Skip to content

Commit e30bc6d

Browse files
authored
Merge pull request #250988 from rwestMSFT/rw-0911-fix-markdown-links
[SCOPED] Fix malformed Markdown links
2 parents 4d2686b + 870e01d commit e30bc6d

File tree

95 files changed

+168
-180
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+168
-180
lines changed

articles/active-directory-b2c/partner-cloudflare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ After a custom domain for Azure AD B2C is configured using Azure Front Door, [te
4242

4343
## Create a Cloudflare account
4444

45-
On cloudflare.com, you can [create an account](https://dash.cloudflare.com/sign-up). To enable WAF, on [Application Services]([https://www.cloudflare.com/plans/](https://www.cloudflare.com/plans/#price-matrix) select **Pro**, which is required.
45+
On cloudflare.com, you can [create an account](https://dash.cloudflare.com/sign-up). To enable WAF, on [Application Services](https://www.cloudflare.com/plans/#price-matrix), select **Pro**, which is required.
4646

4747
### Configure DNS
4848

articles/active-directory/app-provisioning/insufficient-access-rights-error-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Reference articles that explain the reason in detail:
7575

7676
If option 1 is not feasible and doesn't work as expected, then ask Cx to check with their AD admin and security administrators, if they are allowed to modify the default permissions of the ```AdminSDHolder``` container. This [article](https://go.microsoft.com/fwlink/?linkid=2240198) that explains the importance of the ```AdminSDHolder``` container. Once Cx gets internal approval to update the ```AdminSDHolder``` container permissions, there are two ways to update the permissions.
7777

78-
* Using ```ADSIEdit``` as described in this [article](https://petri.com/active-directory-security-understanding-adminsdholder-object ).
78+
* Using ```ADSIEdit``` as described in this [article](https://petri.com/active-directory-security-understanding-adminsdholder-object).
7979
* Using ```DSACLS``` command-line script. Here's an example script that could be used as a starting point and Cx can tweak it as per their requirements.
8080

8181
```powershell

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ The **core** user schema only requires three attributes (all other attributes ar
5353
- `userName`, a unique identifier for the user (generally maps to the Azure AD user principal name)
5454
- `meta`, *read-only* metadata maintained by the service provider
5555

56-
In addition to the **core** user schema, the SCIM standard defines an **enterprise** user extension with a model for extending the user schema to meet your applications needs.
56+
In addition to the **core** user schema, the SCIM standard defines an **enterprise** user extension with a model for extending the user schema to meet your application's needs.
5757

58-
For example, if your application requires both a user's email and users manager, use the **core** schema to collect the users email and the **enterprise** user schema to collect the users manager.
58+
For example, if your application requires both a user's email and user's manager, use the **core** schema to collect the user's email and the **enterprise** user schema to collect the user's manager.
5959

6060
To design your schema, follow these steps:
6161

@@ -72,7 +72,7 @@ The following table lists an example of required attributes:
7272
|loginName|userName|userPrincipalName|
7373
|firstName|name.givenName|givenName|
7474
|lastName|name.familyName|surName|
75-
|workMail|emails[type eq work].value|Mail|
75+
|workMail|emails[type eq "work"].value|Mail|
7676
|manager|manager|manager|
7777
|tag|`urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag`|extensionAttribute1|
7878
|status|active|isSoftDeleted (computed value not stored on user)|
@@ -933,7 +933,7 @@ The open source .NET Core [reference code example](https://aka.ms/SCIMReferenceC
933933
934934
The solution is composed of two projects, _Microsoft.SCIM_ and _Microsoft.SCIM.WebHostSample_.
935935

936-
The _Microsoft.SCIM_ project is the library that defines the components of the web service that conforms to the SCIM specification. It declares the interface _Microsoft.SCIM.IProvider_, requests are translated into calls to the providers methods, which would be programmed to operate on an identity store.
936+
The _Microsoft.SCIM_ project is the library that defines the components of the web service that conforms to the SCIM specification. It declares the interface _Microsoft.SCIM.IProvider_, requests are translated into calls to the provider's methods, which would be programmed to operate on an identity store.
937937

938938
![Breakdown: A request translated into calls to the provider's methods](media/use-scim-to-provision-users-and-groups/scim-figure-3.png)
939939

@@ -992,7 +992,7 @@ Requests from Azure AD Provisioning Service include an OAuth 2.0 bearer token. A
992992

993993

994994

995-
In the sample code, requests are authenticated using the Microsoft.AspNetCore.Authentication.JwtBearer package. The following code enforces that requests to any of the services endpoints are authenticated using the bearer token issued by Azure AD for a specified tenant:
995+
In the sample code, requests are authenticated using the Microsoft.AspNetCore.Authentication.JwtBearer package. The following code enforces that requests to any of the service's endpoints are authenticated using the bearer token issued by Azure AD for a specified tenant:
996996

997997
```csharp
998998
public void ConfigureServices(IServiceCollection services)
@@ -1031,7 +1031,7 @@ A bearer token is also required to use of the provided [Postman tests](https://g
10311031

