Skip to content

Commit df6ae43

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI156667-security-recommendations
2 parents 500d1f4 + ccb730d commit df6ae43

File tree

464 files changed

+8843
-3868
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

464 files changed

+8843
-3868
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24550,6 +24550,26 @@
2455024550
"source_path_from_root": "/articles/orbital/space-partner-program-overview.md",
2455124551
"redirect_url": "/azure/orbital/overview",
2455224552
"redirect_document_id": false
24553+
},
24554+
{
24555+
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24556+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24557+
"redirect_document_id": false
24558+
},
24559+
{
24560+
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24561+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24562+
"redirect_document_id": false
24563+
},
24564+
{
24565+
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24566+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24567+
"redirect_document_id": false
24568+
},
24569+
{
24570+
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24571+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24572+
"redirect_document_id": false
2455324573
}
2455424574
]
2455524575
}

articles/active-directory-domain-services/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,15 +52,15 @@
5252
- name: How Domain Services synchronization works
5353
href: synchronization.md
5454
- name: How password hash synchronization works
55-
href: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
55+
href: /azure/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
5656
- name: Custom attributes
5757
href: concepts-custom-attributes.md
5858
- name: Virtual network considerations
5959
href: network-considerations.md
6060
- name: What is Microsoft Entra ID?
61-
href: ../active-directory/fundamentals/whatis.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
61+
href: /azure/active-directory/fundamentals/whatis?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
6262
- name: Microsoft Entra architecture
63-
href: ../active-directory/architecture/architecture.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
63+
href: /azure/active-directory/architecture/architecture?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
6464
- name: How to
6565
items:
6666
- name: Configure common settings

articles/active-directory-domain-services/ad-auth-no-join-linux-vm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -224,11 +224,11 @@ The final step is to check that the flow works properly. To check this, try logg
224224
[centosuser@centos8 ~]su - [email protected]
225225
Last login: Wed Oct 12 15:13:39 UTC 2022 on pts/0
226226
[ADUser@Centos8 ~]$ exit
227-
228227
```
228+
229229
Now you are ready to use AD authentication on your Linux VM.
230230

231231
<!-- INTERNAL LINKS -->
232-
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
233-
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
232+
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization.md
233+
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory.md
234234
[create-azure-ad-ds-instance]: tutorial-create-instance.md

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ To get started, [create a Domain Services managed domain][create-instance].
105105
[password-policy]: password-policy.md
106106
[hybrid-phs]: tutorial-configure-password-hash-sync.md#enable-synchronization-of-password-hashes
107107
[secure-domain]: secure-your-domain.md
108-
[azure-ad-password-sync]: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
108+
[azure-ad-password-sync]: /azure/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization#password-hash-sync-process-for-azure-ad-domain-services
109109
[create-instance]: tutorial-create-instance.md
110110
[tutorial-create-instance-advanced]: tutorial-create-instance-advanced.md
111111
[concepts-forest]: ./concepts-forest-trust.md

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,4 @@ Create a replacement secure LDAP certificate by following the steps to [create a
5959
If you still have issues, [open an Azure support request][azure-support] for more troubleshooting help.
6060

6161
<!-- INTERNAL LINKS -->
62-
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
62+
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support

articles/active-directory-domain-services/alert-nsg.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,5 +87,5 @@ It takes a few moments for the security rule to be added and show in the list.
8787
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
8888

8989
<!-- INTERNAL LINKS -->
90-
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
91-
[configure-ldaps]: tutorial-configure-ldaps.md
90+
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
91+
[configure-ldaps]: ./tutorial-configure-ldaps.md

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: justinha
1616
---
1717
# Known issues: Service principal alerts in Microsoft Entra Domain Services
1818

19-
[Service principals](../active-directory/develop/app-objects-and-service-principals.md) are applications that the Azure platform uses to manage, update, and maintain a Microsoft Entra Domain Services managed domain. If a service principal is deleted, functionality in the managed domain is impacted.
19+
[Service principals](/azure/active-directory/develop/app-objects-and-service-principals) are applications that the Azure platform uses to manage, update, and maintain a Microsoft Entra Domain Services managed domain. If a service principal is deleted, functionality in the managed domain is impacted.
2020

2121
This article helps you troubleshoot and resolve service principal-related configuration alerts.
2222

@@ -109,7 +109,7 @@ After you delete both applications, the Azure platform automatically recreates t
109109
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
110110
111111
<!-- INTERNAL LINKS -->
112-
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
112+
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
113113
114114
<!-- EXTERNAL LINKS -->
115115
[New-AzureAdServicePrincipal]: /powershell/module/azuread/new-azureadserviceprincipal

articles/active-directory-domain-services/change-sku.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,8 @@ It can take a minute or two to change the SKU type.
6464
If you have a resource forest and want to create additional trusts after the SKU change, see [Create an outbound forest trust to an on-premises domain in Domain Services][create-trust].
6565

6666
<!-- INTERNAL LINKS -->
67-
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
68-
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
67+
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization
68+
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory
6969
[create-azure-ad-ds-instance]: tutorial-create-instance.md
7070
[concepts-sku]: administration-concepts.md#azure-ad-ds-skus
7171
[create-trust]: tutorial-create-forest-trust.md

articles/active-directory-domain-services/check-health.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This article shows you how to view the Domain Services health status and underst
2424

2525
The health status for a managed domain is viewed using the Microsoft Entra admin center. Information on the last backup time and synchronization with Microsoft Entra ID can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
2626

27-
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
27+
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
2828
1. Search for and select **Microsoft Entra Domain Services**.
2929
1. Select your managed domain, such as *aaddscontoso.com*.
3030
1. On the left-hand side of the Domain Services resource window, select **Health**. The following example screenshot shows a healthy managed domain and the status of the last backup and Azure AD synchronization:
@@ -84,5 +84,5 @@ Health status alerts are categorized into the following levels of severity:
8484
For more information on alerts that are shown in the health status page, see [Resolve alerts on your managed domain][troubleshoot-alerts]
8585

8686
<!-- INTERNAL LINKS -->
87-
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
87+
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
8888
[troubleshoot-alerts]: troubleshoot-alerts.md

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ You can also learn more about
133133
[manage-gpos]: manage-group-policy.md
134134
[tutorial-ldaps]: tutorial-configure-ldaps.md
135135
[tutorial-create]: tutorial-create-instance.md
136-
[whatis-azuread]: ../active-directory/fundamentals/whatis.md
136+
[whatis-azuread]: /azure/active-directory/fundamentals/whatis
137137
[overview-adds]: /windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview
138138
[create-forest-trust]: tutorial-create-forest-trust.md
139139
[administration-concepts]: administration-concepts.md

0 commit comments

Comments
 (0)