Skip to content

Commit 3c693d7

Browse files
authored
Update migrate-from-federation-to-cloud-authentication.md
1 parent 8c1f6a8 commit 3c693d7

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ You cannot customize Azure AD sign-in experience. No matter how your users signe
113113
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
114114
115115
>[!NOTE]
116-
>Organization branding is not available in free Azure AD licenses unless you have a Microsoft 365 license.
116+
>Organization branding is not available in free Azure AD licenses unless you've a Microsoft 365 license.
117117
118118
### Plan for conditional access policies
119119
@@ -170,7 +170,7 @@ This section includes pre-work before you switch your sign-in method and convert
170170

171171
*If you're not using staged rollout, skip this step.*
172172

173-
Create groups for staged rollout. You will also need to create groups for conditional access policies if you decide to add them.
173+
Create groups for staged rollout and also for conditional access policies if you decide to add them.
174174

175175
We recommend you use a group mastered in Azure AD, also known as a cloud-only group. You can use Azure AD security groups or Microsoft 365 Groups for both moving users to MFA and for conditional access policies. For more information, see [creating an Azure AD security group](../fundamentals/active-directory-groups-create-azure-portal.md), and this [overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups).
176176

@@ -204,7 +204,7 @@ If you're using staged rollout, follow the steps in the links below:
204204

205205
### Without using staged rollout
206206

207-
You have two options for enabling this change:
207+
You've two options for enabling this change:
208208

209209
- **Option A:** Switch using Azure AD Connect.
210210

@@ -312,7 +312,7 @@ For most customers, two or three authentication agents are sufficient to provide
312312

313313
*Available if you didn't initially configure your federated domains by using Azure AD Connect or if you're using third-party federation services.*
314314

315-
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). You will notice that on the User sign-in page, the **Do not configure** option is pre-selected.
315+
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). Notice that on the User sign-in page, the **Do not configure** option is pre-selected.
316316

317317
![ See Do not Configure option on the user sign-in page](media/deploy-cloud-user-authentication/do-not-configure-on-user-sign-in-page.png)
318318

@@ -378,7 +378,7 @@ Follow the steps in this link - [Validate sign-in with PHS/ PTA and seamless SSO
378378
379379
### Remove a user from staged rollout
380380
381-
If you used staged rollout, you should remember to turn off the staged rollout features once you have finished cutting over.
381+
If you used staged rollout, you should remember to turn off the staged rollout features once you've finished cutting over.
382382
383383
**To disable the staged rollout feature, slide the control back to Off.**
384384
@@ -434,7 +434,7 @@ For more information, see –
434434
435435
### Remove relying party trust
436436
437-
If you have Azure AD Connect Health, you can [monitor usage](how-to-connect-health-adfs.md) from the Azure portal. In case the usage shows no new auth req and you validate that all users and clients are successfully authenticating via Azure AD, it's safe to remove the Microsoft 365 relying party trust.
437+
If you've Azure AD Connect Health, you can [monitor usage](how-to-connect-health-adfs.md) from the Azure portal. In case the usage shows no new auth req and you validate that all users and clients are successfully authenticating via Azure AD, it's safe to remove the Microsoft 365 relying party trust.
438438
439439
If you don't use AD FS for other purposes (that is, for other relying party trusts), you can decommission AD FS at this point.
440440

0 commit comments

Comments
 (0)