Skip to content

Commit 9710ba7

Browse files
committed
end italics
1 parent 129dca0 commit 9710ba7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/users-groups-roles/directory-admin-roles-secure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Ensure that you aren't in a situation where a user is accidentally locked out of
122122

123123
Emergency access accounts help organizations restrict privileged access within an existing Azure Active Directory environment. These accounts are highly privileged and are not assigned to specific individuals. Emergency access accounts are limited to emergency for 'break glass' scenarios where normal administrative accounts cannot be used. Organizations must ensure the aim of controlling and reducing the emergency account's usage to only that time for which it is necessary.
124124

125-
Evaluate the accounts that are assigned or eligible for the global admin role. If you did not see any cloud-only accounts using the *.onmicrosoft.com domain (intended for "break glass" emergency access), create them. For more information, see [Managing emergency access administrative accounts in Azure AD](directory-emergency-access.md).
125+
Evaluate the accounts that are assigned or eligible for the global admin role. If you did not see any cloud-only accounts using the \*.onmicrosoft.com domain (intended for "break glass" emergency access), create them. For more information, see [Managing emergency access administrative accounts in Azure AD](directory-emergency-access.md).
126126

127127
#### Turn on multi-factor authentication and register all other highly privileged single-user non-federated admin accounts
128128

0 commit comments

Comments
 (0)