Skip to content

Commit e0d4d5b

Browse files
Merge pull request #255205 from alexbuckgit/alexbuckgit/docutune-autopr-20231017-001735-7422712-ignore-build
[BULK] - DocuTune - Switch to site-relative links in active-directory folder prior to repo migration (part 30)
2 parents bbcb22f + 905bea0 commit e0d4d5b

File tree

7 files changed

+246
-245
lines changed

7 files changed

+246
-245
lines changed

articles/active-directory/verifiable-credentials/how-to-opt-out.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Opting out is a one-way operation. After you opt-out, your Microsoft Entra Verif
4141

4242
When you complete opting out of the Microsoft Entra Verified ID service, the following actions take place:
4343

44-
- The DID keys in Key Vault are [soft deleted](../../key-vault/general/soft-delete-overview.md).
44+
- The DID keys in Key Vault are [soft deleted](/azure/key-vault/general/soft-delete-overview).
4545
- The issuer object is deleted from our database.
4646
- The tenant identifier is deleted from our database.
4747
- All of the verifiable credentials contracts are deleted from our database.

articles/active-directory/verifiable-credentials/how-to-use-quickstart-idtoken.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ To match the display and rules definitions, you should make your application's o
208208
},
209209
```
210210

211-
**For Azure Active Directory B2C**: Configuring other claims in your ID token depends on whether your B2C policy is a *user flow* or a *custom policy*. For information about user flows, see [Set up a sign-up and sign-in flow in Azure Active Directory B2C](../../active-directory-b2c/add-sign-up-and-sign-in-policy.md?pivots=b2c-user-flow). For information about custom policy, see [Provide optional claims to your app](../../active-directory-b2c/configure-tokens.md?pivots=b2c-custom-policy#provide-optional-claims-to-your-app).
211+
**For Azure Active Directory B2C**: Configuring other claims in your ID token depends on whether your B2C policy is a *user flow* or a *custom policy*. For information about user flows, see [Set up a sign-up and sign-in flow in Azure Active Directory B2C](/azure/active-directory-b2c/add-sign-up-and-sign-in-policy?pivots=b2c-user-flow). For information about custom policy, see [Provide optional claims to your app](/azure/active-directory-b2c/configure-tokens?pivots=b2c-custom-policy#provide-optional-claims-to-your-app).
212212

213213
For other identity providers, see the relevant documentation.
214214

articles/active-directory/verifiable-credentials/plan-issuance-solution.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ The following provides areas to consider when planning for performance:
176176
* To limit latency, deploy your issuance frontend website and key vault in the region listed above.
177177

178178
Model based on throughput:
179-
* The Issuer service is subject to [Azure Key Vault service limits](../../key-vault/general/service-limits.md).
179+
* The Issuer service is subject to [Azure Key Vault service limits](/azure/key-vault/general/service-limits).
180180

181181
* For Azure Key Vault, there are three signing operations involved in each a VC issuance:
182182

@@ -186,7 +186,7 @@ Model based on throughput:
186186

187187
* One for the contract download
188188

189-
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](../../key-vault/general/overview-throttling.md).
189+
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
190190

191191
* If you're planning a large rollout and onboarding of VCs, consider batching VC creation to ensure you don't exceed limits.
192192

@@ -216,7 +216,7 @@ For scalability, consider implementing metrics for the following items:
216216

217217
* Monitor Azure Key Vault using the following link:
218218

219-
* [Azure Key Vault monitoring and alerting](../../key-vault/general/alert.md)
219+
* [Azure Key Vault monitoring and alerting](/azure/key-vault/general/alert)
220220

221221
* Monitor the components used for your business logic layer.
222222

@@ -226,7 +226,7 @@ To plan for reliability, we recommend:
226226

227227
* After you define your availability and redundancy goals, use the following guides to understand how to achieve your goals:
228228

229-
* [Azure Key Vault availability and redundancy - Azure Key Vault](../../key-vault/general/disaster-recovery-guidance.md)
229+
* [Azure Key Vault availability and redundancy - Azure Key Vault](/azure/key-vault/general/disaster-recovery-guidance)
230230

231231
* For frontend and business layer, your solution can manifest in an unlimited number of ways. As with any solution, for the dependencies you identify, ensure that the dependencies are resilient and monitored.
232232

@@ -272,7 +272,7 @@ As part of your design considerations focused on security, we recommend the foll
272272

273273
For security logging and monitoring, we recommend the following items:
274274

275-
* Enable logging and alerting of Azure Key Vault. Track credential issuance operations, key extraction attempts and permission changes. Monitor and send alert for configuration changes. More information can be found at [How to enable Key Vault logging](../../key-vault/general/howto-logging.md).
275+
* Enable logging and alerting of Azure Key Vault to track credential issuance operations, key extraction attempts, permission changes, and to monitor and send alert for configuration changes. More information can be found at [How to enable Key Vault logging](/azure/key-vault/general/howto-logging).
276276

277277
* Archive logs in a security information and event management (SIEM) systems, such as [Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel) for long-term retention.
278278

@@ -292,7 +292,7 @@ For guidance on managing your Azure environment, we recommend you review the [Mi
292292

293293
When you complete your POC, gather all the information and documentation generated, and consider tearing down the issuer configuration.
294294

295-
