Skip to content

Commit c83959c

Browse files
[Azure AD] aad.portal removal
1 parent e62dc01 commit c83959c

File tree

87 files changed

+201
-200
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+201
-200
lines changed

docs/fundamentals/9-secure-access-teams-sharepoint.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Sharing in Microsoft 365 is partially governed by the **External Identities, Ext
3131

3232
Learn more:
3333

34-
* [Azure Active Directory admin center](https://aad.portal.azure.com/)
34+
* [Azure portal](https://portal.azure.com/)
3535
* [External Identities in Azure AD](../external-identities/external-identities-overview.md)
3636

3737
### Guest user access

docs/fundamentals/custom-security-attributes-add.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ To add or deactivate custom security attributes, you must have:
3535

3636
An attribute set is a collection of related attributes. All custom security attributes must be part of an attribute set. Attribute sets cannot be renamed or deleted.
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
38+
1. Sign in to the [Azure portal](https://portal.azure.com).
3939

4040
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
4141

@@ -55,7 +55,7 @@ An attribute set is a collection of related attributes. All custom security attr
5555

5656
## Add a custom security attribute
5757

58-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
58+
1. Sign in to the [Azure portal](https://portal.azure.com).
5959

6060
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
6161

@@ -110,7 +110,7 @@ An attribute set is a collection of related attributes. All custom security attr
110110

111111
Once you add a new custom security attribute, you can later edit some of the properties. Some properties are immutable and cannot be changed.
112112

113-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
113+
1. Sign in to the [Azure portal](https://portal.azure.com).
114114

115115
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
116116

@@ -128,7 +128,7 @@ Once you add a new custom security attribute, you can later edit some of the pro
128128

129129
Once you add a custom security attribute, you can't delete it. However, you can deactivate a custom security attribute.
130130

131-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
131+
1. Sign in to the [Azure portal](https://portal.azure.com).
132132

133133
1. Click **Azure Active Directory** > **Custom security attributes (Preview)**.
134134

docs/fundamentals/custom-security-attributes-manage.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ To grant access to the appropriate people, follow these steps to assign one of t
112112

113113
#### Azure portal
114114

115-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
115+
1. Sign in to the [Azure portal](https://portal.azure.com).
116116

117117
1. Click **Azure Active Directory**.
118118

@@ -160,7 +160,7 @@ Content-type: application/json
160160

161161
#### Azure portal
162162

163-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
163+
1. Sign in to the [Azure portal](https://portal.azure.com).
164164

165165
1. Click **Azure Active Directory**.
166166

docs/fundamentals/whats-new-archive.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9427,7 +9427,7 @@ For more information, see [My Apps Secure Sign-in Extension](https://support.mic
94279427
**Service category:** Azure AD
94289428
**Product capability:** Directory
94299429

9430-
As of January 8, 2018, the Azure AD administration experience in the Azure classic portal has been retired. This took place in conjunction with the retirement of the Azure classic portal itself. In the future, you should use the [Azure AD admin center](https://aad.portal.azure.com) for all your portal-based administration of Azure AD.
9430+
As of January 8, 2018, the Azure AD administration experience in the Azure classic portal has been retired. This took place in conjunction with the retirement of the Azure classic portal itself. In the future, you should use the [Azure portal](https://portal.azure.com) for all your portal-based administration of Azure AD.
94319431

94329432
---
94339433

docs/id-governance/privileged-identity-management/azure-pim-resource-rbac.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ My audit enables you to view your personal role activity.
111111
112112
## Get reason, approver, and ticket number for approval events
113113

114-
1. Sign in to the [Azure portal](https://aad.portal.azure.com) with Privileged Role administrator role permissions, and open Azure AD.
114+
1. Sign in to the [Azure portal](https://portal.azure.com) with Privileged Role administrator role permissions, and open Azure AD.
115115
1. Select **Audit logs**.
116116
1. Use the **Service** filter to display only audit events for the Privileged identity Management service. On the **Audit logs** page, you can:
117117

docs/id-governance/privileged-identity-management/groups-activate-roles.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This article is for eligible members or owners who want to activate their group
2727

2828
When you need to take on a group membership or ownership, you can request activation by using the **My roles** navigation option in PIM.
2929

30-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
30+
1. [Sign in to the Azure portal](https://portal.azure.com).
3131

3232
1. Select **Azure AD Privileged Identity Management -> My roles -> Groups (Preview)**.
3333
>[!NOTE]
@@ -55,7 +55,7 @@ If the [role requires approval](pim-resource-roles-approval-workflow.md) to acti
5555

5656
You can view the status of your pending requests to activate. It is specifically important when your requests undergo approval of another person.
5757

58-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
58+
1. [Sign in to the Azure portal](https://portal.azure.com).
5959

6060
1. Select **Azure AD Privileged Identity Management -> My requests -> Groups (Preview)**.
6161

