Skip to content

Commit 2c9f45a

Browse files
authored
Merge pull request #87217 from Saisang/sai-fixNoBreakingSpace0902
replace no-breaking spaces by normal spaces
2 parents 10ad213 + ada7c46 commit 2c9f45a

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

articles/active-directory/saas-apps/adaptivesuite-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
![Edit Basic SAML Configuration](common/edit-urls.png)
8080

81-
1. On the **Basic SAML Configuration** section, perform the following steps:
81+
1. On the **Basic SAML Configuration** section, perform the following steps:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
8484
`https://login.adaptiveinsights.com:443/samlsso/<unique-id>`

articles/active-directory/saas-apps/ciscocloudlock-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
101101

102102
![The Certificate download link](common/metadataxml.png)
103103

104-
5. To Modify the **Signing** options as per your requirement, click **Edit** button to open **SAML Signing Certificate** dialog.
104+
5. To Modify the **Signing** options as per your requirement, click **Edit** button to open **SAML Signing Certificate** dialog.
105105

106106
![Saml Response](./media/ciscocloudlock-tutorial/saml.png)
107107

@@ -150,7 +150,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150150

151151
### Create The Cloud Security Fabric test user
152152

153-
In this section, you create a user called B.Simon in The Cloud Security Fabric. Work with [The Cloud Security Fabric support team](mailto:[email protected]) to add the users in the The Cloud Security Fabric platform. Users must be created and activated before you use single sign-on.
153+
In this section, you create a user called B.Simon in The Cloud Security Fabric. Work with [The Cloud Security Fabric support team](mailto:[email protected]) to add the users in the The Cloud Security Fabric platform. Users must be created and activated before you use single sign-on.
154154

155155
### Test SSO
156156

articles/active-directory/saas-apps/jfrog-artifactory-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,11 +95,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9595
> [!NOTE]
9696
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [JFrog Artifactory Client support team](https://support.jfrog.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9797

98-
1. JFrog Artifactory application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
98+
1. JFrog Artifactory application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
9999

100100
![image](common/edit-attribute.png)
101101

102-
1. In addition to above, JFrog Artifactory application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** section on the **Group Claims (Preview)** dialog, perform the following steps:
102+
1. In addition to above, JFrog Artifactory application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** section on the **Group Claims (Preview)** dialog, perform the following steps:
103103

104104
a. Click the **pen** next to **Groups returned in claim**.
105105

articles/active-directory/saas-apps/pronovos-ops-manager-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
![Edit Basic SAML Configuration](common/edit-urls.png)
8080

81-
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
81+
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
8282

8383
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8484

@@ -129,7 +129,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
129129

130130
### Create ProNovos Ops Manager test user
131131

132-
In this section, you create a user called B.Simon in ProNovos Ops Manager. Work with [ProNovos Ops Manager support team](mailto:[email protected]) to add the users in the ProNovos Ops Manager platform. Users must be created and activated before you use single sign-on.
132+
In this section, you create a user called B.Simon in ProNovos Ops Manager. Work with [ProNovos Ops Manager support team](mailto:[email protected]) to add the users in the ProNovos Ops Manager platform. Users must be created and activated before you use single sign-on.
133133

134134
### Test SSO
135135

articles/active-directory/saas-apps/robin-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,18 +79,18 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979

8080
![Edit Basic SAML Configuration](common/edit-urls.png)
8181

82-
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
82+
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
8383

8484
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8585

8686
In the **Sign-on URL** text box, type a URL:
8787
`https://dashboard.robinpowered.com/`
8888

89-
5. Robin application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
89+
5. Robin application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
9090

9191
![image](common/edit-attribute.png)
9292

93-
6. In addition to above, Robin application expects few more attributes to be passed back in SAML response. In the User Claims section on the User Attributes dialog, perform the following steps to add SAML token attribute as shown in the below table:
93+
6. In addition to above, Robin application expects few more attributes to be passed back in SAML response. In the User Claims section on the User Attributes dialog, perform the following steps to add SAML token attribute as shown in the below table:
9494

9595
| Name | Source Attribute|
9696
| ---------------| --------- |

0 commit comments

Comments
 (0)