Skip to content

Commit fc30b1b

Browse files
author
Ryan Hill
committed
(Azure CXP Community) fix broken link
fixes MicrosoftDocs/azure-docs#94824
1 parent 315e141 commit fc30b1b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/marketplace/azure-app-managed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Indicate who should have management access to this managed application in each s
160160
Complete the following steps for Global Azure and Azure Government Cloud, as applicable.
161161

162162
1. In the **Azure Active Directory Tenant ID** box, enter the Azure AD Tenant ID (also known as directory ID) containing the identities of the users, groups, or applications you want to grant permissions to.
163-
1. In the **Principal ID** box, provide the Azure AD object ID of the user, group, or application that you want to be granted permission to the managed resource group. Identify the user by their Principal ID, which can be found at the [Azure Active Directory users blade](https://portal.azure.com/#blade/Microsoft_AAD_IAM/UsersManagementMenuBlade/AllUsers) on the Azure portal.
163+
1. In the **Principal ID** box, provide the Azure AD object ID of the user, group, or application that you want to be granted permission to the managed resource group. Identify the user by their Principal ID, which can be found at the [Azure Active Directory users blade](https://portal.azure.com/#view/Microsoft_AAD_UsersAndTenants/UserManagementMenuBlade/~/AllUsers) on the Azure portal.
164164
1. From the **Role definition** list, select an Azure AD built-in role. The role you select describes the permissions the principal will have on the resources in the customer subscription.
165165
1. To add another authorization, select the **Add authorization (max 100)** link, and repeat steps 1 through 3.
166166

0 commit comments

Comments
 (0)