Skip to content

Commit d2e939b

Browse files
authored
Merge pull request #245742 from alexbuckgit/alexbuckgit/docutune-autopr-20230720-223327-5394967
[BULK] DocuTune - Standardize formatting of Azure portal links (part 1)
2 parents b10cfe7 + 24cc6e3 commit d2e939b

File tree

9 files changed

+15
-18
lines changed

9 files changed

+15
-18
lines changed

articles/active-directory-b2c/partner-arkose-labs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,9 @@ The following diagram illustrates how the Arkose Labs platform integrates with A
6868

6969
### Create an ArkoseSessionToken custom attribute
7070

71-
To create a custom attribute:
71+
To create a custom attribute:
7272

73-
1. Go to the [Azure portal](https://ms.portal.azure.com/#home), then to **Azure AD B2C**.
73+
1. Go to the [Azure portal](https://portal.azure.com), then to **Azure AD B2C**.
7474
2. Select **User attributes**.
7575
3. Select **Add**.
7676
4. Enter **ArkoseSessionToken** as the attribute Name.

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ Below are sample requests to help outline what the sync engine currently sends v
236236
## Upgrading from the older customappsso job to the SCIM job
237237
Following the steps below will delete your existing customappsso job and create a new SCIM job.
238238

239-
1. Sign into the [Azure portal](https://portal.azure.com).
239+
1. Sign in to the [Azure portal](https://portal.azure.com).
240240
2. In the **Azure Active Directory > Enterprise Applications** section of the Azure portal, locate and select your existing SCIM application.
241241
3. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
242242
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
@@ -275,7 +275,7 @@ Following the steps below will delete your existing customappsso job and create
275275
## Downgrading from the SCIM job to the customappsso job (not recommended)
276276
We allow you to downgrade back to the old behavior but don't recommend it as the customappsso does not benefit from some of the updates we make, and may not be supported forever.
277277

278-
1. Sign into the [Azure portal](https://portal.azure.com).
278+
1. Sign in to the [Azure portal](https://portal.azure.com).
279279
2. In the **Azure Active Directory > Enterprise Applications > Create application** section of the Azure portal, create a new **Non-gallery** application.
280280
3. In the **Properties** section of your new custom app, copy the **Object ID**.
281281
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.

articles/active-directory/develop/test-setup-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Replicating conditional access policies ensures you don't encounter unexpected b
9494

9595
Viewing your production tenant conditional access policies may need to be performed by a company administrator.
9696

97-
1. Sign into the [Azure portal](https://portal.azure.com) using your production tenant account.
97+
1. Sign in to the [Azure portal](https://portal.azure.com) using your production tenant account.
9898
1. Go to **Azure Active Directory** > **Enterprise applications** > **Conditional Access**.
9999
1. View the list of policies in your tenant. Click the first one.
100100
1. Navigate to **Cloud apps or actions**.
@@ -110,7 +110,7 @@ In a new tab or browser session, sign in to the [Azure portal](https://portal.az
110110

111111
Replicating permission grant policies ensures you don't encounter unexpected prompts for admin consent when moving to production.
112112

113-
1. Sign into the [Azure portal](https://portal.azure.com) using your production tenant account.
113+
1. Sign in to the [Azure portal](https://portal.azure.com) using your production tenant account.
114114
1. Click on **Azure Active Directory**.
115115
1. Go to **Enterprise applications**.
116116
1. From your production tenant, go to **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **User consent** settings. Copy the settings there to your test tenant.

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Product names and service plan identifiers for licensing
2525

26-
When managing licenses in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products) or the [Microsoft 365 admin center](https://admin.microsoft.com), you see product names that look something like *Office 365 E3*. When you use PowerShell v1.0 cmdlets, the same product is identified using a specific but less friendly name: *ENTERPRISEPACK*. When using PowerShell v2.0 cmdlets or [Microsoft Graph](/graph/api/resources/subscribedsku), the same product is identified using a GUID value: *6fd2c87f-b296-42f0-b197-1e91e994b900*. The following table lists the most commonly used Microsoft online service products and provides their various ID values. These tables are for reference purposes in Azure Active Directory (Azure AD), part of Microsoft Entra, and are accurate only as of the date when this article was last updated. Microsoft will continue to make periodic updates to this document.
26+
When [managing licenses in the Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products) or the [Microsoft 365 admin center](https://admin.microsoft.com), you see product names that look something like *Office 365 E3*. When you use PowerShell v1.0 cmdlets, the same product is identified using a specific but less friendly name: *ENTERPRISEPACK*. When using PowerShell v2.0 cmdlets or [Microsoft Graph](/graph/api/resources/subscribedsku), the same product is identified using a GUID value: *6fd2c87f-b296-42f0-b197-1e91e994b900*. The following table lists the most commonly used Microsoft online service products and provides their various ID values. These tables are for reference purposes in Azure Active Directory (Azure AD), part of Microsoft Entra, and are accurate only as of the date when this article was last updated. Microsoft will continue to make periodic updates to this document.
2727

