You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/fundamentals/custom-security-attributes-add.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ To add or deactivate custom security attributes, you must have:
35
35
36
36
An attribute set is a collection of related attributes. All custom security attributes must be part of an attribute set. Attribute sets cannot be renamed or deleted.
37
37
38
-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
38
+
1. Sign in to the [Azure portal](https://portal.azure.com).
39
39
40
40
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
41
41
@@ -55,7 +55,7 @@ An attribute set is a collection of related attributes. All custom security attr
55
55
56
56
## Add a custom security attribute
57
57
58
-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
58
+
1. Sign in to the [Azure portal](https://portal.azure.com).
59
59
60
60
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
61
61
@@ -110,7 +110,7 @@ An attribute set is a collection of related attributes. All custom security attr
110
110
111
111
Once you add a new custom security attribute, you can later edit some of the properties. Some properties are immutable and cannot be changed.
112
112
113
-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
113
+
1. Sign in to the [Azure portal](https://portal.azure.com).
114
114
115
115
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
116
116
@@ -128,7 +128,7 @@ Once you add a new custom security attribute, you can later edit some of the pro
128
128
129
129
Once you add a custom security attribute, you can't delete it. However, you can deactivate a custom security attribute.
130
130
131
-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
131
+
1. Sign in to the [Azure portal](https://portal.azure.com).
132
132
133
133
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
Copy file name to clipboardexpand all lines: docs/fundamentals/whats-new-archive.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -9427,7 +9427,7 @@ For more information, see [My Apps Secure Sign-in Extension](https://support.mic
9427
9427
**Service category:** Azure AD
9428
9428
**Product capability:** Directory
9429
9429
9430
-
As of January 8, 2018, the Azure AD administration experience in the Azure classic portal has been retired. This took place in conjunction with the retirement of the Azure classic portal itself. In the future, you should use the [Azure AD admin center](https://aad.portal.azure.com) for all your portal-based administration of Azure AD.
9430
+
As of January 8, 2018, the Azure AD administration experience in the Azure classic portal has been retired. This took place in conjunction with the retirement of the Azure classic portal itself. In the future, you should use the [Azure portal](https://portal.azure.com) for all your portal-based administration of Azure AD.
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/groups-approval-workflow.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Follow the steps in this article to approve or deny requests for group membershi
26
26
27
27
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view pending requests in Privileged Identity Management.
28
28
29
-
1.[Sign in to Azure AD portal](https://aad.portal.azure.com).
29
+
1.[Sign in to the Azure portal](https://portal.azure.com).
30
30
31
31
1. Select **Azure AD Privileged Identity Management -> Approve requests -> Groups (Preview)**.
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/groups-assign-member-owner.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ When a membership or ownership is assigned, the assignment:
33
33
34
34
Follow these steps to make a user eligible member or owner of a group. You will need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group.
35
35
36
-
1.[Sign in to Azure AD](https://aad.portal.azure.com).
36
+
1.[Sign in to the Azure portal](https://portal.azure.com).
37
37
38
38
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
39
39
@@ -73,7 +73,7 @@ Follow these steps to make a user eligible member or owner of a group. You will
73
73
74
74
Follow these steps to update or remove an existing role assignment. You will need to have Global Administrator, Privileged Role Administrator role, or Owner role of the group.
75
75
76
-
1.[Sign in to Azure AD](https://aad.portal.azure.com) with appropriate role permissions.
76
+
1.[Sign in to the Azure portal](https://portal.azure.com) with appropriate role permissions.
77
77
78
78
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/groups-discover-groups.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Dynamic groups and groups synchronized from on-premises environment cannot be ma
29
29
You should either be a group Owner, have Global Administrator role, or Privileged Role Administrator role to bring the group under management with PIM.
30
30
31
31
32
-
1.[Sign in to Azure AD](https://aad.portal.azure.com).
32
+
1.[Sign in to the Azure portal](https://portal.azure.com).
33
33
34
34
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/pim-how-to-add-role-to-user.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ Follow these steps to make a user eligible for an Azure AD admin role.
74
74
75
75
For certain roles, the scope of the granted permissions can be restricted to a single admin unit, service principal, or application. This procedure is an example if assigning a role that has the scope of an administrative unit. For a list of roles that support scope via administrative unit, see [Assign scoped roles to an administrative unit](../roles/admin-units-assign-roles.md). This feature is currently being rolled out to Azure AD organizations.
76
76
77
-
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with Privileged Role Administrator permissions.
77
+
1. Sign in to the [Azure portal](https://portal.azure.com) with Privileged Role Administrator permissions.
78
78
79
79
1. Select **Azure Active Directory** > **Roles and administrators**.
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/pim-how-to-change-default-settings.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ PIM role settings are also known as “PIM Policies”.
28
28
29
29
Follow these steps to open the settings for an Azure AD role.
30
30
31
-
1.[Sign in to Azure AD](https://aad.portal.azure.com/)
31
+
1.[Sign in to the Azure portal](https://portal.azure.com/)
32
32
33
33
1. Select **Azure AD Privileged Identity Management -> Azure AD Roles -> Roles**. On this page you can see list of Azure AD roles available in the tenant, including built-in and custom roles.
