Skip to content

Commit 943f26e

Browse files
authored
Merge pull request #79609 from KingdomOfEnds/dt-accessibility
replaced click
2 parents b9da3e1 + 5198cff commit 943f26e

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/digital-twins/how-to-configure-monitoring.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,11 +63,11 @@ Examples of diagnostic logging include:
6363
To enable diagnostic logs for an instance:
6464

6565
1. Bring up the resource in Azure portal.
66-
1. Click **Diagnostic settings**:
66+
1. Select **Diagnostic settings**:
6767

6868
[![Diagnostic settings one](media/how-to-configure-monitoring/diagnostic-settings-one.png)](media/how-to-configure-monitoring/diagnostic-settings-one.png#lightbox)
6969

70-
1. Click **Turn on diagnostics** to collect data (if not previously enabled).
70+
1. Select **Turn on diagnostics** to collect data (if not previously enabled).
7171
1. Fill in the requested fields and select how and where data will be saved:
7272

7373
[![Diagnostic settings two](media/how-to-configure-monitoring/diagnostic-settings-two.png)](media/how-to-configure-monitoring/diagnostic-settings-two.png#lightbox)
@@ -96,7 +96,7 @@ Full log querying is provided through [Azure Monitor logs](../azure-monitor/log-
9696

9797
[![Log analytics](media/how-to-configure-monitoring/log-analytics.png)](media/how-to-configure-monitoring/log-analytics.png#lightbox)
9898

99-
1. If you don't already have a **Log Analytics workspace** instance, you can create a workspace by clicking the **Add** button:
99+
1. If you don't already have a **Log Analytics workspace** instance, you can create a workspace by selecting the **Add** button:
100100

101101
[![Create OMS](media/how-to-configure-monitoring/log-analytics-oms.png)](media/how-to-configure-monitoring/log-analytics-oms.png#lightbox)
102102

@@ -109,7 +109,7 @@ For more information about powerful query operations, see [getting started with
109109
> [!NOTE]
110110
> You may experience a 5 minute delay when sending events to **Log Analytics workspace** for the first time.
111111
112-
Azure Monitor logs also provide powerful error and alert notification services, which can be viewed by clicking **Diagnose and solve problems**:
112+
Azure Monitor logs also provide powerful error and alert notification services, which can be viewed by selecting **Diagnose and solve problems**:
113113

114114
[![Alert and error notifications](media/how-to-configure-monitoring/log-analytics-notifications.png)](media/how-to-configure-monitoring/log-analytics-notifications.png#lightbox)
115115

articles/digital-twins/how-to-configure-postman.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Configure your Azure Active Directory app to use the OAuth 2.0 implicit grant fl
3636

3737
[![Azure Active Directory app registrations add api](../../includes/media/digital-twins-permissions/aad-app-req-permissions.png)](../../includes/media/digital-twins-permissions/aad-app-req-permissions.png#lightbox)
3838

39-
1. Click **Manifest** to open the application manifest for your app. Set *oauth2AllowImplicitFlow* to `true`.
39+
1. Select **Manifest** to open the application manifest for your app. Set *oauth2AllowImplicitFlow* to `true`.
4040

4141
[![Azure Active Directory implicit flow](media/how-to-configure-postman/implicit-flow.png)](media/how-to-configure-postman/implicit-flow.png#lightbox)
4242

@@ -106,7 +106,7 @@ After completing the previous steps, configure Postman to make an authenticated
106106
> * You do not need to specify those headers for each part.
107107
> * You must select `multipart/mixed` or another appropriate **Content-Type** for the entire request.
108108
109-
1. Lastly, click **Send** to submit your multipart HTTP POST request.
109+
1. Lastly, select **Send** to submit your multipart HTTP POST request.
110110
111111
## Next steps
112112

articles/digital-twins/how-to-use-swagger.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,17 +107,17 @@ To learn more about interactively testing requests protected by OAuth 2.0, see t
107107
108108
![Azure AD app registrations add api](../../includes/media/digital-twins-permissions/aad-app-req-permissions.png)
109109
110-
4. Configure the application manifest to allow OAuth 2.0 implicit flow. Click **Manifest** to open the application manifest for your app. Set *oauth2AllowImplicitFlow* to `true`.
110+
4. Configure the application manifest to allow OAuth 2.0 implicit flow. Select **Manifest** to open the application manifest for your app. Set *oauth2AllowImplicitFlow* to `true`.
111111
112112
![Azure AD implicit flow](../../includes/media/digital-twins-permissions/aad-app-allow-implicit-flow.png)
113113
114114
5. Copy the ID of your Azure AD app.
115115
116116
After completing the Azure Active Directory registration:
117117
118-
6. Click the **Authorize** button on your swagger page.
118+
6. Select the **Authorize** button on your swagger page.
119119
120-
[![Click the Swagger authorize button](media/how-to-use-swagger/swagger-select-authorize-btn.png)](media/how-to-use-swagger/swagger-select-authorize-btn.png#lightbox)
120+
[![Select the Swagger authorize button](media/how-to-use-swagger/swagger-select-authorize-btn.png)](media/how-to-use-swagger/swagger-select-authorize-btn.png#lightbox)
121121
122122
7. Paste the application ID into the **client_id** field.
123123

0 commit comments

Comments
 (0)