Skip to content

Commit d55a230

Browse files
Merge pull request #250997 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230912-031929-6905775-ignore-build
[BULK] - DocuTune: Fix stale and broken links (part 6)
2 parents 7030899 + 9efad1d commit d55a230

9 files changed

+21
-24
lines changed

articles/active-directory-b2c/partner-akamai-secure-hybrid-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To get started, you'll need:
4040

4141
- An application that uses headers for authentication. In this sample, we'll use an application that displays headers [docker header-demo-app](https://hub.docker.com/r/mistermik/header-demo-app).
4242

43-
- **OR** an OpenID Connect (OIDC) application. In this sample, we'll use an [ASP.NET MVC web app](../active-directory/develop/tutorial-v2-asp-webapp.md) that signs in users by using the Open Web Interface for .NET (OWIN) middleware and the Microsoft identity platform.
43+
- **OR** an OpenID Connect (OIDC) application. In this sample, we'll use an [ASP.NET MVC web app](../active-directory/develop/web-app-tutorial-01-register-application.md) that signs in users by using the Open Web Interface for .NET (OWIN) middleware and the Microsoft identity platform.
4444

4545
## Scenario description
4646

@@ -398,7 +398,7 @@ Once the Application is deployed in a private environment and a connector is cap
398398

399399
#### Option 2: OpenID Connect
400400

401-
In this sample, we'll use a [ASP.NET MVC web app](../active-directory/develop/tutorial-v2-asp-webapp.md) that signs in users by using the Open Web Interface for .NET (OWIN) middleware and the Microsoft identity platform.
401+
In this sample, we'll use a [ASP.NET MVC web app](../active-directory/develop/web-app-tutorial-01-register-application.md) that signs in users by using the Open Web Interface for .NET (OWIN) middleware and the Microsoft identity platform.
402402

403403
1. Configure the OIDC to SAML bridging in the **AZURE AD B2C SAML IdP** created with the previous steps.
404404

@@ -422,7 +422,7 @@ In this sample, we'll use a [ASP.NET MVC web app](../active-directory/develop/tu
422422

423423
[ ![Screenshot shows the akamai oidc app claim settings.](./media/partner-akamai-secure-hybrid-access/akamai-oidc-claims-settings.png)](./media/partner-akamai-secure-hybrid-access/akamai-oidc-claims-settings.png#lightbox)
424424

425-
7. Replace startup class with the following code in the [ASP.NET MVC web app](../active-directory/develop/tutorial-v2-asp-webapp.md).
425+
7. Replace startup class with the following code in the [ASP.NET MVC web app](../active-directory/develop/web-app-tutorial-01-register-application.md).
426426

427427
These few changes configure the Authorization code flow grant, the authorization code will be redeemed for tokens at the token endpoint for the application, and it introduces the Metadata Address to set the discovery endpoint for obtaining metadata from Akamai.
428428

articles/active-directory-b2c/partner-akamai.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ To learn more, go to techdocs.akamai.com for [What is a Property?](https://techd
7979
4. For **Property hostnames**, add a property hostname, your custom domain. For example, `login.domain.com`.
8080

8181
> [!IMPORTANT]
82-
> Create or modify certificates with correct custom domain name settings. </br> Go to techdocs.akamai.com for [Configure HTTPS hostnames](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html).
82+
> Create or modify certificates with correct custom domain name settings. </br> Go to techdocs.akamai.com for [Configure HTTPS hostnames](https://techdocs.akamai.com/property-mgr/docs/serve-content-over-https).
8383
8484
#### Origin server property configuration settings
8585

@@ -115,4 +115,3 @@ To ensure traffic to Azure AD B2C goes through the custom domain:
115115

116116
* [Enable custom domains for Azure Active Directory B2C](./custom-domain.md?pivots=b2c-user-flow)
117117
* [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
118-

articles/active-directory-b2c/partner-arkose-labs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To get started, you'll need:
2626
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
2727
- [An Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
2828
- An Arkose Labs account
29-
- Go to arkoselabs.com to [request a demo](https://www.arkoselabs.com/book-a-demo/)
29+
- Go to arkoselabs.com to [request a demo](https://www.arkoselabs.com/bot-management-demo/)
3030

3131
## Scenario description
3232

@@ -54,9 +54,9 @@ The following diagram illustrates how the Arkose Labs platform integrates with A
5454

5555
## Request a demo from Arkose Labs
5656

57-
1. Go to arkoselabs.com to [book a demo](https://www.arkoselabs.com/book-a-demo/).
57+
1. Go to arkoselabs.com to [book a demo](https://www.arkoselabs.com/bot-management-demo/).
5858
2. Create an account.
59-
3. Navigate to the [Arkose Portal](https://dashboard.arkoselabs.com/login) sign-in page.
59+
3. Navigate to the [Arkose Portal](https://portal.arkoselabs.com/) sign-in page.
6060
4. In the dashboard, navigate to site settings.
6161
5. Locate your public key and private key. You'll use this information later.
6262

