Skip to content

Commit faddaf1

Browse files
authored
Merge pull request #116248 from v-maudel/patch-507
L223998: Escaping mock URLs
2 parents c7ba615 + 16250bf commit faddaf1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/b2b/redemption-experience.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ As an alternative to the invitation email, you can give a guest a direct link to
4141

4242
> [!IMPORTANT]
4343
> The direct link must be tenant-specific. In other words, it must include a tenant ID or verified domain so the guest can be authenticated in your tenant, where the shared app is located. A common URL like https://myapps.microsoft.com won’t work for a guest because it will redirect to their home tenant for authentication. Here are some examples of direct links with tenant context:
44-
> - Apps access panel: https://myapps.microsoft.com/?tenantid=<tenant id>
45-
> - Apps access panel for a verified domain: https://myapps.microsoft.com/<verified domain>
46-
> - Azure portal: https://portal.azure.com/<tenant id>
44+
> - Apps access panel: `https://myapps.microsoft.com/?tenantid=<tenant id>`
45+
> - Apps access panel for a verified domain: `https://myapps.microsoft.com/<;verified domain>`
46+
> - Azure portal: `https://portal.azure.com/<tenant id>`
4747
> - Individual app: see how to use a [direct sign-on link](../manage-apps/end-user-experiences.md#direct-sign-on-links)
4848
4949
There are some cases where the invitation email is recommended over a direct link. If these special cases are important to your organization, we recommend that you invite users by using methods that still send the invitation email:

0 commit comments

Comments
 (0)