Skip to content

Commit 393443c

Browse files
authored
Fix broken links (#731)
1 parent 88800c9 commit 393443c

File tree

30 files changed

+30
-30
lines changed

30 files changed

+30
-30
lines changed

aad/spring-security/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Please refer to [docs] to get more information about how to use the samples in t
66

77

88

9-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
9+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
1010
[Spring Boot]: https://spring.io/projects/spring-boot
1111
[spring-security]: https://github.com/spring-projects/spring-security
1212
[docs]: docs

aad/spring-security/docs/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717

1818

1919
# 1. About
20-
This repo demonstrates how to use [Microsoft Entra ID](https://microsoft.com/security/business/identity-access/microsoft-entra-id) in [Spring Boot](https://spring.io/projects/spring-boot) application by [spring-security](https://github.com/spring-projects/spring-security).
20+
This repo demonstrates how to use [Microsoft Entra ID](https://www.microsoft.com/security/business/identity-access/microsoft-entra-id) in [Spring Boot](https://spring.io/projects/spring-boot) application by [spring-security](https://github.com/spring-projects/spring-security).
2121

2222
# 2. Ask for help
2323
If you have any question about these samples, please ask by [creating a new github issue](https://github.com/Azure-Samples/azure-spring-boot-samples/issues/new).

aad/spring-security/docs/reactive/webflux/oauth2/spring-cloud-gateway.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This section will demonstrate this scenario:
2222

2323
![image](https://user-images.githubusercontent.com/13167207/148503627-700f287c-ea93-4957-b811-ad8f7f8c5ed3.png)
2424

25-
1. Client get [access token](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) from [Microsoft Entra ID](https://microsoft.com/security/business/identity-access/microsoft-entra-id)
25+
1. Client get [access token](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) from [Microsoft Entra ID](https://www.microsoft.com/security/business/identity-access/microsoft-entra-id)
2626
2. Client use the access token to access Gateway.
2727
3. Gateway validate the access token. If the access token is valid, use the access token to access the ResourceServer. There are 2 ResourceServers, which ResourceServer to access depends on the request URL, it's configured in Gateway's application.yml. Gateway is implemented by [spring-cloud-gateway](https://docs.spring.io/spring-cloud-gateway/docs/current/reference/html/)
2828
4. Gateway get the response from ResourceServer, then return to Client.

aad/spring-security/docs/servlet/oauth2/client-access-multiple-resource-server.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Read [document about Application manifest], set `accessTokenAcceptedVersion` to
8686

8787

8888

89-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
89+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
9090
[OAuth2]: https://oauth.net/2/
9191
[Spring Security]: https://spring.io/projects/spring-security
9292
[OAuth 2.0 authorization code flow]: https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow

aad/spring-security/docs/servlet/oauth2/client-access-resource-server.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Read [document about Application manifest], set `accessTokenAcceptedVersion` to
8080

8181

8282

83-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
83+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
8484
[OAuth2]: https://oauth.net/2/
8585
[Spring Security]: https://spring.io/projects/spring-security
8686
[OAuth 2.0 authorization code flow]: https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow

aad/spring-security/docs/servlet/oauth2/login.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Read [document about adding a redirect URI], add redirect URI: **http://localhos
6363

6464

6565

66-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
66+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
6767
[OAuth2]: https://oauth.net/2/
6868
[Spring Security]: https://spring.io/projects/spring-security
6969
[OAuth 2.0 authorization code flow]: https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow

aad/spring-security/docs/servlet/oauth2/resource-server-check-permissions-by-claims-in-access-token.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Read [document about assigning users and groups to roles], assign **user-1** to
8585

8686

8787

88-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
88+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
8989
[OAuth2]: https://oauth.net/2/
9090
[Spring Security]: https://spring.io/projects/spring-security
9191
[OAuth 2.0 authorization code flow]: https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow

aad/spring-security/docs/servlet/oauth2/resource-server-support-on-behalf-of-flow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Read [document about exposing an api], pre-authorize resource-server-1 to access
9999

100100

101101

102-
[Microsoft Entra ID]: https://microsoft.com/security/business/identity-access/microsoft-entra-id
102+
[Microsoft Entra ID]: https://www.microsoft.com/security/business/identity-access/microsoft-entra-id
103103
[OAuth2]: https://oauth.net/2/
104104
[Spring Security]: https://spring.io/projects/spring-security
105105
[OAuth 2.0 authorization code flow]: https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow

appconfiguration/spring-cloud-azure-starter-appconfiguration/appconfiguration-client/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You will build an application that use `spring-cloud-azure-starter-appconfigurat
3030
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3131
> [!IMPORTANT]
3232
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
33-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
33+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3434
3535
### Authenticate Using the Azure CLI
3636
Terraform must authenticate to Azure to create infrastructure.

