Skip to content

Commit f4b412c

Browse files
committed
Tweaks to sign in steps, fix duplicate alt text
1 parent 9af27ec commit f4b412c

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

articles/active-directory/roles/protected-actions-add.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,23 +31,23 @@ To add or remove protected actions, you must have:
3131

3232
Protected actions use a Conditional Access authentication context, so you must configure an authentication context and add it to a Conditional Access policy. If you already have a policy with an authentication context, you can skip to the next section.
3333

34-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) or [Azure portal](https://portal.azure.com).
34+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
3535

3636
1. Select **Azure Active Directory** > **Protect & secure** > **Conditional Access** > **Authentication context** > **Authentication context**.
3737

3838
1. Select **New authentication context** to open the **Add authentication context** pane.
3939

4040
1. Enter a name and description and then select **Save**.
4141

42-
:::image type="content" source="media/protected-actions-add/authentication-context-add.png" alt-text="Screenshot of New policy page to create a new policy with an authentication context." lightbox="media/protected-actions-add/authentication-context-add.png":::
42+
:::image type="content" source="media/protected-actions-add/authentication-context-add.png" alt-text="Screenshot of Add authentication context pane to add a new authentication context." lightbox="media/protected-actions-add/authentication-context-add.png":::
4343

4444
1. Select **Policies** > **New policy** to create a new policy.
4545

4646
1. Create a new policy and select your authentication context.
4747

4848
For more information, see [Conditional Access: Cloud apps, actions, and authentication context](../conditional-access/concept-conditional-access-cloud-apps.md).
4949

50-
:::image type="content" source="media/protected-actions-add/policy-authentication-context.png" alt-text="Screenshot of Add protected actions page in Roles and administrators." lightbox="media/protected-actions-add/policy-authentication-context.png":::
50+
:::image type="content" source="media/protected-actions-add/policy-authentication-context.png" alt-text="Screenshot of New policy page to create a new policy with an authentication context." lightbox="media/protected-actions-add/policy-authentication-context.png":::
5151

5252
## Add protected actions
5353

@@ -77,7 +77,7 @@ To add protection actions, assign a Conditional Access policy to one or more per
7777

7878
When a user performs a protected action, they'll need to satisfy Conditional Access policy requirements. This section shows the experience for a user being prompted to satisfy a policy. In this example, the user is required to authenticate with a FIDO security key before they can update Conditional Access policies.
7979

80-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
80+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a user that must satisfy the policy.
8181

8282
1. Select **Azure Active Directory** > **Protect & secure** > **Conditional Access**.
8383

@@ -105,8 +105,6 @@ When a user performs a protected action, they'll need to satisfy Conditional Acc
105105

106106
To remove protection actions, unassign Conditional Access policy requirements from a permission.
107107

108-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
109-
110108
1. Select **Azure Active Directory** > **Roles & admins** > **Protected actions (Preview)**.
111109

112110
1. Find and select the permission Conditional Access policy to unassign.

0 commit comments

Comments
 (0)