Skip to content

Commit 2173236

Browse files
committed
minor fix
1 parent 395e3b4 commit 2173236

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,10 @@ The following policy enables username/password authentication for federated user
142142

143143

144144
```powershell
145-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AllowCloudPasswordValidation`":true}}") -DisplayName EnableDirectAuthPolicy -Type HomeRealmDiscoveryPolicy
145+
New-AzureADPolicy
146+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AllowCloudPasswordValidation`":true}}")
147+
-DisplayName EnableDirectAuthPolicy
148+
-Type HomeRealmDiscoveryPolicy
146149
```
147150
::: zone-end
148151

@@ -187,7 +190,9 @@ Get-AzureADServicePrincipal
187190
After you have the **ObjectID** of the service principal of the application for which you want to configure auto-acceleration, run the following command. This command associates the HRD policy that you created in step 1 with the service principal that you located in step 2.
188191

189192
```powershell
190-
Add-AzureADServicePrincipalPolicy -Id <ObjectID of the Service Principal> -RefObjectId <ObjectId of the Policy>
193+
Add-AzureADServicePrincipalPolicy
194+
-Id <ObjectID of the Service Principal>
195+
-RefObjectId <ObjectId of the Policy>
191196
```
192197

193198
You can repeat this command for each service principal to which you want to add the policy.

0 commit comments

Comments
 (0)