You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this article, you learn how to manage authentication and authorization for Microsoft Playwright Testing preview to run Playwright tests on cloud-hosted browsers and to publish test results and artifacts to the service.
12
12
13
-
By default, [Microsoft Entra ID](https://learn.microsoft.com/entra/identity/) is used for authentication. This method is more secure and is the recommended authentication method. You cannot disable authentication using Microsoft Entra ID. However, you can also use access tokens to authenticate and authorize.
13
+
By default, [Microsoft Entra ID](/entra/identity/) is used for authentication. This method is more secure and is the recommended authentication method. You cannot disable authentication using Microsoft Entra ID. However, you can also use access tokens to authenticate and authorize.
Copy file name to clipboardExpand all lines: articles/playwright-testing/quickstart-automate-end-to-end-testing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ After you complete this quickstart, you have a CI workflow that runs your Playwr
30
30
# [Azure Pipelines](#tab/pipelines)
31
31
- An Azure DevOps organization and project. If you don't have an Azure DevOps organization, you can [create one for free](/azure/devops/organizations/projects/create-project).
32
32
- A pipeline definition. If you need help with getting started with Azure Pipelines, see [create your first pipeline](/azure/devops/pipelines/create-first-pipeline).
33
-
- Azure Resource Manager Service connection to securely authenticate to the service from Azure Dev Ops pipelines, see [Azure Resource Manager service connection](https://learn.microsoft.com/azure/devops/pipelines/library/connect-to-azure)
33
+
- Azure Resource Manager Service connection to securely authenticate to the service from Azure Dev Ops pipelines, see [Azure Resource Manager service connection](/azure/devops/pipelines/library/connect-to-azure)
Copy file name to clipboardExpand all lines: articles/playwright-testing/quickstart-run-end-to-end-tests.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ After you complete this quickstart, you have a Microsoft Playwright Testing work
20
20
* An Azure account with an active subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
21
21
* Your Azure account needs the [Owner](/azure/role-based-access-control/built-in-roles#owner), [Contributor](/azure/role-based-access-control/built-in-roles#contributor), or one of the [classic administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles#classic-subscription-administrator-roles).
22
22
* A Playwright project. If you don't have project, create one by using the [Playwright getting started documentation](https://playwright.dev/docs/intro) or use our [Microsoft Playwright Testing sample project](https://github.com/microsoft/playwright-testing-service/tree/main/samples/get-started).
23
-
* Azure CLI. If you don't have Azure CLI, see [Install Azure CLI](https://learn.microsoft.com/cli/azure/install-azure-cli).
23
+
* Azure CLI. If you don't have Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
24
24
25
25
## Create a workspace
26
26
@@ -83,12 +83,12 @@ Microsoft Entra ID uses your Azure credentials, requiring a sign-in to your Azur
83
83
84
84
##### Set up authtication using Microsoft Entra ID
85
85
86
-
Microsoft Entra ID is the default and recommended authentication for the service. From your local dev machine, you can use [Azure CLI](https://learn.microsoft.com/cli/azure/install-azure-cli) to sign-in
86
+
Microsoft Entra ID is the default and recommended authentication for the service. From your local dev machine, you can use [Azure CLI](/cli/azure/install-azure-cli) to sign-in
87
87
88
88
```CLI
89
89
az login
90
90
```
91
-
**NOTE**: If you are a part of multiple Microsoft Entra tenants, make sure you sign-in to the tenant where your workspace belongs. You can get the tenant id from Azure portal, see [Find your Microsoft Entra Tenant](https://learn.microsoft.com/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant). Once you get the ID, sign-in using the command`az login --tenant <TenantID>`
91
+
**NOTE**: If you are a part of multiple Microsoft Entra tenants, make sure you sign-in to the tenant where your workspace belongs. You can get the tenant id from Azure portal, see [Find your Microsoft Entra Tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant). Once you get the ID, sign-in using the command`az login --tenant <TenantID>`
0 commit comments