Skip to content

Commit 3c10fff

Browse files
author
Barbara Selden
committed
final
1 parent 1ca236f commit 3c10fff

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/active-directory/manage-apps/migrate-adfs-apps-to-azure.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ The following are examples of types of MFA rules in AD FS, and how you can map t
305305

306306
MFA rule settings in AD FS:
307307

308-
![AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-mfa-basedon-location-1.png)
308+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-mfa-basedon-location-1.png)
309309

310310

311311
#### Example 1: Enforce MFA based on users/groups
@@ -353,7 +353,7 @@ Specify MFA rules based on a user's location in Azure AD:
353353

354354
1. Configure the **Conditions rules** to specify the locations for which you would like to enforce MFA.
355355

356-
![AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-MFA-basedon-location-1.png)
356+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-MFA-basedon-location-1.png)
357357

358358
5. Configure the **Access controls** options as shown below:
359359

@@ -365,27 +365,27 @@ Specify MFA rules based on a user's location in Azure AD:
365365

366366
Here is an example of how attributes are mapped in AD FS:
367367

368-
![AD MFA settings](media/migrate-adfs-apps-to-azure/map-emit-attributes-as-claimsrule-1.png)
368+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/map-emit-attributes-as-claimsrule-1.png)
369369

370370

371371
This is how the rule maps to Azure AD:
372372

373373
In the [Azure portal](https://portal.azure.com/), select **Enterprise Applications**, **Single sign-on**, and add **SAML Token Attributes** as shown below:
374374

375-
![AD MFA settings](media/migrate-adfs-apps-to-azure/map-emit-attributes-as-claimsrule-2.png)
375+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/map-emit-attributes-as-claimsrule-2.png)
376376

377377

378378

379379
### Map built-In access control policies
380380

381381
AD FS 2016 has several built-in access control policies that you can choose from:
382382

383-
![AD MFA settings](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-1.png)
383+
![Azure AD built in access control](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-1.png)
384384

385385

386386
To implement built-in policies in Azure AD, you can use a [new conditional access policy](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-enable-azure-mfa?toc=/azure/active-directory/conditional-access/toc.json&bc=/azure/active-directory/conditional-access/breadcrumb/toc.json) and configure the access controls, or you can use the custom policy designer in AD FS 2016 to configure access control policies. The Rule Editor has an exhaustive list of Permit and Except options that can help you make all kinds of permutations.
387387

388-
![AD MFA settings](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-2.png)
388+
![Azure AD access control policies](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-2.png)
389389

390390

391391

@@ -402,7 +402,7 @@ In this table, we've listed some useful Permit and Except options and how they m
402402

403403
An example of how to configure the Exclude option for trusted locations in the Azure Portal:
404404

405-
![Screen shot of mapping access control policies](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-3.png)
405+
![Screenshot of mapping access control policies](media/migrate-adfs-apps-to-azure/map-builtin-access-control-policies-3.png)
406406

407407

408408

@@ -460,9 +460,8 @@ Depending on how you configure your app, verify that SSO works properly.
460460
| Application Proxy| Ensure your connector is running and assigned to your application. Visit the [Application Proxy troubleshooting guide](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-troubleshoot)[ ](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-troubleshoot)for further assistance.
461461
‎ |
462462

463-
464463
> [!NOTE]
465-
> Cookies from the old AD FS environment will still be persistent on the user's machines. These cookies might cause problems with the migration as users could be directed to the old AD FS login environment versus the new AZURE AD login. You may need to clear the user browser cookies manually or using a script. You can also use the System Center Configuration Manager or a similar platform.
464+
> Cookies from the old AD FS environment will still be persistent on the user's machines. These cookies might cause problems with the migration as users could be directed to the old AD FS login environment versus the new Azure AD login. You may need to clear the user browser cookies manually or using a script. You can also use the System Center Configuration Manager or a similar platform.
466465
467466
### Troubleshoot
468467

0 commit comments

Comments
 (0)