Skip to content

Commit f3b7f1f

Browse files
Merge pull request #226065 from b-branco/docs-editor/enable-azure-active-directory-1675351978
Fix link
2 parents 03779b6 + a3c243d commit f3b7f1f

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/private-5g-core/enable-azure-active-directory.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this how-to guide, you'll carry out the steps you need to complete after depl
2121
- You must have completed the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md) and [Collect the required information for a site](collect-required-information-for-a-site.md).
2222
- You must have deployed a site with Azure Active Directory set as the authentication type.
2323
- Identify the IP address for accessing the local monitoring tools that you set up in [Management network](complete-private-mobile-network-prerequisites.md#management-network).
24-
- Ensure you can sign in to the Azure portal using an account with access to the active subscription you used to create your private mobile network. This account must have permission to manage applications in Azure AD. [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference.md#application-developer) that have the required permissions include, for example, Application administrator, Application developer, and Cloud application administrator.
24+
- Ensure you can sign in to the Azure portal using an account with access to the active subscription you used to create your private mobile network. This account must have permission to manage applications in Azure AD. [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference) that have the required permissions include, for example, Application administrator, Application developer, and Cloud application administrator.
2525
- Ensure your local machine has core kubectl access to the Azure Arc-enabled Kubernetes cluster. This requires a core kubeconfig file, which you can obtain by following [Set up kubectl access](commission-cluster.md#set-up-kubectl-access).
2626

2727
## Configure domain system name (DNS) for local monitoring IP
@@ -149,3 +149,4 @@ Follow this step if you need to update your existing Kubernetes Secret Objects;
149149
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows.
150150

151151
- [Learn more about designing the policy control configuration for your private mobile network](policy-control.md)
152+

0 commit comments

Comments
 (0)