2828
- **Product name**: Used in management portals
2929
- **String ID**: Used by PowerShell v1.0 cmdlets when performing operations on licenses or by the **skuPartNumber** property of the **subscribedSku** Microsoft Graph API

articles/active-directory/external-identities/direct-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ Next, configure federation with the IdP configured in step 1 in Azure AD. You ca
191191

192192
### To configure federation in the Azure portal
193193

194-
1. Sign in to the [Azure portal](https://portal.azure.com/) as an External Identity Provider Administrator or a Global Administrator.
194+
1. Sign in to the [Azure portal](https://portal.azure.com) as an External Identity Provider Administrator or a Global Administrator.
195195
2. In the left pane, select **Azure Active Directory**.
196196
3. Select **External Identities** > **All identity providers**.
197197
4. Select **New SAML/WS-Fed IdP**.
@@ -276,7 +276,7 @@ On the **All identity providers** page, you can view the list of SAML/WS-Fed ide
276276
You can remove your federation configuration. If you do, federation guest users who have already redeemed their invitations can no longer sign in. But you can give them access to your resources again by [resetting their redemption status](reset-redemption-status.md).
277277
To remove a configuration for an IdP in the Azure portal:
278278

279-
1. Sign in to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
279+
1. Sign in to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
280280
1. Select **External Identities**.
281281
1. Select **All identity providers**.
282282
1. Under **SAML/WS-Fed identity providers**, scroll to the identity provider in the list or use the search box.

articles/active-directory/manage-apps/f5-bigip-deployment-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ You can deploy a BIG-IP in different topologies. This guide focuses on a network
6363

6464
To deploy BIG-IP VE from the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps).
6565

66-
1. Log into the [Azure portal](https://portal.azure.com/#home) using an account with permissions to create VMs. For example, Contributor.
66+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) using an account with permissions to create VMs, such as Contributor.
6767
2. In the top ribbon search box, type **marketplace**
6868
3. Select **Enter**.
6969
4. Type **F5** into the Marketplace filter.

articles/active-directory/saas-apps/tableau-online-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ In June 2022, Tableau released a SCIM 2.0 connector. Completing the steps below
200200
>Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
201201
202202

203-
1. Sign into the [Azure portal](https://portal.azure.com).
203+
1. Sign in to the [Azure portal](https://portal.azure.com).
204204

205205

206206
1. Navigate to your current Tableau Cloud app under **Azure Active Directory > Enterprise Applications**.

articles/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,8 +177,8 @@ In December 2021, Facebook released a SCIM 2.0 connector. Completing the steps b
177177
> [!NOTE]
178178
> Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings.
179179
180-
1. Sign into the [Azure portal](https://portal.azure.com)
181-
2. Navigate to your current Workplace by Facebook app under Azure Active Directory > Enterprise Applications
180+
1. Sign in to the [Azure portal](https://portal.azure.com).
181+
2. Navigate to your current Workplace by Facebook app under Azure Active Directory > Enterprise Applications.
182182
3. In the Properties section of your new custom app, copy the Object ID.
183183

184184
![Screenshot of Workplace by Facebook app in the Azure portal](./media/workplace-by-facebook-provisioning-tutorial/app-properties.png)

articles/ai-services/Anomaly-Detector/includes/create-anomaly-detector-resource.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: mbullwin
1212

1313
## Create an Anomaly Detector resource
1414

15-
1. Sign into the <a href="https://portal.azure.com" target="_blank">Azure portal</a>.
15+
1. Sign in to the <a href="https://portal.azure.com" target="_blank">Azure portal</a>.
1616
1. Select <a href="https://portal.azure.com/#create/Microsoft.CognitiveServicesAnomalyDetector" target="_blank">Create Anomaly Detector</a> resource.
1717
1. Enter all required settings:
1818

@@ -29,8 +29,5 @@ ms.author: mbullwin
2929

3030
|Keys and Endpoint tab in the portal|Setting|Value|
3131
|--|--|--|
32-
|**Overview**|Endpoint|Copy the endpoint. It looks similar to ` https://<your-resource-name>.cognitiveservices.azure.com/`|
32+
|**Overview**|Endpoint|Copy the endpoint. It looks similar to `https://<your-resource-name>.cognitiveservices.azure.com/`|
3333
|**Keys**|API Key|Copy 1 of the two keys. It is a 32 alphanumeric-character string with no spaces or dashes, `xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx`.|
34-
35-
36-

0 commit comments

Comments
 (0)