Skip to content

Commit e76830f

Browse files
authored
Merge pull request #306552 from jenniferf-skc/ARBACYmltoMD
[Azure RBAC] Updating YAML link path for refactoring
2 parents fc38781 + 467b098 commit e76830f

40 files changed

Lines changed: 48 additions & 48 deletions

File tree

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ In summary, you'll use Azure Lighthouse to allow a user or group in your Azure A
6969

7070
- An Azure AD B2C account with [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role on the Azure AD B2C tenant.
7171

72-
- A Microsoft Entra account with the [Owner](../role-based-access-control/built-in-roles.md#owner) role in the Microsoft Entra subscription. See how to [Assign a user as an administrator of an Azure subscription](../role-based-access-control/role-assignments-portal-subscription-admin.yml).
72+
- A Microsoft Entra account with the [Owner](../role-based-access-control/built-in-roles.md#owner) role in the Microsoft Entra subscription. See how to [Assign a user as an administrator of an Azure subscription](/azure/role-based-access-control/role-assignments-portal-subscription-admin).
7373

7474
## 1. Create or choose resource group
7575

articles/api-center/import-api-management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,5 +199,5 @@ After importing APIs from API Management, you can view and manage the imported A
199199
* [Azure CLI reference for Azure API Center](/cli/azure/apic)
200200
* [Azure CLI reference for API Management](/cli/azure/apim)
201201
* [Use the Azure CLI to manage your API inventory](manage-apis-azure-cli.md)
202-
* [Assign Azure roles to a managed identity](../role-based-access-control/role-assignments-portal-managed-identity.yml)
202+
* [Assign Azure roles to a managed identity](/azure/role-based-access-control/role-assignments-portal-managed-identity)
203203
* [Azure API Management documentation](../api-management/index.yml)

articles/api-center/includes/configure-managed-identity-apim-reader.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: danlep
1111
ms.custom: Include file
1212
---
1313

14-
To allow import of APIs, assign your API center's managed identity the **API Management Service Reader** role in your API Management instance. You can use the [portal](../../role-based-access-control/role-assignments-portal-managed-identity.yml) or the Azure CLI.
14+
To allow import of APIs, assign your API center's managed identity the **API Management Service Reader** role in your API Management instance. You can use the [portal](/azure/role-based-access-control/role-assignments-portal-managed-identity) or the Azure CLI.
1515

1616
#### [Portal](#tab/portal)
1717

articles/api-center/includes/configure-managed-identity-kv-secret-user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: danlep
1111
ms.custom: Include file
1212
---
1313

14-
To allow import of APIs, assign your API center's managed identity the **Key Vault Secrets User** role in your Azure key vault. You can use the [portal](../../role-based-access-control/role-assignments-portal-managed-identity.yml) or the Azure CLI.
14+
To allow import of APIs, assign your API center's managed identity the **Key Vault Secrets User** role in your Azure key vault. You can use the [portal](/azure/role-based-access-control/role-assignments-portal-managed-identity) or the Azure CLI.
1515

1616
#### [Portal](#tab/portal)
1717

articles/application-gateway/configuration-infrastructure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ When an instance of your Application Gateway issues a DNS query, it uses the val
7373

7474
The Application Gateway resource is deployed inside a virtual network, so checks are also performed to verify the permission on the virtual network resource. This validation is performed during both creation and management operations and also applies to the [managed identities for Application Gateway Ingress Controller](./tutorial-ingress-controller-add-on-new.md#deploy-an-aks-cluster-with-the-add-on-enabled).
7575

76-
Check your [Azure role-based access control](../role-based-access-control/role-assignments-list-portal.yml) to verify that the users and service principals that operate application gateways have at least the following permissions on the virtual network or subnet:
76+
Check your [Azure role-based access control](/azure/role-based-access-control/role-assignments-list-portal) to verify that the users and service principals that operate application gateways have at least the following permissions on the virtual network or subnet:
7777
- **Microsoft.Network/virtualNetworks/subnets/join/action**
7878
- **Microsoft.Network/virtualNetworks/subnets/read**
7979