cache/spring-cloud-azure-starter/spring-cloud-azure-sample-cache/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You will build an application using the Spring Boot Starter Redis, Spring Cloud
3030
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3131
> [!IMPORTANT]
3232
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
33-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
33+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3434
3535
### Authenticate Using the Azure CLI
3636
Terraform must authenticate to Azure to create infrastructure.

cosmos/spring-cloud-azure-starter-cosmos/spring-cloud-azure-cosmos-sample/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You will build an application that read and write data with Azure Cosmos DB usin
2929
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3030
> [!IMPORTANT]
3131
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
32-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
32+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3333
3434
### Authenticate Using the Azure CLI
3535
Terraform must authenticate to Azure to create infrastructure.

cosmos/spring-cloud-azure-starter-data-cosmos/spring-cloud-azure-data-cosmos-sample/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You will build an application to write data to and query data from Azure Cosmos
2828
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
2929
> [!IMPORTANT]
3030
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
31-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
31+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3232
3333
### Authenticate Using the Azure CLI
3434
Terraform must authenticate to Azure to create infrastructure.

eventhubs/spring-cloud-azure-starter-eventhubs/eventhubs-client/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You will build an application that uses `spring-cloud-azure-starter-eventhubs` t
3030
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3131
> [!IMPORTANT]
3232
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
33-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
33+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3434
3535
### Authenticate Using the Azure CLI
3636
Terraform must authenticate to Azure to create infrastructure.

eventhubs/spring-cloud-azure-starter-integration-eventhubs/eventhubs-integration/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You will build an application to send and receive messages for Event Hubs using
2929
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3030
> [!IMPORTANT]
3131
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
32-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
32+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3333
3434
### Authenticate Using the Azure CLI
3535
Terraform must authenticate to Azure to create infrastructure.

eventhubs/spring-cloud-azure-starter/spring-cloud-azure-sample-eventhubs-kafka/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You will build an application using the Spring Cloud Azure Starter and Spring Cl
3131
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3232
> [!IMPORTANT]
3333
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
34-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
34+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3535
3636
### Authenticate Using the Azure CLI
3737
Terraform must authenticate to Azure to create infrastructure.

eventhubs/spring-cloud-azure-stream-binder-eventhubs/eventhubs-binder/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ You will build an application using `Spring Cloud Stream Binder` to send and rec
3333
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3434
> [!IMPORTANT]
3535
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
36-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
36+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3737
3838
### Authenticate Using the Azure CLI
3939
Terraform must authenticate to Azure to create infrastructure.

eventhubs/spring-cloud-azure-stream-binder-eventhubs/eventhubs-multibinders/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You will build an application using `Spring Cloud Stream Binder` to send and rec
3434
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3535
> [!IMPORTANT]
3636
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
37-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
37+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3838
3939
### Authenticate Using the Azure CLI
4040
Terraform must authenticate to Azure to create infrastructure.

servicebus/spring-cloud-azure-starter-integration-servicebus/multiple-namespaces/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In addition, this sample will forward all messages received from the first queue
3232
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3333
> [!IMPORTANT]
3434
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
35-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
35+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3636
3737
### Authenticate Using the Azure CLI
3838
Terraform must authenticate to Azure to create infrastructure.

servicebus/spring-cloud-azure-starter-integration-servicebus/single-namespace/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You will build an application that use Azure Servicebus Queues and Topics to sen
2929
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3030
> [!IMPORTANT]
3131
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
32-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
32+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3333
3434
### Authenticate Using the Azure CLI
3535
Terraform must authenticate to Azure to create infrastructure.

servicebus/spring-cloud-azure-starter-servicebus-jms/servicebus-jms-queue/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You will build an application using Spring JMS to send and receive messages for
3030
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3131
> [!IMPORTANT]
3232
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
33-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
33+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3434
3535
### Authenticate Using the Azure CLI
3636
Terraform must authenticate to Azure to create infrastructure.

servicebus/spring-cloud-azure-starter-servicebus-jms/servicebus-jms-topic/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You will build an application using Spring JMS to send and receive messages for
2929
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3030
> [!IMPORTANT]
3131
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
32-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
32+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3333
3434
### Authenticate Using the Azure CLI
3535
Terraform must authenticate to Azure to create infrastructure.

servicebus/spring-cloud-azure-stream-binder-servicebus/servicebus-multibinders/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ You will build an application using Spring Cloud Stream to send and receive mess
3333
This sample will create Azure resources using Terraform. If you choose to run it without using Terraform to provision resources, please pay attention to:
3434
> [!IMPORTANT]
3535
> If you choose to use a security principal to authenticate and authorize with Microsoft Entra ID for accessing an Azure resource
36-
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
36+
> please refer to [Authorize access with Microsoft Entra ID](https://learn.microsoft.com/azure/developer/java/spring-framework/authentication#authorize-access-with-microsoft-entra-id) to make sure the security principal has been granted the sufficient permission to access the Azure resource.
3737
3838
### Authenticate Using the Azure CLI
3939
Terraform must authenticate to Azure to create infrastructure.

0 commit comments

Comments
 (0)