@@ -102,7 +102,7 @@ The user flow is for sign-up and sign-in, or sign-up. The Arkose Labs user flow
102102
103103
3. In Azure-Samples, modify [selfAsserted.html](https://github.com/Azure-Samples/active-directory-b2c-node-sign-up-user-flow-arkose/blob/main/Assets/selfAsserted.html) file so `<ARKOSE_PUBLIC_KEY>` matches the value you generated for the client-side validation.
104104
4. Host the HTML page on a Cross-Origin Resource Sharing (CORS) enabled web endpoint.
105-
5. [Create a storage account](../storage/common/storage-account-create.md?tabs=azure-portal&toc=%2fazure%2fstorage%2fblobs%2ftoc.json).
105+
5. [Create a storage account](../storage/common/storage-account-create.md?tabs=azure-portal&toc=/azure/storage/blobs/toc.json).
106106
6. [CORS support for Azure Storage](/rest/api/storageservices/cross-origin-resource-sharing--cors--support-for-the-azure-storage-services).
107107

108108
>[!NOTE]

articles/active-directory-b2c/partner-asignio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ zone_pivot_groups: b2c-policy-type
1717

1818
# Configure Asignio with Azure Active Directory B2C for multifactor authentication
1919

20-
Learn to integrate Azure Active Directory (Azure AD B2C) authentication with [Asignio](https://www.asignio.com/). With this integration, provide passwordless, soft biometric, and multifactor authentication experience to customers. Asignio uses patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature helps to reduce passwords, fraud, phishing, and credential reuse through omni-channel authentication.
20+
Learn to integrate Azure Active Directory (Azure AD B2C) authentication with [Asignio](https://www.web.asignio.com/). With this integration, provide passwordless, soft biometric, and multifactor authentication experience to customers. Asignio uses patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature helps to reduce passwords, fraud, phishing, and credential reuse through omni-channel authentication.
2121

2222
## Before you begin
2323

articles/active-directory-b2c/partner-bindid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ zone_pivot_groups: b2c-policy-type
1717

1818
# Configure Transmit Security with Azure Active Directory B2C for passwordless authentication
1919

20-
In this tutorial, learn to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) BindID, a passwordless authentication solution. BindID uses strong Fast Identity Online (FIDO2) biometric authentication for reliable omni-channel authentication. The solution ensures a smooth sign in experience for customers across devices and channels, while reducing fraud, phishing, and credential reuse.
20+
In this tutorial, learn to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security](https://transmitsecurity.com/solutions/password-mfa-replacement) BindID, a passwordless authentication solution. BindID uses strong Fast Identity Online (FIDO2) biometric authentication for reliable omni-channel authentication. The solution ensures a smooth sign in experience for customers across devices and channels, while reducing fraud, phishing, and credential reuse.
2121

2222
## Scenario description
2323

@@ -41,7 +41,7 @@ To get started, you need:
4141
* An Azure AD B2C tenant linked to the Azure subscription
4242
* See, [Tutorial: Create an Azure Active Directory B2C tenant](./tutorial-create-tenant.md)
4343
* A BindID tenant
44-
* Go to transmitsecurity.com to [get started](https://www.transmitsecurity.com/developer?utm_signup=dev_hub#try)
44+
* Go to transmitsecurity.com to [get started](https://developer.transmitsecurity.com/#try?utm_signup=dev_hub)
4545
* Register a web application in the Azure portal
4646
* [Tutorial: Register a web application in Azure Active Directory B2C](./tutorial-register-applications.md)
4747
* Azure AD B2C custom policies

articles/active-directory-b2c/partner-cloudflare.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515
---
1616
# Tutorial: Configure Cloudflare Web Application Firewall with Azure Active Directory B2C
1717

18-
In this tutorial, you can learn how to configure the [Cloudflare Web Application Firewall (WAF)](https://www.cloudflare.com/waf/) solution for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. Use Cloudflare WAF to help protect organizations from malicious attacks that can exploit vulnerabilities such as SQL Injection, and cross-site scripting (XSS).
18+
In this tutorial, you can learn how to configure the [Cloudflare Web Application Firewall (WAF)](https://www.cloudflare.com/application-services/products/waf/) solution for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. Use Cloudflare WAF to help protect organizations from malicious attacks that can exploit vulnerabilities such as SQL Injection, and cross-site scripting (XSS).
1919

2020
## Prerequisites
2121

@@ -58,7 +58,7 @@ The settings appear in the following image.
5858

5959
### Configure the Web Application Firewall
6060

61-
Go to your Cloudflare settings, and use the Cloudflare content to [configure the WAF](https://www.cloudflare.com/waf/) and learn about other security tools.
61+
Go to your Cloudflare settings, and use the Cloudflare content to [configure the WAF](https://www.cloudflare.com/application-services/products/waf/) and learn about other security tools.
6262

6363
### Configure firewall rule
6464

articles/active-directory-b2c/partner-experian.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with Experian CrossCore, a service that verifies user identification. It does risk analysis based on information provided by the user during sign-up. CrossCore permits users to sign in, or not.
1919

20-
Learn more about [Experian](https://www.experian.com/decision-analytics/account-opening-fraud/microsoft-integration) solutions, services, etc.
20+
Learn more about [Experian](https://www.experian.com/business/products/crosscore) solutions, services, etc.
2121

