Skip to content

Commit ba960b0

Browse files
author
Gerardo Andrés Riaño Briceño
authored
Update rbac-migration.md
Updated issue with link syntax
1 parent 7dbc0e0 commit ba960b0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/key-vault/general/rbac-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Using the Azure Policy service, you can govern RBAC permission model migration a
120120
1. Select **Assign policy** at the top of the page. This button opens to the Policy assignment page.
121121
1. Enter the following information:
122122
- Define the scope of the policy by choosing the subscription and resource group over which the policy will be enforced. Select by clicking the three-dot button at on **Scope** field.
123-
- Select the name of the policy definition: "[[Preview]: Azure Key Vault should use RBAC permission model]([url](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5))"
123+
- Select the name of the policy definition: "[[Preview]: Azure Key Vault should use RBAC permission model](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5)"
124124
- Go to the **Parameters** tab at the top of the page and define the desired effect of the policy (Audit, Deny, or Disabled).
125125
1. Fill out any additional fields. Navigate the tabs clicking on **Previous** and **Next** buttons at the bottom of the page.
126126
1. Select **Review + create**

0 commit comments

Comments
 (0)