Skip to content

Commit eb5c561

Browse files
authored
Merge pull request #202799 from RyanHill-MSFT/issues/94824-non-functioning-aad-link
(Azure CXP Community) fix broken link
2 parents fb68790 + fc30b1b commit eb5c561

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/marketplace/azure-app-managed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Indicate who should have management access to this managed application in each s
160160
Complete the following steps for Global Azure and Azure Government Cloud, as applicable.
161161

162162
1. In the **Azure Active Directory Tenant ID** box, enter the Azure AD Tenant ID (also known as directory ID) containing the identities of the users, groups, or applications you want to grant permissions to.
163-
1. In the **Principal ID** box, provide the Azure AD object ID of the user, group, or application that you want to be granted permission to the managed resource group. Identify the user by their Principal ID, which can be found at the [Azure Active Directory users blade](https://portal.azure.com/#blade/Microsoft_AAD_IAM/UsersManagementMenuBlade/AllUsers) on the Azure portal.
163+
1. In the **Principal ID** box, provide the Azure AD object ID of the user, group, or application that you want to be granted permission to the managed resource group. Identify the user by their Principal ID, which can be found at the [Azure Active Directory users blade](https://portal.azure.com/#view/Microsoft_AAD_UsersAndTenants/UserManagementMenuBlade/~/AllUsers) on the Azure portal.
164164
1. From the **Role definition** list, select an Azure AD built-in role. The role you select describes the permissions the principal will have on the resources in the customer subscription.
165165
1. To add another authorization, select the **Add authorization (max 100)** link, and repeat steps 1 through 3.
166166

0 commit comments

Comments
 (0)