Skip to content

Commit f4e4303

Browse files
authored
Merge pull request #191138 from atikmapari/Broken-link-srbozovi
Broken link fixed
2 parents 429bbb0 + b9377a2 commit f4e4303

5 files changed

+12
-12
lines changed

articles/azure-sql/managed-instance/winauth-azuread-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.date: 03/01/2022
1919

2020
## Key capabilities and scenarios
2121

22-
As customers modernize their infrastructure, application, and data tiers, they also modernize their identity management capabilities by shifting to Azure AD. Azure SQL offers multiple [Azure AD Authentication](../database/authentication-aad-overview.md) options:
22+
As customers modernize their infrastructure, application, and data tiers, they also modernize their identity management capabilities by shifting to Azure AD. Azure SQL offers multiple [Azure AD Authentication](/azure/azure-sql/database/authentication-aad-overview) options:
2323

2424
- 'Azure Active Directory - Password' offers authentication with Azure AD credentials
2525
- 'Azure Active Directory - Universal with MFA' adds multi-factor authentication

articles/azure-sql/managed-instance/winauth-azuread-run-trace-managed-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To use Windows Authentication to connect to and run a trace against a managed in
2929
- To create or modify extended events sessions, ensure that your account has the [server permission](/sql/t-sql/statements/grant-server-permissions-transact-sql) of ALTER ANY EVENT SESSION on the managed instance.
3030
- To create or modify traces in SQL Server Profiler, ensure that your account has the [server permission](/sql/t-sql/statements/grant-server-permissions-transact-sql) of ALTER TRACE on the managed instance.
3131

32-
If you have not yet enabled Windows authentication for Azure AD principals against your managed instance, you may run a trace against a managed instance using an [Azure AD Authentication](../database/authentication-aad-overview.md) option, including:
32+
If you have not yet enabled Windows authentication for Azure AD principals against your managed instance, you may run a trace against a managed instance using an [Azure AD Authentication](/azure/azure-sql/database/authentication-aad-overview) option, including:
3333

3434
- 'Azure Active Directory - Password'
3535
- 'Azure Active Directory - Universal with MFA'

articles/azure-sql/managed-instance/winauth-azuread-setup-incoming-trust-based-flow.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To implement the incoming trust-based authentication flow, first ensure that the
3333
|Prerequisite |Description |
3434
|---------|---------|
3535
|Client must run Windows 10, Windows Server 2012, or a higher version of Windows. | |
36-
|Clients must be joined to AD. The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to AD by running the [dsregcmd command](../../active-directory/devices/troubleshoot-device-dsregcmd.md): `dsregcmd.exe /status` |
36+
|Clients must be joined to AD. The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to AD by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
3737
|Azure AD Hybrid Authentication Management Module. | This PowerShell module provides management features for on-premises setup. |
3838
|Azure tenant. | |
3939
|Azure subscription under the same Azure AD tenant you plan to use for authentication.| |
@@ -114,7 +114,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
114114
- Enter the password for your Azure AD global administrator account.
115115
- If your organization uses other modern authentication methods such as MFA (Azure Multi-Factor Authentication) or Smart Card, follow the instructions as requested for sign in.
116116
117-
If this is the first time you're configuring Azure AD Kerberos settings, the [Get-AzureAdKerberosServer cmdlet](/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#view-and-verify-the-azure-ad-kerberos-server) will display empty information, as in the following sample output:
117+
If this is the first time you're configuring Azure AD Kerberos settings, the [Get-AzureAdKerberosServer cmdlet](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#view-and-verify-the-azure-ad-kerberos-server) will display empty information, as in the following sample output:
118118
119119
```
120120
ID :
@@ -154,7 +154,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
154154
155155
1. Add the Trusted Domain Object.
156156
157-
Run the [Set-AzureAdKerberosServer PowerShell cmdlet](/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#create-a-kerberos-server-object) to add the Trusted Domain Object. Be sure to include `-SetupCloudTrust` parameter. If there is no Azure AD service account, this command will create a new Azure AD service account. If there is an Azure AD service account already, this command will only create the requested Trusted Domain object.
157+
Run the [Set-AzureAdKerberosServer PowerShell cmdlet](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#create-a-kerberos-server-object) to add the Trusted Domain Object. Be sure to include `-SetupCloudTrust` parameter. If there is no Azure AD service account, this command will create a new Azure AD service account. If there is an Azure AD service account already, this command will only create the requested Trusted Domain object.
158158
159159
```powershell
160160
Set-AzureAdKerberosServer -Domain $domain `
@@ -184,7 +184,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
184184
185185
## Configure the Group Policy Object (GPO)
186186
187-
1. Identify your [Azure AD tenant ID](../../active-directory/fundamentals/active-directory-how-to-find-tenant.md).
187+
1. Identify your [Azure AD tenant ID](/azure/active-directory/fundamentals/active-directory-how-to-find-tenant).
188188
189189
1. Deploy the following Group Policy setting to client machines using the incoming trust-based flow:
190190
@@ -253,4 +253,4 @@ Learn more about implementing Windows Authentication for Azure AD principals on
253253

