Skip to content

Commit ee7a932

Browse files
committed
Fixed broken links
1 parent c358b2a commit ee7a932

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

articles/dns/security-baseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ In Azure DNS, there exists the DNS Zone Contributor role, as well as zone level
101101

102102
- [How to get members of a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrolemember?view=azureadps-2.0)
103103

104-
- [Understand Azure RBAC in Azure DNS](dns-protect-zones-recordsets.md#role-based-access-control)
104+
- [Understand Azure RBAC in Azure DNS](dns-protect-zones-recordsets.md#azure-role-based-access-control)
105105

106106
**Azure Security Center monitoring**: Yes
107107

@@ -265,7 +265,7 @@ In Azure DNS, there exists the DNS Zone Contributor role, as well as zone level
265265

266266
- [How to configure Azure RBAC](../role-based-access-control/role-assignments-portal.md)
267267

268-
- [Understand Azure RBAC in Azure DNS](dns-protect-zones-recordsets.md#role-based-access-control)
268+
- [Understand Azure RBAC in Azure DNS](dns-protect-zones-recordsets.md#azure-role-based-access-control)
269269

270270
- [Understand Azure RBAC in Azure Private DNS](dns-protect-private-zones-recordsets.md)
271271

articles/event-hubs/authenticate-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Azure provides the following Azure built-in roles for authorizing access to Even
2020
- [Azure Event Hubs Data Sender](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-sender): Use this role to give send access to Event Hubs resources.
2121
- [Azure Event Hubs Data Receiver](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-receiver): Use this role to give receiving access to Event Hubs resources.
2222

23-
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#role-based-access-control).
23+
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#azure-role-based-access-control).
2424

2525
> [!IMPORTANT]
2626
> Our preview release supported adding Event Hubs data access privileges to Owner or Contributor role. However, data access privileges for Owner and Contributor role are no longer honored. If you are using the Owner or Contributor role, switch to using the Azure Event Hubs Data Owner role.

articles/event-hubs/authorize-access-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Azure provides the following Azure built-in roles for authorizing access to Even
3434
| [Azure Event Hubs Data sender](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-sender) | Use this role to give the send access to Event Hubs resources. |
3535
| [Azure Event Hubs Data receiver](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-receiver) | Use this role to give the consuming/receiving access to Event Hubs resources. |
3636

37-
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#role-based-access-control).
37+
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#azure-role-based-access-control).
3838

3939
## Resource scope
4040
Before you assign an Azure role to a security principal, determine the scope of access that the security principal should have. Best practices dictate that it's always best to grant only the narrowest possible scope.

articles/event-hubs/troubleshoot-authentication-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ If you are using Azure Active Directory (Azure AD) to authenticate and authorize
1616
- [Azure Event Hubs Data sender](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-receiver) for the send access.
1717
- [Azure Event Hubs Data receiver](../role-based-access-control/built-in-roles.md#azure-event-hubs-data-sender) for the receive access.
1818

19-
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#role-based-access-control).
19+
For Schema Registry built-in roles, see [Schema Registry roles](schema-registry-overview.md#azure-role-based-access-control).
2020

2121
### Resource scopes
2222
- **Consumer group**: At this scope, role assignment applies only to this entity. Currently, the Azure portal doesn't support assigning an Azure role to a security principal at this level.

0 commit comments

Comments
 (0)