10321032
For more information on multiple environments in ASP.NET Core, see [Use multiple environments in ASP.NET Core](/aspnet/core/fundamentals/environments).
10331033

1034-
The following code enforces that requests to any of the services endpoints are authenticated using a bearer token signed with a custom key:
1034+
The following code enforces that requests to any of the service's endpoints are authenticated using a bearer token signed with a custom key:
10351035

10361036
```csharp
10371037
public void ConfigureServices(IServiceCollection services)
@@ -1105,7 +1105,7 @@ GET https://.../scim/Users?filter=externalId eq jyoung HTTP/1.1
11051105
Authorization: Bearer ...
11061106
```
11071107

1108-
In the sample code, the request is translated into a call to the QueryAsync method of the services provider. Here's the signature of that method:
1108+
In the sample code, the request is translated into a call to the QueryAsync method of the service's provider. Here's the signature of that method:
11091109

11101110
```csharp
11111111
// System.Threading.Tasks.Tasks is defined in mscorlib.dll.
@@ -1161,7 +1161,7 @@ Content-type: application/scim+json
11611161
"manager":null}
11621162
```
11631163

1164-
In the sample code, the request is translated into a call to the CreateAsync method of the services provider. Here's the signature of that method:
1164+
In the sample code, the request is translated into a call to the CreateAsync method of the service's provider. Here's the signature of that method:
11651165

11661166
```csharp
11671167
// System.Threading.Tasks.Tasks is defined in mscorlib.dll.
@@ -1184,7 +1184,7 @@ GET ~/scim/Users/54D382A4-2050-4C03-94D1-E769F1D15682 HTTP/1.1
11841184
Authorization: Bearer ...
11851185
```
11861186

1187-
In the sample code, the request is translated into a call to the RetrieveAsync method of the services provider. Here's the signature of that method:
1187+
In the sample code, the request is translated into a call to the RetrieveAsync method of the service's provider. Here's the signature of that method:
11881188

11891189
```csharp
11901190
// System.Threading.Tasks.Tasks is defined in mscorlib.dll.
@@ -1205,7 +1205,7 @@ In the example of a request, to retrieve the current state of a user, the values
12051205
***Example 4. Query the value of a reference attribute to be updated***
12061206

12071207
Azure AD checks the current attribute value in the identity store before updating it. However, only the manager attribute is the checked first for users. Here's an example of a request to determine whether the manager attribute of a user object currently has a certain value:
1208-
In the sample code, the request is translated into a call to the QueryAsync method of the services provider. The value of the properties of the object provided as the value of the parameters argument are as follows:
1208+
In the sample code, the request is translated into a call to the QueryAsync method of the service's provider. The value of the properties of the object provided as the value of the parameters argument are as follows:
12091209

12101210
* parameters.AlternateFilters.Count: 2
12111211
* parameters.AlternateFilters.ElementAt(x).AttributePath: "ID"
@@ -1243,7 +1243,7 @@ Content-type: application/scim+json
12431243
"value":"2819c223-7f76-453a-919d-413861904646"}]}]}
12441244
```
12451245

