Skip to content

Commit 054bf9a

Browse files
committed
update
1 parent 6d99352 commit 054bf9a

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

articles/active-directory/saas-apps/verkada-command-tutorial.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,6 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Verkada Command supports **SP and IDP** initiated SSO
4444

45-
* Verkada Command supports [**Automated** user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/salesforce-provisioning-tutorial)
46-
4745
* Once you configure the Verkada Command you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4846

4947
## Adding Verkada Command from the gallery
@@ -81,7 +79,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8179

8280
![Edit Basic SAML Configuration](common/edit-urls.png)
8381

84-
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** intiated mode, perform the following steps:
82+
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** initiated mode, perform the following steps:
8583

8684
a. Click **Upload metadata file**.
8785

0 commit comments

Comments
 (0)