Skip to content

Commit a3e1f0b

Browse files
authored
Merge pull request #250972 from rwestMSFT/rw-0911-fix-markdown-links
[SCOPED] Fix malformed Markdown links
2 parents 93f0fbf + 3294f4b commit a3e1f0b

File tree

41 files changed

+149
-162
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+149
-162
lines changed

articles/active-directory/architecture/auth-sync-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table presents authentication Azure AD integration with legacy aut
4242
| [LDAP authentication](auth-ldap.md)| ![check mark](./media/authentication-patterns/check.png)| | | |
4343
| [OAuth 2.0 authentication](auth-oauth2.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4444
| [OIDC authentication](auth-oidc.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45-
| [Password based SSO authentication](auth-password-based-sso.md )| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45+
| [Password based SSO authentication](auth-password-based-sso.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4646
| [RADIUS authentication]( auth-radius.md)| ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4747
| [Remote Desktop Gateway services](auth-remote-desktop-gateway.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4848
| [Secure Shell (SSH)](auth-ssh.md) | ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |

articles/active-directory/external-identities/customers/samples-ciam-all.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ These samples and how-to guides demonstrate how to write a browserless applicati
6161
> [!div class="mx-tdCol2BreakAll"]
6262
> | Language/<br/>Platform | Code sample guide | Build and integrate guide |
6363
> | ------- | -------- | ------------- |
64-
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
64+
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
6565
> | .NET | &#8226; [Sign in users](./sample-browserless-app-dotnet-sign-in.md) | &#8226; [Sign in users](./tutorial-browserless-app-dotnet-sign-in-prepare-tenant.md) |
6666
6767

@@ -149,7 +149,7 @@ These samples and how-to guides demonstrate how to write a daemon application th
149149
> [!div class="mx-tdCol2BreakAll"]
150150
> | App type | Code sample guide | Build and integrate guide |
151151
> | ------- | -------- | ------------- |
152-
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
152+
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
153153
> | Daemon | &#8226; [Call an API](./sample-daemon-node-call-api.md) | &#8226; [Call an API](./tutorial-daemon-node-call-api-prepare-tenant.md) |
154154
155155

articles/active-directory/governance/entitlement-management-access-package-request-policy.md

Lines changed: 32 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,7 @@ In addition to policies for users to request access, you can also have policies
4848
| I want some users to request access and other users to be assigned access by an administrator | Two |
4949
| I want some users in my organization to receive access automatically, other users in my organization to be able to request, and other users to be assigned access by an administrator | Three |
5050

51-
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies
52-
).
51+
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies).
5352

5453
## Open an existing access package and add a new policy with different request settings
5554

@@ -131,7 +130,7 @@ Follow these steps if you want to allow users not in your directory to request t
131130
| --- | --- |
132131
| **Specific connected organizations** | Choose this option if you want to select from a list of organizations that your administrator previously added. All users from the selected organizations can request this access package. |
133132
| **All configured connected organizations** | Choose this option if all users from all your configured connected organizations can request this access package. Only users from configured connected organizations can request access packages, so if a user is not from an Azure AD tenant, domain or identity provider associated with an existing connected organization, they will not be able to request. |
134-
| **All users (All connected organizations + any new external users)** | Choose this option if any user on the internet should be able to request this access package. If they dont belong to a connected organization in your directory, a connected organization will automatically be created for them when they request the package. The automatically created connected organization will be in a **proposed** state. For more information about the proposed state, see [State property of connected organizations](entitlement-management-organization.md#state-property-of-connected-organizations). |
133+
| **All users (All connected organizations + any new external users)** | Choose this option if any user on the internet should be able to request this access package. If they don't belong to a connected organization in your directory, a connected organization will automatically be created for them when they request the package. The automatically created connected organization will be in a **proposed** state. For more information about the proposed state, see [State property of connected organizations](entitlement-management-organization.md#state-property-of-connected-organizations). |
135134