1246-
In the sample code, the request is translated into a call to the UpdateAsync method of the services provider. Here's the signature of that method:
1246+
In the sample code, the request is translated into a call to the UpdateAsync method of the service's provider. Here's the signature of that method:
12471247

12481248
```csharp
12491249
// System.Threading.Tasks.Tasks and
@@ -1278,7 +1278,7 @@ DELETE ~/scim/Users/54D382A4-2050-4C03-94D1-E769F1D15682 HTTP/1.1
12781278
Authorization: Bearer ...
12791279
```
12801280

1281-
In the sample code, the request is translated into a call to the DeleteAsync method of the services provider. Here's the signature of that method:
1281+
In the sample code, the request is translated into a call to the DeleteAsync method of the service's provider. Here's the signature of that method:
12821282

12831283
```csharp
12841284
// System.Threading.Tasks.Tasks is defined in mscorlib.dll.
@@ -1434,8 +1434,7 @@ To help drive awareness and demand of our joint integration, we recommend you up
14341434
> * Craft a blog post or press release that describes the joint integration, the benefits and how to get started. [Example: Imprivata and Azure AD Press Release](https://www.imprivata.com/company/press/imprivata-introduces-iam-cloud-platform-healthcare-supported-microsoft)
14351435
> * Leverage your social media like Twitter, Facebook or LinkedIn to promote the integration to your customers. Be sure to include @AzureAD so we can retweet your post. [Example: Imprivata Twitter Post](https://twitter.com/azuread/status/1123964502909779968)
14361436
> * Create or update your marketing pages/website (e.g. integration page, partner page, pricing page, etc.) to include the availability of the joint integration. [Example: Pingboard integration Page](https://pingboard.com/org-chart-for), [Smartsheet integration page](https://www.smartsheet.com/marketplace/apps/microsoft-azure-ad), [Monday.com pricing page](https://monday.com/pricing/)
1437-
> * Create a help center article or technical documentation on how customers can get started. [Example: Envoy + Microsoft Azure AD integration.](https://envoy.help/en/articles/3453335-microsoft-azure-active-directory-integration/
1438-
)
1437+
> * Create a help center article or technical documentation on how customers can get started. [Example: Envoy + Microsoft Azure AD integration.](https://envoy.help/en/articles/3453335-microsoft-azure-active-directory-integration/)
14391438
> * Alert customers of the new integration through your customer communication (monthly newsletters, email campaigns, product release notes).
14401439

14411440
## Next steps

articles/active-directory/architecture/2-secure-access-current-state.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Investigate access to your sensitive apps for awareness about external access. S
8585
If your email and network plans are enabled, you can investigate content sharing through email or unauthorized software as a service (SaaS) apps.
8686

8787
* Identify, prevent, and monitor accidental sharing
88-
* [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide&preserve-view=true )
88+
* [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide&preserve-view=true)
8989
* Identify unauthorized apps
9090
* [Microsoft Defender for Cloud Apps overview](/defender-cloud-apps/what-is-defender-for-cloud-apps)
9191

articles/active-directory/architecture/6-secure-access-entitlement-managment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -102,11 +102,11 @@ Learn more: [Plan a Microsoft Entra access reviews deployment](../governance/dep
102102

103103
## Using entitlement management automation
104104

105-
* [Working with the Azure AD entitlement management API](/graph/api/resources/entitlementmanagement-overview?view=graph-rest-1.0&preserve-view=true )
106-
* [accessPackage resource type](/graph/api/resources/accesspackage?view=graph-rest-1.0&preserve-view=true )
107-
* [Azure AD access reviews](/graph/api/resources/accessreviewsv2-overview?view=graph-rest-1.0&preserve-view=true )
108-
* [connectedOrganization resource type](/graph/api/resources/connectedorganization?view=graph-rest-1.0&preserve-view=true )
109-
* [entitlementManagementSettings resource type](/graph/api/resources/entitlementmanagementsettings?view=graph-rest-1.0&preserve-view=true )
