Skip to content

Commit d7a2b20

Browse files
authored
Update service-accounts-principal.md
1 parent 4f67ad3 commit d7a2b20

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/fundamentals/service-accounts-principal.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ An Azure Active Directory (Azure AD) service principals are the local representa
2121

2222
Learn more: [Application and service principal objects in Azure AD](../develop/app-objects-and-service-principals.md)
2323

24-
### Tenant-service principal relationships
24+
## Tenant-service principal relationships
2525

2626
A single-tenant application has one service principal in its home tenant. A multi-tenant web application or API requires a service principal in each tenant. A service principal is created when a user from that tenant consents to use of the application or API. This consent creates a one-to-many relationship between the multi-tenant application and its associated service principals.
2727

@@ -36,14 +36,14 @@ An application instance has two properties: the ApplicationID (or ClientID) and
3636
3737
The ApplicationID represents the global application and is the same for application instances, across tenants. The ObjectID is a unique value for an application object. As with users, groups, and other resources, the ObjectID helps to identify an application instance in Azure AD.
3838

39-
To learn more, see [Application and service principal relationship](../develop/app-objects-and-service-principals.md)
39+
To learn more, see [Application and service principal relationship in Azure AD](../develop/app-objects-and-service-principals.md)
4040

4141
### Create an application and its service principal object
4242

4343
You can create an application and its service principal object (ObjectID) in a tenant using:
4444

4545
* Azure PowerShell
46-
* Azure command-line interface (CLI)
46+
* Azure command-line interface (Azure CLI)
4747
* Microsoft Graph
4848
* The Azure portal
4949
* Other tools
@@ -69,7 +69,7 @@ For more information on Azure Key Vault and how to use it for certificate and se
6969
* [About Azure Key Vault](../../key-vault/general/overview.md)
7070
* [Assign a Key Vault access policy](../../key-vault/general/assign-access-policy.md)
7171

72-
### Challenges and mitigations
72+
### Challenges and mitigations
7373

7474
When using service principals, use the following table to match challenges and mitigations.
7575

@@ -133,4 +133,4 @@ Conditional Access:
133133

134134
Use Conditional Access to block service principals from untrusted locations.
135135

136-
See, [Conditional Access for workload identities](../conditional-access/workload-identity.md#create-a-location-based-conditional-access-policy)
136+
See, [Create a location-based Conditional Access policy](../conditional-access/workload-identity.md#create-a-location-based-conditional-access-policy)

0 commit comments

Comments
 (0)