Skip to content

Commit 46d12ac

Browse files
committed
Update sharepoint-on-premises-tutorial.md
1 parent 7d34306 commit 46d12ac

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -348,17 +348,18 @@ $t.Update()
348348
### Configure the lifetime of the security token
349349

350350
By default, Azure AD creates a SAML token that is valid for 1 hour.
351-
This lifetime cannot be customized in the portal, or from a conditional access policy, but it is possible to create a [custom token lifetime policy](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-lifetimes) and apply it to the enterprise application created for SharePoint:
351+
This lifetime cannot be customized in the Azure portal, or using a conditional access policy, but it can be done by creating a [custom token lifetime policy](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-lifetimes) and apply it to the enterprise application created for SharePoint.
352+
To do this, complete the steps below using Windows PowerShell (at the time of this writing, AzureADPreview v2.0.2.149 does not work with PowerShell Core):
352353

353-
1. Using Windows PowerShell 5.1, install the module [AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview/):
354+
1. Install the module [AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview/):
354355

355356
```powershell
356357
Install-Module -Name AzureADPreview -Scope CurrentUser
357358
```
358359
359-
1. Then, run `Connect-AzureAD` to sign-in as a tenant administrator.
360+
1. Run `Connect-AzureAD` to sign-in as a tenant administrator.
360361
361-
1. The sample script below updates the application `SharePoint corporate farm` to apply a token lifetime policy of 6h (value `06:00:00` of property `AccessTokenLifetime`) to it:
362+
1. Run the sample script below to update the application `SharePoint corporate farm` to issue a SAML token valid for 6h (value `06:00:00` of property `AccessTokenLifetime`):
362363
363364
```powershell
364365
$appDisplayName = "SharePoint corporate farm"
@@ -375,5 +376,5 @@ This lifetime cannot be customized in the portal, or from a conditional access p
375376
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
376377
```
377378
378-
After the script completed, all users who successfully sign-in will get a SAML 1.1 token valid for 6h in SharePoint.
379-
To revert the change, simply delete the custom TokenLifetimePolicy, as done at the beginning of the script.
379+
After the script completed, all users who successfully sign-in to the enterprise application will get a SAML 1.1 token valid for 6h in SharePoint.
380+
To revert the change, simply remove the custom `TokenLifetimePolicy` object from the service principal, as done at the beginning of the script.

0 commit comments

Comments
 (0)