@@ -66,7 +66,7 @@ You can view the status of your pending requests to activate. It is specifically
6666

6767
## Cancel a pending request
6868

69-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
69+
1. [Sign in to the Azure portal](https://portal.azure.com).
7070

7171
1. Select **Azure AD Privileged Identity Management -> My requests -> Groups (Preview)**.
7272

docs/id-governance/privileged-identity-management/groups-approval-workflow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Follow the steps in this article to approve or deny requests for group membershi
2626

2727
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view pending requests in Privileged Identity Management.
2828

29-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
29+
1. [Sign in to the Azure portal](https://portal.azure.com).
3030

3131
1. Select **Azure AD Privileged Identity Management -> Approve requests -> Groups (Preview)**.
3232

docs/id-governance/privileged-identity-management/groups-assign-member-owner.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ When a membership or ownership is assigned, the assignment:
3333

3434
Follow these steps to make a user eligible member or owner of a group. You will need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group.
3535

36-
1. [Sign in to Azure AD](https://aad.portal.azure.com).
36+
1. [Sign in to the Azure portal](https://portal.azure.com).
3737

3838
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
3939

@@ -73,7 +73,7 @@ Follow these steps to make a user eligible member or owner of a group. You will
7373

7474
Follow these steps to update or remove an existing role assignment. You will need to have Global Administrator, Privileged Role Administrator role, or Owner role of the group.
7575

76-
1. [Sign in to Azure AD](https://aad.portal.azure.com) with appropriate role permissions.
76+
1. [Sign in to the Azure portal](https://portal.azure.com) with appropriate role permissions.
7777

7878
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
7979

docs/id-governance/privileged-identity-management/groups-audit.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Follow these steps to view the audit history for groups in Privileged Identity M
2828

2929
**Resource audit** gives you a view of all activity associated with groups in PIM.
3030

31-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
31+
1. [Sign in to the Azure portal](https://portal.azure.com).
3232

3333
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)**.
3434

@@ -44,7 +44,7 @@ Follow these steps to view the audit history for groups in Privileged Identity M
4444

4545
**My audit** enables you to view your personal role activity for groups in PIM.
4646

47-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
47+
1. [Sign in to the Azure portal](https://portal.azure.com).
4848

4949
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)**.
5050

docs/id-governance/privileged-identity-management/groups-discover-groups.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Dynamic groups and groups synchronized from on-premises environment cannot be ma
2929
You should either be a group Owner, have Global Administrator role, or Privileged Role Administrator role to bring the group under management with PIM.
3030

3131

32-
1. [Sign in to Azure AD](https://aad.portal.azure.com).
32+
1. [Sign in to the Azure portal](https://portal.azure.com).
3333

3434
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)** and view groups that are already enabled for PIM for Groups.
3535

docs/id-governance/privileged-identity-management/groups-role-settings.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You need to have Global Administrator, Privileged Role Administrator, or group O
2727

2828
Follow these steps to open the settings for a group role.
2929

30-
1. [Sign in to Azure AD portal](https://aad.portal.azure.com).
30+
1. [Sign in to the Azure portal](https://portal.azure.com).
3131

3232
1. Select **Azure AD Privileged Identity Management -> Groups (Preview)**.
3333

docs/id-governance/privileged-identity-management/pim-how-to-add-role-to-user.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Follow these steps to make a user eligible for an Azure AD admin role.
7474

7575
For certain roles, the scope of the granted permissions can be restricted to a single admin unit, service principal, or application. This procedure is an example if assigning a role that has the scope of an administrative unit. For a list of roles that support scope via administrative unit, see [Assign scoped roles to an administrative unit](../roles/admin-units-assign-roles.md). This feature is currently being rolled out to Azure AD organizations.
7676

77-
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with Privileged Role Administrator permissions.
77+
1. Sign in to the [Azure portal](https://portal.azure.com) with Privileged Role Administrator permissions.
7878

7979
1. Select **Azure Active Directory** > **Roles and administrators**.
8080

docs/id-governance/privileged-identity-management/pim-how-to-change-default-settings.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ PIM role settings are also known as “PIM Policies”.
2828

2929
Follow these steps to open the settings for an Azure AD role.
3030

31-
1. [Sign in to Azure AD](https://aad.portal.azure.com/)
31+
1. [Sign in to the Azure portal](https://portal.azure.com/)
3232

3333
1. Select **Azure AD Privileged Identity Management -> Azure AD Roles -> Roles**. On this page you can see list of Azure AD roles available in the tenant, including built-in and custom roles.
3434
:::image type="content" source="media/pim-how-to-change-default-settings/role-settings.png" alt-text="Screenshot of the list of Azure AD roles available in the tenant, including built-in and custom roles." lightbox="media/pim-how-to-change-default-settings/role-settings.png":::

docs/id-governance/privileged-identity-management/pim-resource-roles-configure-role-settings.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ PIM role settings are also known as “PIM Policies”.
2828