34
34
:::image type="content" source="media/pim-how-to-change-default-settings/role-settings.png" alt-text="Screenshot of the list of Azure AD roles available in the tenant, including built-in and custom roles." lightbox="media/pim-how-to-change-default-settings/role-settings.png":::
Copy file name to clipboardexpand all lines: docs/id-governance/privileged-identity-management/pim-resource-roles-configure-role-settings.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ PIM role settings are also known as “PIM Policies”.
28
28
29
29
Follow these steps to open the settings for an Azure resource role.
30
30
31
-
1.[Sign in to Azure AD](https://aad.portal.azure.com/)
31
+
1.[Sign in to the Azure portal](https://portal.azure.com/)
32
32
33
33
1. Select **Azure AD Privileged Identity Management -> Azure Resources**. On this page you can see list of Azure resources discovered in PIM. Use Resource type filter to select all required resource types.
Copy file name to clipboardexpand all lines: docs/identity-platform/troubleshoot-publisher-verification.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -35,8 +35,8 @@ Below are some common issues that may occur during the process.
35
35
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
36
36
37
37
-**I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
38
-
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant.
39
-
2. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
38
+
1. Sign in to the [Azure portal](https://portal.azure.com) using a user account in your organization's primary tenant.
39
+
1. Browse to **Azure Active Directory** > [Roles and administrators](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
40
40
3. Select the desired admin role.
41
41
4. The list of users assigned that role will be displayed.
Copy file name to clipboardexpand all lines: docs/identity/app-provisioning/configure-automatic-user-provisioning-portal.md
+3-2
Original file line number
Diff line number
Diff line change
@@ -24,8 +24,9 @@ This article describes the general steps for managing automatic user account pro
24
24
25
25
Use the Azure Active Directory portal to view and manage all applications that are configured for single sign-on in a directory. Enterprise apps are apps that are deployed and used within your organization. Follow these steps to view and manage your enterprise applications:
26
26
27
-
1. Open the [Azure Active Directory portal](https://aad.portal.azure.com).
28
-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
27
+
1. Open the [Azure portal](https://portal.azure.com).
28
+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
29
+
1. A list of all configured apps is shown, including apps that were added from the gallery.
29
30
1. Select any app to load its resource pane, where you can view reports and manage app settings.
30
31
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
Copy file name to clipboardexpand all lines: docs/identity/app-provisioning/customize-application-attributes.md
+4-3
Original file line number
Diff line number
Diff line change
@@ -29,8 +29,9 @@ You can customize the default attribute-mappings according to your business need
29
29
30
30
Follow these steps to access the **Mappings** feature of user provisioning:
31
31
32
-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com).
33
-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
32
+
1. Sign in to the [Azure portal](https://portal.azure.com).
33
+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
34
+
1. A list of all configured apps is shown, including apps that were added from the gallery.
34
35
1. Select any app to load its app management pane, where you can view reports and manage app settings.
35
36
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
36
37
1. Expand **Mappings** to view and edit the user attributes that flow between Azure AD and the target application. If the target application supports it, this section lets you optionally configure provisioning of groups and user accounts.
@@ -142,7 +143,7 @@ When you are editing the list of supported attributes, the following properties
142
143
143
144
#### Provisioning a custom extension attribute to a SCIM compliant application
144
145
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:
145
-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146
+
1. Sign in to the [Azure portal](https://portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146
147
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
147
148
3. At the bottom of the page, select **Show advanced options**.
Copy file name to clipboardexpand all lines: docs/identity/app-provisioning/use-scim-to-provision-users-and-groups.md
+4-5
Original file line number
Diff line number
Diff line change
@@ -1308,8 +1308,9 @@ Applications that support the SCIM profile described in this article can be conn
1308
1308
1309
1309
**ToconnectanapplicationthatsupportsSCIM:**
1310
1310
1311
-
1. Signintothe [AzureADportal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1. Signintothe [Azureportal](https://portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1. Enteranameforyourapplication, choosetheoption"*integrate any other application you don't find in the gallery*"andselect**Add**tocreateanappobject. Thenewappisaddedtothelistofenterpriseapplicationsandopenstoitsappmanagementscreen.
1315
1316
@@ -1397,9 +1398,7 @@ The provisioning service supports the [authorization code grant](https://tools.i
Copy file name to clipboardexpand all lines: docs/identity/app-proxy/application-proxy-configure-native-client-application.md
+2-3
Original file line number
Diff line number
Diff line change
@@ -33,9 +33,8 @@ Publish your proxy application as you would any other application and assign use
33
33
34
34
You now need to register your application in Azure AD, as follows:
35
35
36
-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Dashboard** for the **Azure Active Directory admin center** appears.
37
-
1. In the sidebar, select **Azure Active Directory**. The **Azure Active Directory** overview page appears.
38
-
1. In the Azure AD overview sidebar, select **App registrations**. The list of all app registrations appears.
36
+
1. Sign in to the [Azure portal](https://portal.azure.com).
37
+
1. Browse to **Azure Active Directory** > **App registrations**. The list of all app registrations appears.
39
38
1. Select **New registration**. The **Register an application** page appears.
40
39
41
40

0 commit comments