For more information on Key Vault implementation and operation, see [Best practices to use Key Vault](../../key-vault/general/best-practices.md). For more information on Securing Azure environments with Active Directory, see [Securing Azure environments with Microsoft Entra ID](https://aka.ms/AzureADSecuredAzure).
295+
For more information on Key Vault implementation and operation, refer to [Best practices to use Key Vault](/azure/key-vault/general/best-practices). For more information on Securing Azure environments with Active Directory, refer to [Securing Azure environments with Microsoft Entra ID](https://aka.ms/AzureADSecuredAzure).
296296

297297
## Next steps
298298

articles/active-directory/verifiable-credentials/plan-verification-solution.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This content covers the technical aspects of planning for a verifiable credentia
2727

2828
Supporting technologies that aren't specific to verification solutions are out of scope. For example, websites are used in a verifiable credential verification solution but planning a website deployment isn't covered in detail.
2929

30-
As you plan your verification solution, you must consider what business capability is being added or modified. You must also consider what IT capabilities can be reused, and what capabilities must be added to create the solution. Also consider what training is needed for the people involved in the business process and the people that support the end users and staff of the solution. These articles aren't covered in this content. We recommend reviewing the [Microsoft Azure Well-Architected Framework](/azure/architecture/framework/) for information covering these articles.
30+
As you plan your verification solution, you must consider what business capability is being added or modified. You must also consider what IT capabilities can be reused, and what capabilities must be added to create the solution. Also consider what training is needed for the people involved in the business process and the people that support the end users and staff of the solution. These articles aren't covered in this content. We recommend reviewing the [Microsoft Azure Well-Architected Framework](/azure/well-architected/) for information covering these articles.
3131

3232
## Components of the solution
3333

@@ -271,19 +271,19 @@ The following items provide areas to consider when planning for performance:
271271

272272
* Model based on throughput:
273273

274-
* VC verification capacity is subject to [Azure Key Vault service limits](../../key-vault/general/service-limits.md).
274+
* VC verification capacity is subject to [Azure Key Vault service limits](/azure/key-vault/general/service-limits).
275275

276276
* Each verification of a VC requires one Key Vault signature operation.
277277

278-
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](../../key-vault/general/overview-throttling.md) so that you understand how throttling might impact performance.
278+
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling) so that you understand how throttling might impact performance.
279279

280280
## Plan for reliability
281281

282282
To best plan for high availability and disaster recovery, we suggest the following items:
283283

284284
* Microsoft Entra Verified ID service is deployed in the West Europe, North Europe, West US 2, and West Central US, Australia and Japan Azure regions. Consider deploying your supporting web servers and supporting applications in one of those regions, specifically in the ones from which you expect most of your validation traffic to originate.
285285

286-
* Review and incorporate best practices from [Azure Key Vault availability and redundancy](../../key-vault/general/disaster-recovery-guidance.md) as you design for your availability and redundancy goals.
286+
* Review and incorporate best practices from [Azure Key Vault availability and redundancy](/azure/key-vault/general/disaster-recovery-guidance) as you design for your availability and redundancy goals.
287287

288288
## Plan for security
289289

@@ -295,7 +295,7 @@ As you're designing for security, consider the following:
295295

296296
* Only the Microsoft Entra Verified ID service and the website service principals should have permissions to use Key Vault to sign messages with the private key.
297297

298-
* Don't assign any human identity administrative permissions to the Key Vault. For more information on Key Vault best practices, see [Azure Security Baseline for Key Vault](../../key-vault/general/security-baseline.md).
298+
* Don't assign any human identity administrative permissions to the Key Vault. For more information on Key Vault best practices, see [Azure Security Baseline for Key Vault](/security/benchmark/azure/baselines/key-vault-security-baseline).
299299

300300
* Review [Securing Azure environments with Microsoft Entra ID](https://azure.microsoft.com/resources/securing-azure-environments-with-azure-active-directory/) for best practices for managing the supporting services for your solution.
301301

@@ -323,11 +323,11 @@ As part of your operational planning, consider monitoring the following:
323323

324324
* Monitor underlying dependencies used by the verification solution.
325325

326-
* Follow [Azure Key Vault monitoring and alerting](../../key-vault/general/alert.md).
326+
* Follow [Azure Key Vault monitoring and alerting](/azure/key-vault/general/alert).
327327

328328
* **For security**:
329329

330-
* Enable logging for Key Vault to track signing operations, and to monitor and alert on configuration changes. See [How to enable Key Vault logging](../../key-vault/general/howto-logging.md) for more information.
330+
* Enable logging for Key Vault to track signing operations, and to monitor and alert on configuration changes. Refer to [How to enable Key Vault logging](/azure/key-vault/general/howto-logging) for more information.
331331

332332
* Archive logs in a security information and event management (SIEM) systems, such as [Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel/) for long-term retention.
333333

0 commit comments

Comments
 (0)