2222
In this tutorial, you can use the following attributes in CrossCore risk analysis:
2323

@@ -62,7 +62,7 @@ The following architecture diagram shows the implementation.
6262

6363
## Onboard with Experian
6464

65-
1. Create an Experian account. To get started, go to [Experian](https://www.experian.com/decision-analytics/account-opening-fraud/microsoft-integration) and scroll to the bottom for the contact form.
65+
1. Create an Experian account. To get started, go to [Experian](https://www.experian.com/business/products/crosscore) and scroll to the bottom for the contact form.
6666
2. When an account is created, you receive information for API configuration. The following sections continue the process.
6767

6868
## Configure Azure AD B2C with Experian

articles/active-directory-b2c/partner-f5.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Learn to integrate Azure Active Directory B2C (Azure AD B2C) with F5 BIG-IP Acce
1919

2020
Deploy F5 BIG-IP Application Delivery Controller (ADC) as a secure gateway between private networks and the internet. There are features for application-level inspection and customizable access controls. If deployed as a reverse proxy, use the BIG-IP to enable secure hybrid access to business applications, with a federated identity access layer managed by APM.
2121

22-
Go to f5.com resources and white papers for: [Easily Configure Secure Access to All Your Applications via Azure AD](https://www.f5.com/services/resources/white-papers/easily-configure-secure-access-to-all-your-applications-via-azure-active-directory)
22+
Go to f5.com resources and white papers for: [Easily Configure Secure Access to All Your Applications via Azure AD](https://www.f5.com/resources/white-papers/easily-configure-secure-access-to-all-your-applications-via-azure-active-directory)
2323

2424
## Prerequisites
2525

@@ -35,7 +35,7 @@ To get started, you need:
3535
* F5 BIG-IP® Best bundle
3636
* F5 BIG-IP Access Policy Manager™ standalone license
3737
* F5 BIG-IP Access Policy Manager™ add-on license on a BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
38-
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
38+
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trials)
3939
* A header-based web application or an IIS app for testing
4040
* See, [Set up an IIS app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90))
4141
* SSL certificate to publish services over HTTPS, or use default while testing
@@ -130,7 +130,7 @@ For BIG-IP configuration use Guided Configuration v.7/8. The workflow framework
130130
2. Go to **Access** > **Guided Configuration**.
131131
3. The version appears in the top right-hand corner.
132132

133-
To upgrade the Guided Configuration, go to my.f5.com for [K85454683: Upgrade F5 BIG-IP Guided Configuration on the BIG-IP system](https://support.f5.com/csp/article/K85454683).
133+
To upgrade the Guided Configuration, go to my.f5.com for [K85454683: Upgrade F5 BIG-IP Guided Configuration on the BIG-IP system](https://my.f5.com/manage/s/article/K85454683).
134134

135135
### SSL profiles
136136

@@ -348,7 +348,7 @@ To achieve SLO, enable your application sign out function to call the Azure AD B
348348

349349
An alternative SLO process is to enable the BIG-IP to listen for the request, when selecting the applications **Sign out** button. Upon detecting the request, it calls to the Azure AD B2C sign out endpoint. This approach precludes making changes to the application.
350350

351-
To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://support.f5.com/csp/article/K42052145).
351+
To learn more BIG-IP iRules, go to support.f5.com for [K42052145: Configuring automatic session termination (logout) based on a URI-referenced file name](https://my.f5.com/manage/s/article/K42052145).
352352

353353
> [!NOTE]
354354
> Regardless of approach, ensure the Azure AD B2C tenant knows the APM sign-out endpoint.
@@ -450,4 +450,3 @@ The same access log provides detail.
450450
10. Select **Apply**.
451451

452452
For more information, go to techdocs.f5.com for [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)
453-

articles/active-directory-b2c/partner-grit-editor.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
# Edit Azure Active Directory B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor
1919

20-
[Grit Software Systems Visual Identity Experience Framework (IEF) Editor](https://www.gritiam.com/iefeditor), is a tool that saves time during Azure Active Directory B2C (Azure AD B2C) authentication deployment. It supports multiple languages without the need to write code. It also has a no code debugger for user journeys.
20+
[Grit Software Systems Visual Identity Experience Framework (IEF) Editor](https://www.gritiam.com/iefeditor.html), is a tool that saves time during Azure Active Directory B2C (Azure AD B2C) authentication deployment. It supports multiple languages without the need to write code. It also has a no code debugger for user journeys.
2121

2222
Use the Visual IEF Editor to:
2323

@@ -89,9 +89,8 @@ After the IEF is modified, download, and upload the files to Azure AD B2C to see
8989

9090
For additional information, review the following articles:
9191

92-
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](custom-policy-get-started.md?tabs=applications)
92+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
9393

9494
- [IEF Editor](https://app.archbee.com/doc/uwPRnuvZNjyEaJ8odNOEC/WmcXf6fTZjAHpx7-rAlac) documentation
9595

9696
- [Grit IAM B2B2C](partner-grit-iam.md)
97-

0 commit comments

Comments
 (0)