136135

137136
1. If you selected **Specific connected organizations**, click **Add directories** to select from a list of connected organizations that your administrator previously added.
@@ -234,36 +233,36 @@ Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
234233
$apid = "cdd5f06b-752a-4c9f-97a6-82f4eda6c76d"
235234
236235
$params = @{
237-
displayName = "New Policy"
238-
description = "policy for assignment"
239-
allowedTargetScope = "notSpecified"
240-
specificAllowedTargets = @(
241-
)
242-
expiration = @{
243-
endDateTime = $null
244-
duration = $null
245-
type = "noExpiration"
246-
}
247-
requestorSettings = @{
248-
enableTargetsToSelfAddAccess = $false
249-
enableTargetsToSelfUpdateAccess = $false
250-
enableTargetsToSelfRemoveAccess = $false
251-
allowCustomAssignmentSchedule = $true
252-
enableOnBehalfRequestorsToAddAccess = $false
253-
enableOnBehalfRequestorsToUpdateAccess = $false
254-
enableOnBehalfRequestorsToRemoveAccess = $false
255-
onBehalfRequestors = @(
256-
)
257-
}
258-
requestApprovalSettings = @{
259-
isApprovalRequiredForAdd = $false
260-
isApprovalRequiredForUpdate = $false
261-
stages = @(
262-
)
263-
}
264-
accessPackage = @{
265-
id = $apid
266-
}
236+
displayName = "New Policy"
237+
description = "policy for assignment"
238+
allowedTargetScope = "notSpecified"
239+
specificAllowedTargets = @(
240+
)
241+
expiration = @{
242+
endDateTime = $null
243+
duration = $null
244+
type = "noExpiration"
245+
}
246+
requestorSettings = @{
247+
enableTargetsToSelfAddAccess = $false
248+
enableTargetsToSelfUpdateAccess = $false
249+
enableTargetsToSelfRemoveAccess = $false
250+
allowCustomAssignmentSchedule = $true
251+
enableOnBehalfRequestorsToAddAccess = $false
252+
enableOnBehalfRequestorsToUpdateAccess = $false
253+
enableOnBehalfRequestorsToRemoveAccess = $false
254+
onBehalfRequestors = @(
255+
)
256+
}
257+
requestApprovalSettings = @{
258+
isApprovalRequiredForAdd = $false
259+
isApprovalRequiredForUpdate = $false
260+
stages = @(
261+
)
262+
}
263+
accessPackage = @{
264+
id = $apid
265+
}
267266
}
268267
269268
New-MgEntitlementManagementAssignmentPolicy -BodyParameter $params

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,8 +123,7 @@ Make sure you, the user or service principal that will authenticate to Azure AD,
123123
124124
To set the role assignment and create a query, do the following steps:
125125
126-
1. In the Azure portal, locate the [Log Analytics workspace](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.OperationalInsights%2Fworkspaces
127-
).
126+
1. In the Azure portal, locate the [Log Analytics workspace](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.OperationalInsights%2Fworkspaces).
128127
129128
1. Select **Access Control (IAM)**.
130129

articles/active-directory/governance/identity-governance-organizational-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ You can [extend the Azure AD schema](../app-provisioning/user-provisioning-sync-
8080

8181
### Create catalogs for delegation
8282

83-
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md ) for each part of the organization you'll be delegating to.
83+
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md) for each part of the organization you'll be delegating to.
8484

8585
If you have multiple catalogs to create, you can use a PowerShell script to [create each catalog](entitlement-management-catalog-create.md#create-a-catalog-with-powershell).
8686

articles/active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,7 @@ ms.author: billmath
1919
ms.collection: M365-identity-device-management
2020
---
2121
# Azure AD Connect sync: Directory extensions
22-
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [extensions](/graph/extensibility-overview
23-
). You can see the available attributes by using [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). You can also use this feature to create dynamic groups in Azure AD.
22+
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [extensions](/graph/extensibility-overview). You can see the available attributes by using [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). You can also use this feature to create dynamic groups in Azure AD.
2423

2524
At present, no Microsoft 365 workload consumes these attributes.
2625

articles/active-directory/saas-apps/trend-micro-tutorial.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -197,8 +197,7 @@ Complete these steps to configure TMWS SSO on the application side.
197197
f. Select **Save**.
198198