105+
* [Working with the Azure AD entitlement management API](/graph/api/resources/entitlementmanagement-overview?view=graph-rest-1.0&preserve-view=true)
106+
* [accessPackage resource type](/graph/api/resources/accesspackage?view=graph-rest-1.0&preserve-view=true)
107+
* [Azure AD access reviews](/graph/api/resources/accessreviewsv2-overview?view=graph-rest-1.0&preserve-view=true)
108+
* [connectedOrganization resource type](/graph/api/resources/connectedorganization?view=graph-rest-1.0&preserve-view=true)
109+
* [entitlementManagementSettings resource type](/graph/api/resources/entitlementmanagementsettings?view=graph-rest-1.0&preserve-view=true)
110110

111111
## External access governance recommendations
112112

articles/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-with-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ This section covers final steps before migrating user MFA settings.
175175

176176
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
177177

178-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true ).
178+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
179179

180180
>[!NOTE]
181181
> The **federatedIdpMfaBehavior** setting is a new version of the **SupportsMfa** property of the [New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration) cmdlet.

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp-calls-graph.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ ms.custom: devx-track-csharp, aaddev, "scenarios:getting-started", "languages:as
6262
>
6363
> ### How the sample works
6464
>
65-
> ![Shows how the sample app generated by this quickstart works](./configure-app-multi-instancing.md aspnetcorewebapp-intro.svg)
65+
> :::image type="content" source="media/quickstart-v2-aspnet-core-webapp/aspnetcorewebapp-intro.svg" alt-text="Diagram that how the sample app generated by this quickstart works.":::
6666
>
6767
> ### Startup class
6868
>

articles/active-directory/enterprise-users/signin-account-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can tell if the sign-in page your organization uses supports Microsoft accou
2727

2828
![Difference between account sign-in pages](./media/signin-account-support/ui-prompt.png)
2929

30-
[Additional sign-in options work only for personal Microsoft accounts](https://azure.microsoft.com/updates/microsoft-account-signin-options/ ) but can't be used for signing in to work or school account resources.
30+
[Additional sign-in options work only for personal Microsoft accounts](https://azure.microsoft.com/updates/microsoft-account-signin-options/) but can't be used for signing in to work or school account resources.
3131

3232
## Next steps
3333

articles/active-directory/external-identities/direct-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@ To remove a configuration for an IdP in the Microsoft Entra admin center:
286286

287287
1. Select **OK** to confirm deletion.
288288

289-
You can also remove federation using the Microsoft Graph API [samlOrWsFedExternalDomainFederation](/graph/api/resources/samlorwsfedexternaldomainfederation?view=graph-rest-beta&preserve-view=true ) resource type.
289+
You can also remove federation using the Microsoft Graph API [samlOrWsFedExternalDomainFederation](/graph/api/resources/samlorwsfedexternaldomainfederation?view=graph-rest-beta&preserve-view=true) resource type.
290290

291291
## Next steps
292292

articles/active-directory/fundamentals/faq.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,7 @@ sections:
2828
- question: |
2929
Why do I get "No subscriptions found" when I try to access Azure AD in the Azure portal?
3030
answer: |
31-
To access the Azure portal, each user needs permissions with an Azure subscription. If you don't have a paid Microsoft 365 or Azure AD subscription, you will need to activate a free [Azure account](https://azure.microsoft.com/free/
32-
) or a paid subscription.
31+
To access the Azure portal, each user needs permissions with an Azure subscription. If you don't have a paid Microsoft 365 or Azure AD subscription, you will need to activate a free [Azure account](https://azure.microsoft.com/free/) or a paid subscription.
3332
3433
For more information, see:
3534

0 commit comments

Comments
 (0)