Skip to content

Commit a3db4b2

Browse files
committed
updating links
1 parent 5743c88 commit a3db4b2

File tree

2 files changed

+2
-5
lines changed

2 files changed

+2
-5
lines changed

articles/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,11 +144,11 @@ To verify the Microsoft Entra application configuration and provide consent:
144144
3. Select **All applications** and search the unique app name you provided for the PowerShell script in [Create a Microsoft Entra app registration](#create-an-azure-active-directory-app-registration).
145145
4. In the panel on the left side of the browser, select **Authentication** and make sure the redirect URI is the same as the web app URL for the management tool, as shown in the following image.
146146

147-
:::image type="content" source="media/article-folder-name/image-file-inline.png" alt-text="Screenshot of the Configure Web page on the Authenication tab for an app registration."
147+
:::image type="content" source="../media/management-ui-redirect-uri-inline.png" alt-text="Screenshot of the Configure Web page on the Authenication tab for an app registration."
148148

149149
5. In the left panel, select **API permissions** to confirm that permissions were added. If you're a global admin, select the **Grant admin consent for `tenantname`** button and follow the dialog prompts to provide admin consent for your organization.
150150

151-
:::image type="content" source="media/article-folder-name/image-file-inline.png" alt-text="Screenshot of the API permissions page for an app registration that highlights the option to grant admin consent for Contoso." lightbox="../media/management-ui-permissions-expanded.png"
151+
:::image type="content" source="../media/management-ui-permissions-inline.png" alt-text="Screenshot of the API permissions page for an app registration that highlights the option to grant admin consent for Contoso." lightbox="../media/management-ui-permissions-expanded.png"
152152

153153
You can now start using the management tool.
154154

articles/virtual-desktop/virtual-desktop-fall-2019/tenant-setup-azure-active-directory.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,6 @@ To assign the TenantCreator application role:
8383
5. Search for a user account that will create your Azure Virtual Desktop tenant. For simplicity, this can be the global administrator account.
8484
- If you're using a Microsoft Identity Provider like [email protected] or [email protected], you might not be able to sign in to Azure Virtual Desktop. We recommend using a domain-specific account like [email protected] or [email protected] instead.
8585
86-
> [!div class="mx-imgBorder"]
87-
> ![A screenshot of selecting a user to add as "TenantCreator."](../media/tenant-assign-user.png)
88-
8986
> [!NOTE]
9087
> You must select a user (or a group that contains a user) that's sourced from this Microsoft Entra instance. You can't choose a guest (B2B) user or a service principal.
9188

0 commit comments

Comments
 (0)