute the following commands:
124124

articles/active-directory-b2c/partner-strata.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Tutorial to configure Azure Active Directory B2C with Strata
1818

19-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with Strata [Maverics Identity Orchestrator](https://www.strata.io/maverics-identity-orchestrator/), which helps protect on-premises applications. It connects to identity systems, migrates users and credentials, synchronizes policies and configurations, and abstracts authentication and session management. Use Strata to transition from legacy, to Azure AD B2C, without rewriting applications.
19+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with Strata [Maverics Identity Orchestrator](https://www.strata.io/), which helps protect on-premises applications. It connects to identity systems, migrates users and credentials, synchronizes policies and configurations, and abstracts authentication and session management. Use Strata to transition from legacy, to Azure AD B2C, without rewriting applications.
2020

2121
The solution has the following benefits:
2222

@@ -34,7 +34,7 @@ To get started, you'll need:
3434
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
3535
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
3636
- An instance of [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) to store secrets used by Maverics Identity Orchestrator. Connect to Azure AD B2C or other attribute providers such as a Lightweight Directory Access Protocol (LDAP) directory or database.
37-
- An instance of [Maverics Identity Orchestrator](https://www.strata.io/maverics-identity-orchestrator/) running in an Azure virtual machine (VM), or an on-premises server. To get software and documentation, go to strata.io [Contact Strata Identity](https://www.strata.io/contact/).
37+
- An instance of [Maverics Identity Orchestrator](https://www.strata.io/) running in an Azure virtual machine (VM), or an on-premises server. To get software and documentation, go to strata.io [Contact Strata Identity](https://www.strata.io/company/contact/).
3838
- An on-premises application to transition to Azure AD B2C
3939

4040
## Scenario description
@@ -62,7 +62,7 @@ The following architecture diagram shows the implementation.
6262

6363
## Maverics Identity Orchestrator
6464

65-
To get software and documentation, go to strata.io [Contact Strata Identity](https://www.strata.io/contact/). Determine Orchestrator prerequisites. Install and configure.
65+
To get software and documentation, go to strata.io [Contact Strata Identity](https://www.strata.io/company/contact/). Determine Orchestrator prerequisites. Install and configure.
6666

6767
## Configure your Azure AD B2C tenant
6868

@@ -104,7 +104,7 @@ You can run your Orchestrator instance on any server, whether on-premises or in
104104
### Install Maverics Identity Orchestrator
105105

106106
1. Obtain the latest Maverics RPM package.
107-
2. Place the package on the system you'd like to install Maverics. If you're copying to a remote host, use SSH [scp](https://www.ssh.com/ssh/scp/).
107+
2. Place the package on the system you'd like to install Maverics. If you're copying to a remote host, use SSH [scp](https://www.ssh.com/academy/ssh/scp).
108108
3. Run the following command. Use your filename to replace `maverics.rpm`.
109109

110110
`sudo rpm -Uvf maverics.rpm`

0 commit comments

Comments
 (0)