Skip to content

Commit b05e704

Browse files
committed
fix warnings
1 parent 86a8144 commit b05e704

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3378,17 +3378,17 @@
33783378
},
33793379
{
33803380
"source_path_from_root": "/articles/active-directory/develop/active-directory-permissions.md",
3381-
"redirect_url": "/azure/active-directory/develop/v2-permissions-and-consent",
3381+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
33823382
"redirect_document_id": false
33833383
},
33843384
{
33853385
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-scopes.md",
3386-
"redirect_url": "/azure/active-directory/develop/v2-permissions-and-consent",
3386+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
33873387
"redirect_document_id": false
33883388
},
33893389
{
33903390
"source_path_from_root": "/articles/active-directory/develop/v1-permissions-and-consent.md",
3391-
"redirect_url": "/azure/active-directory/develop/v2-permissions-and-consent",
3391+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
33923392
"redirect_document_id": false
33933393
},
33943394
{

articles/active-directory/develop/Delegated-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Microsoft identity platform delegated access scenario.
33
description: Learn about delegated access in the Microsoft identity platform endpoint.
44
services: active-directory
5-
author: mmacy
5+
author: omondiatieno
66
manager: mwongerapk
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 09/28/2022
13-
ms.author: marsma
13+
ms.author: jomondi
1414
ms.reviewer: jawoods, ludwignick, phsignor
1515
ms.custom: aaddev, fasttrack-edit, contperf-fy21q1, identityplatformtop40, has-adal-ref
1616
---

articles/active-directory/develop/consent-types-developer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ After the user enters their credentials, the Microsoft identity platform checks
6060

6161
In the following example, the `offline_access` ("Maintain access to data you have given it access to") permission and `User.Read` ("Sign you in and read your profile") permission are automatically included in the initial consent to an application. These permissions are required for proper application functionality. The `offline_access` permission gives the application access to refresh tokens that are critical for native apps and web apps. The `User.Read` permission gives access to the `sub` claim. It allows the client or application to correctly identify the user over time and access rudimentary user information.
6262

63-
![Example screenshot that shows work account consent.](./media//request-permissions-through-consent.png)
63+
:::image type="content" source="./media/consent-types-developer/request-permissions-through-consent.png" alt-text="Example screenshot that shows work account consent." lightbox="./media/consent-framework/grant-consent.png":::
6464

6565
When the user approves the permission request, consent is recorded. The user doesn't have to consent again when they later sign in to the application.
6666

@@ -95,7 +95,7 @@ Application permissions always require admin consent. Application permissions do
9595

9696
### Admin consent for Multi-tenant applications
9797

98-
In case the application requesting the permission is a multi-tenant application, its application registration only exists in the tenant where it was created, therefore permissions can't be configured in the local tenant. If the application requests permissions that require admin consent, the administrator needs to consent on behalf of the users. To consent to these permissions, the administrators need to log in to the application themselves, so the admin consent sign-in experience is triggered. To learn how to set up the admin consent experience for multi-tenant applications, see [Enable multi-tenant log-ins](howto-convert-app-to-be-multi-tenant.md#understand-user-and-admin-consent)
98+
In case the application requesting the permission is a multi-tenant application, its application registration only exists in the tenant where it was created, therefore permissions can't be configured in the local tenant. If the application requests permissions that require admin consent, the administrator needs to consent on behalf of the users. To consent to these permissions, the administrators need to log in to the application themselves, so the admin consent sign-in experience is triggered. To learn how to set up the admin consent experience for multi-tenant applications, see [Enable multi-tenant log-ins](howto-convert-app-to-be-multi-tenant.md#understand-user-and-admin-consent-and-make-appropriate-code-changes)
9999

100100
An administrator can grant consent for an application with the following options.
101101

75.9 KB
Loading

0 commit comments

Comments
 (0)