Skip to content

Commit 766f2b9

Browse files
authored
Merge pull request #115908 from psignoret/phsignor-image-border-fix
Fix image borders
2 parents 40f3a38 + 11dc672 commit 766f2b9

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ To configure user consent settings through the Azure portal:
4444
1. Under **User consent for applications**, select which consent setting you'd like to configure for all users.
4545
1. Select **Save** to save your settings.
4646

47-
![User consent settings](./media/configure-user-consent/setting-for-all-users.png)
47+
:::image type="content" source="media/configure-user-consent/setting-for-all-users.png" alt-text="User consent settings":::
4848

4949
> [!TIP]
5050
> Consider [enabling the admin consent workflow](configure-admin-consent-workflow.md) to allow users to request an administrator's review and approval of an application that the user is not allowed to consent to--for example, when user consent has been disabled or when an application is requesting permissions that the user is not allowed to grant.
@@ -97,7 +97,7 @@ Permission classifications allow you to identify the impact that different permi
9797

9898
In this example, we've classified the minimum set of permission required for single sign-on:
9999

100-
![Permission classifications](./media/configure-user-consent/permission-classifications.png)
100+
:::image type="content" source="media/configure-user-consent/permission-classifications.png" alt-text="Permission classifications":::
101101

102102
> [!TIP]
103103
> For the Microsoft Graph API, the minimum permissions needed to do basic single sign on are `openid`, `profile`, `User.Read` and `offline_access`. With these permissions an app can read the profile details of the signed-in user and can maintain this access even when the user is no longer using the app.
@@ -187,7 +187,7 @@ You can configure which users are allowed to consent to apps accessing their gro
187187

188188
In this example, all group owners are allowed to consent to apps accessing their groups' data:
189189

190-
![Permission classifications](./media/configure-user-consent/group-owner-consent.png)
190+
:::image type="content" source="media/configure-user-consent/group-owner-consent.png" alt-text="Group owner consent settings":::
191191

192192
### Configure group owner consent using PowerShell
193193

0 commit comments

Comments
 (0)