199199
> [!NOTE]
200-
> For more information on how to configure TMWS with Azure AD, see [Configuring Azure AD Settings on TMWS](https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-help/administration/directory-services/azure-active-directo/configuring-azure-ad.aspx
201-
).
200+
> For more information on how to configure TMWS with Azure AD, see [Configuring Azure AD Settings on TMWS](https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-help/administration/directory-services/azure-active-directo/configuring-azure-ad.aspx).
202201
203202
## Test SSO
204203

@@ -220,4 +219,4 @@ For details, see [Traffic Forwarding Using PAC Files](https://docs.trendmicro.co
220219

221220
## Next steps
222221

223-
Once you configure TMWS you can enforce session control, which protects exfiltration and infiltration of your organizations sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
222+
Once you configure TMWS you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

articles/ai-services/document-intelligence/concept-custom-label-tips.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ When creating a project, select the batch layout option to prepare all documents
6262
* Learn more about custom template models:
6363

6464
> [!div class="nextstepaction"]
65-
> [Custom template models](concept-custom-template.md )
65+
> [Custom template models](concept-custom-template.md)
6666
6767
* Learn more about custom neural models:
6868

6969
> [!div class="nextstepaction"]
70-
> [Custom neural models](concept-custom-neural.md )
70+
> [Custom neural models](concept-custom-neural.md)

articles/ai-services/document-intelligence/concept-custom-label.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,12 +116,12 @@ Tabular fields are also useful when extracting repeating information within a do
116116
* Learn more about custom template models:
117117

118118
> [!div class="nextstepaction"]
119-
> [Custom template models](concept-custom-template.md )
119+
> [Custom template models](concept-custom-template.md)
120120
121121
* Learn more about custom neural models:
122122

123123
> [!div class="nextstepaction"]
124-
> [Custom neural models](concept-custom-neural.md )
124+
> [Custom neural models](concept-custom-neural.md)
125125
126126
* View the REST API:
127127

articles/ai-services/document-intelligence/concept-custom.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Custom models now include [custom classification models](./concept-custom-classi
3030

3131
## Custom document model types
3232

33-
Custom document models can be one of two types, [**custom template**](concept-custom-template.md ) or custom form and [**custom neural**](concept-custom-neural.md) or custom document models. The labeling and training process for both models is identical, but the models differ as follows:
33+
Custom document models can be one of two types, [**custom template**](concept-custom-template.md) or custom form and [**custom neural**](concept-custom-neural.md) or custom document models. The labeling and training process for both models is identical, but the models differ as follows:
3434

3535
### Custom extraction models
3636

@@ -49,7 +49,7 @@ The custom neural (custom document) model uses deep learning models and base mo
4949

5050
The custom template or custom form model relies on a consistent visual template to extract the labeled data. Variances in the visual structure of your documents affect the accuracy of your model. Structured forms such as questionnaires or applications are examples of consistent visual templates.
5151

52-
Your training set consists of structured documents where the formatting and layout are static and constant from one document instance to the next. Custom template models support key-value pairs, selection marks, tables, signature fields, and regions. Template models and can be trained on documents in any of the [supported languages](language-support.md). For more information, *see* [custom template models](concept-custom-template.md ).
52+
Your training set consists of structured documents where the formatting and layout are static and constant from one document instance to the next. Custom template models support key-value pairs, selection marks, tables, signature fields, and regions. Template models and can be trained on documents in any of the [supported languages](language-support.md). For more information, *see* [custom template models](concept-custom-template.md).
5353

5454
If the language of your documents and extraction scenarios supports custom neural models, it's recommended that you use custom neural models over template models for higher accuracy.
5555

@@ -180,7 +180,7 @@ This table compares the supported data extraction areas:
180180
*-behaves differently. With template models, synthetic data is generated at training time. With neural models, exiting text recognized in the region is selected.
181181

182182
> [!TIP]
183-
> When choosing between the two model types, start with a custom neural model if it meets your functional needs. See [custom neural](concept-custom-neural.md ) to learn more about custom neural models.
183+
> When choosing between the two model types, start with a custom neural model if it meets your functional needs. See [custom neural](concept-custom-neural.md) to learn more about custom neural models.
184184
185185
:::moniker-end
186186

0 commit comments

Comments
 (0)