@@ -264,4 +264,4 @@ To view roles and permissions for other services, see the following links:
264264
- [Learn about frontend IP address configuration](configuration-frontend-ip.md)
265265
- [Learn about private Application Gateway deployment](application-gateway-private-deployment.md)
266266
- [What is Azure Role Based Access](../role-based-access-control/overview.md)
267-
- [Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)
267+
- [Azure Role Based Access Control](/azure/role-based-access-control/role-assignments-list-portal)

articles/azure-resource-manager/management/move-resource-group-and-subscription.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Some important steps precede moving a resource. You can avoid errors if you veri
117117
118118
1. If you move a resource with an active Azure role assignment (or its child resource with this same assignment), the role assignment doesn't move and becomes orphaned. You must create the role assignment again after the move. Although the system automatically removes the orphaned role assignment, we recommend that you remove it before the move.
119119
120-
To learn more about how to manage role assignments, see [List Azure role assignments](../../role-based-access-control/role-assignments-list-portal.yml#list-role-assignments-at-a-scope) and [Assign Azure roles](../../role-based-access-control/role-assignments-portal.yml).
120+
To learn more about how to manage role assignments, see [List Azure role assignments](/azure/role-based-access-control/role-assignments-list-portal#list-role-assignments-at-a-scope) and [Assign Azure roles](/azure/role-based-access-control/role-assignments-portal).
121121
122122
1. **For a move across subscriptions, the resource and its dependent resources must be located in the same resource group and they must be moved together.** For example, a virtual machine with managed disks requires you to move the virtual machine, managed disks, and other dependent resources together.
123123

articles/communication-services/quickstarts/manage-teams-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ The following roles can provide consent on behalf of a company:
9393
- Application admin
9494
- Cloud application admin
9595

96-
If you want to check roles in Azure portal, see [List Azure role assignments](../../role-based-access-control/role-assignments-list-portal.yml).
96+
If you want to check roles in Azure portal, see [List Azure role assignments](/azure/role-based-access-control/role-assignments-list-portal).
9797

9898
To construct an Administrator consent URL, the Fabrikam Microsoft Entra Administrator does the following steps:
9999

articles/data-factory/how-to-use-sql-managed-instance-with-ir.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
7171

7272
### Configure virtual network
7373

74-
1. **User permission**. The user who creates the Azure-SSIS IR must have the [role assignment](../role-based-access-control/role-assignments-list-portal.yml#list-role-assignments-for-a-user-at-a-scope) at least on Azure Data Factory resource with one of the options below:
74+
1. **User permission**. The user who creates the Azure-SSIS IR must have the [role assignment](/azure/role-based-access-control/role-assignments-list-portal#list-role-assignments-for-a-user-at-a-scope) at least on Azure Data Factory resource with one of the options below:
7575

7676
- Use the built-in Network Contributor role. This role comes with the _Microsoft.Network/\*_ permission, which has a much larger scope than necessary.
7777
- Create a custom role that includes only the necessary _Microsoft.Network/virtualNetworks/\*/join/action_ permission. If you also want to bring your own public IP addresses for Azure-SSIS IR while joining it to an Azure Resource Manager virtual network, also include _Microsoft.Network/publicIPAddresses/*/join/action_ permission in the role.

articles/defender-for-iot/organizations/manage-users-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ For more information, see:
5959

6060
- [Azure user roles and permissions for Defender for IoT](roles-azure.md)
6161
- [Grant a user access to Azure resources using the Azure portal](../../role-based-access-control/quickstart-assign-role-user-portal.md)
62-
- [List Azure role assignments using the Azure portal](../../role-based-access-control/role-assignments-list-portal.yml)
62+
- [List Azure role assignments using the Azure portal](/azure/role-based-access-control/role-assignments-list-portal)
6363
- [Check access for a user to Azure resources](../../role-based-access-control/check-access.md)
6464

6565
## Next steps

articles/expressroute/roles-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,4 +77,4 @@ To view roles and permissions for other services, see the following links:
7777
## Next steps
7878

7979
[What is Azure Role Based Access](../role-based-access-control/overview.md)
80-
[Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)
80+
[Azure Role Based Access Control](/azure/role-based-access-control/role-assignments-list-portal)

0 commit comments

Comments
 (0)