Skip to content

Commit 5d29bcd

Browse files
authored
Fix broken links in error code documentation
1 parent 4dd9f93 commit 5d29bcd

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

support/entra/entra-id/app-integration/error-code-aadsts50000-issuing-token-sign-in-service.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,15 @@ Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate
5454
2. In the **Manage** section, select **Manifest**.
5555
3. Check whether an entry exists in the `keyCredentials` section that includes `type=Symmetric` and `usage=Sign`.
5656

57-
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code" lightbox="/media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
57+
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code" lightbox="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
5858

5959
Alternatively, use the Microsoft Graph PowerShell cmdlet [Get-MgApplication](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
6060

6161
#### Step 2: Check whether symmetric key is used in service principal object
6262

6363
1. If the application is not found in the **App Registrations** page in the Azure portal, browse to the **Enterprise Applications** page.
6464
2. Locate the application, and then get the **Object ID** of the Service Principal.
65-
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal?view=graph-powershell-1.0) to retrieve the key credentials.
65+
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal) to retrieve the key credentials.
6666

6767
#### Step 3: Remove symmetric signing key
6868

0 commit comments

Comments
 (0)