Skip to content

Commit a5bde56

Browse files
committed
fix warnings
1 parent 073fcbe commit a5bde56

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ In this example, we've classified the minimum set of permission required for sin
5252

5353
:::zone pivot="aad-powershell"
5454

55-
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
55+
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/??preserve-view=true&view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
5656

5757
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
5858

@@ -204,7 +204,7 @@ Remove-MgServicePrincipalDelegatedPermissionClassification -DelegatedPermissionC
204204
```
205205
:::zone-end
206206

207-
:::zone pivot="ms-graph
207+
:::zone pivot="ms-graph"
208208

209209
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
210210

0 commit comments

Comments
 (0)