254254
- [Configure Azure SQL Managed Instance for Windows Authentication for Azure Active Directory (Preview)](winauth-azuread-kerberos-managed-instance.md)
255255
- [What is Windows Authentication for Azure Active Directory principals on Azure SQL Managed Instance? (Preview)](winauth-azuread-overview.md)
256-
- [How to set up Windows Authentication for Azure SQL Managed Instance using Azure Active Directory and Kerberos (Preview)](winauth-azuread-setup.md)
256+
- [How to set up Windows Authentication for Azure SQL Managed Instance using Azure Active Directory and Kerberos (Preview)](winauth-azuread-setup.md)

articles/azure-sql/managed-instance/winauth-azuread-setup-modern-interactive-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ There is no AD to Azure AD set up required for enabling software running on Azur
2828
|Prerequisite |Description |
2929
|---------|---------|
3030
|Clients must run Windows 10 20H1, Windows Server 2022, or a higher version of Windows. | |
31-
|Clients must be joined to Azure AD or Hybrid Azure AD. | You can determine if this prerequisite is met by running the [dsregcmd command](../../active-directory/devices/troubleshoot-device-dsregcmd.md): `dsregcmd.exe /status` |
31+
|Clients must be joined to Azure AD or Hybrid Azure AD. | You can determine if this prerequisite is met by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
3232
|Application must connect to the managed instance via an interactive session. | This supports applications such as SQL Server Management Studio (SSMS) and web applications, but won't work for applications that run as a service. |
3333
|Azure AD tenant. | |
3434
|Azure AD Connect installed. | Hybrid environments where identities exist both in Azure AD and AD. |
@@ -68,4 +68,4 @@ Learn more about implementing Windows Authentication for Azure AD principals on
6868
- [How Windows Authentication for Azure SQL Managed Instance is implemented with Azure Active Directory and Kerberos (Preview)](winauth-implementation-aad-kerberos.md)
6969
- [How to set up Windows Authentication for Azure AD with the incoming trust-based flow (Preview)](winauth-azuread-setup-incoming-trust-based-flow.md)
7070
- [Configure Azure SQL Managed Instance for Windows Authentication for Azure Active Directory (Preview)](winauth-azuread-kerberos-managed-instance.md)
71-
- [Troubleshoot Windows Authentication for Azure AD principals on Azure SQL Managed Instance](winauth-azuread-troubleshoot.md)
71+
- [Troubleshoot Windows Authentication for Azure AD principals on Azure SQL Managed Instance](winauth-azuread-troubleshoot.md)

articles/azure-sql/managed-instance/winauth-azuread-setup.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Following this, a system administrator configures authentication flows. Two auth
3535

3636
### Synchronize AD with Azure AD
3737

38-
Customers should first implement [Azure AD Connect](../../active-directory/hybrid/whatis-azure-ad-connect.md) to integrate on-premises directories with Azure AD.
38+
Customers should first implement [Azure AD Connect](/azure/active-directory/hybrid/whatis-azure-ad-connect) to integrate on-premises directories with Azure AD.
3939

4040
### Select which authentication flow(s) you will implement
4141

@@ -56,7 +56,7 @@ The following prerequisites are required to implement the modern interactive aut
5656
|Prerequisite |Description |
5757
|---------|---------|
5858
|Clients must run Windows 10 20H1, Windows Server 2022, or a higher version of Windows. | |
59-
|Clients must be joined to Azure AD or Hybrid Azure AD. | You can determine if this prerequisite is met by running the [dsregcmd command](../../active-directory/devices/troubleshoot-device-dsregcmd.md): `dsregcmd.exe /status` |
59+
|Clients must be joined to Azure AD or Hybrid Azure AD. | You can determine if this prerequisite is met by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
6060
|Application must connect to the managed instance via an interactive session. | This supports applications such as SQL Server Management Studio (SSMS) and web applications, but won't work for applications that run as a service. |
6161
|Azure AD tenant. | |
6262
|Azure AD Connect installed. | Hybrid environments where identities exist both in Azure AD and AD. |
@@ -71,7 +71,7 @@ The following prerequisites are required to implement the incoming trust-based a
7171
|Prerequisite |Description |
7272
|---------|---------|
7373
|Client must run Windows 10, Windows Server 2012, or a higher version of Windows. | |
74-
|Clients must be joined to AD. The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to AD by running the [dsregcmd command](../../active-directory/devices/troubleshoot-device-dsregcmd.md): `dsregcmd.exe /status` |
74+
|Clients must be joined to AD. The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to AD by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
7575
|Azure AD Hybrid Authentication Management Module. | This PowerShell module provides management features for on-premises setup. |
7676
|Azure tenant. | |
7777
|Azure subscription under the same Azure AD tenant you plan to use for authentication.| |

0 commit comments

Comments
 (0)