2929
Follow these steps to open the settings for an Azure resource role.
3030

31-
1. [Sign in to Azure AD](https://aad.portal.azure.com/)
31+
1. [Sign in to the Azure portal](https://portal.azure.com/)
3232

3333
1. Select **Azure AD Privileged Identity Management -> Azure Resources**. On this page you can see list of Azure resources discovered in PIM. Use Resource type filter to select all required resource types.
3434

docs/identity-platform/troubleshoot-publisher-verification.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ Below are some common issues that may occur during the process.
3535
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
3636

3737
- **I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
38-
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant.
39-
2. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
38+
1. Sign in to the [Azure portal](https://portal.azure.com) using a user account in your organization's primary tenant.
39+
1. Browse to **Azure Active Directory** > [Roles and administrators](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
4040
3. Select the desired admin role.
4141
4. The list of users assigned that role will be displayed.
4242

docs/identity/app-provisioning/configure-automatic-user-provisioning-portal.md

+3-2
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,9 @@ This article describes the general steps for managing automatic user account pro
2424

2525
Use the Azure Active Directory portal to view and manage all applications that are configured for single sign-on in a directory. Enterprise apps are apps that are deployed and used within your organization. Follow these steps to view and manage your enterprise applications:
2626

27-
1. Open the [Azure Active Directory portal](https://aad.portal.azure.com).
28-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
27+
1. Open the [Azure portal](https://portal.azure.com).
28+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
29+
1. A list of all configured apps is shown, including apps that were added from the gallery.
2930
1. Select any app to load its resource pane, where you can view reports and manage app settings.
3031
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3132

docs/identity/app-provisioning/customize-application-attributes.md

+4-3
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,9 @@ You can customize the default attribute-mappings according to your business need
2929

3030
Follow these steps to access the **Mappings** feature of user provisioning:
3131

32-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com).
33-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
32+
1. Sign in to the [Azure portal](https://portal.azure.com).
33+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
34+
1. A list of all configured apps is shown, including apps that were added from the gallery.
3435
1. Select any app to load its app management pane, where you can view reports and manage app settings.
3536
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3637
1. Expand **Mappings** to view and edit the user attributes that flow between Azure AD and the target application. If the target application supports it, this section lets you optionally configure provisioning of groups and user accounts.
@@ -142,7 +143,7 @@ When you are editing the list of supported attributes, the following properties
142143

143144
#### Provisioning a custom extension attribute to a SCIM compliant application
144145
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:
145-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146+
1. Sign in to the [Azure portal](https://portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146147
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
147148
3. At the bottom of the page, select **Show advanced options**.
148149
4. Select **Edit attribute list for AppName**.

docs/identity/app-provisioning/use-scim-to-provision-users-and-groups.md

+4-5
Original file line numberDiff line numberDiff line change
@@ -1308,8 +1308,9 @@ Applications that support the SCIM profile described in this article can be conn
13081308

13091309
**To connect an application that supports SCIM:**
13101310

1311-
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
1311+
1. Sign in to the [Azure portal](https://portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
1313+
1. A list of all configured apps is shown, including apps that were added from the gallery.
13131314
1. Select **+ New application** > **+ Create your own application**.
13141315
1. Enter a name for your application, choose the option "*integrate any other application you don't find in the gallery*" and select **Add** to create an app object. The new app is added to the list of enterprise applications and opens to its app management screen.
13151316

@@ -1397,9 +1398,7 @@ The provisioning service supports the [authorization code grant](https://tools.i
13971398
> [!NOTE]
13981399
> OAuth v1 is not supported due to exposure of the client secret. OAuth v2 is supported.
13991400

1400-
Best practices (recommended, but not required):
1401-
* Support multiple redirect URLs. Administrators can configure provisioning from both "portal.azure.com" and "aad.portal.azure.com". Supporting multiple redirect URLs will ensure that users can authorize access from either portal.
1402-
* Support multiple secrets for easy renewal, without downtime.
1401+
Supportting multiple secrets for easy renewal, without downtime is recommended, but not required.
14031402

14041403
#### How to set up OAuth code grant flow
14051404

docs/identity/app-proxy/application-proxy-configure-native-client-application.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,8 @@ Publish your proxy application as you would any other application and assign use
3333

3434
You now need to register your application in Azure AD, as follows:
3535

36-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Dashboard** for the **Azure Active Directory admin center** appears.
37-
1. In the sidebar, select **Azure Active Directory**. The **Azure Active Directory** overview page appears.
38-
1. In the Azure AD overview sidebar, select **App registrations**. The list of all app registrations appears.
36+
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Browse to **Azure Active Directory** > **App registrations**. The list of all app registrations appears.
3938
1. Select **New registration**. The **Register an application** page appears.
4039

4140
![Create a new app registration in the Azure portal](./media/application-proxy-configure-native-client-application/create.png)

0 commit comments

Comments
 (0)