You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ You cannot customize Azure AD sign-in experience. No matter how your users signe
113
113
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
114
114
115
115
>[!NOTE]
116
-
>Organization branding is not available in free Azure AD licenses unless you have a Microsoft 365 license.
116
+
>Organization branding is not available in free Azure AD licenses unless you've a Microsoft 365 license.
117
117
118
118
### Plan for conditional access policies
119
119
@@ -170,7 +170,7 @@ This section includes pre-work before you switch your sign-in method and convert
170
170
171
171
*If you're not using staged rollout, skip this step.*
172
172
173
-
Create groups for staged rollout. You will also need to create groups for conditional access policies if you decide to add them.
173
+
Create groups for staged rollout and also for conditional access policies if you decide to add them.
174
174
175
175
We recommend you use a group mastered in Azure AD, also known as a cloud-only group. You can use Azure AD security groups or Microsoft 365 Groups for both moving users to MFA and for conditional access policies. For more information, see [creating an Azure AD security group](../fundamentals/active-directory-groups-create-azure-portal.md), and this [overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups).
176
176
@@ -204,7 +204,7 @@ If you're using staged rollout, follow the steps in the links below:
204
204
205
205
### Without using staged rollout
206
206
207
-
You have two options for enabling this change:
207
+
You've two options for enabling this change:
208
208
209
209
-**Option A:** Switch using Azure AD Connect.
210
210
@@ -312,7 +312,7 @@ For most customers, two or three authentication agents are sufficient to provide
312
312
313
313
*Available if you didn't initially configure your federated domains by using Azure AD Connect or if you're using third-party federation services.*
314
314
315
-
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). You will notice that on the User sign-in page, the **Do not configure** option is pre-selected.
315
+
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). Notice that on the User sign-in page, the **Do not configure** option is pre-selected.
316
316
317
317

318
318
@@ -378,7 +378,7 @@ Follow the steps in this link - [Validate sign-in with PHS/ PTA and seamless SSO
378
378
379
379
### Remove a user from staged rollout
380
380
381
-
If you used staged rollout, you should remember to turn off the staged rollout features once you have finished cutting over.
381
+
If you used staged rollout, you should remember to turn off the staged rollout features once you've finished cutting over.
382
382
383
383
**To disable the staged rollout feature, slide the control back to Off.**
384
384
@@ -434,7 +434,7 @@ For more information, see –
434
434
435
435
### Remove relying party trust
436
436
437
-
If you have Azure AD Connect Health, you can [monitor usage](how-to-connect-health-adfs.md) from the Azure portal. In case the usage shows no new auth req and you validate that all users and clients are successfully authenticating via Azure AD, it's safe to remove the Microsoft 365 relying party trust.
437
+
If you've Azure AD Connect Health, you can [monitor usage](how-to-connect-health-adfs.md) from the Azure portal. In case the usage shows no new auth req and you validate that all users and clients are successfully authenticating via Azure AD, it's safe to remove the Microsoft 365 relying party trust.
438
438
439
439
If you don't use AD FS for other purposes (that is, for other relying party trusts), you can decommission AD FS at this point.
0 commit comments