Skip to content

Commit 4b2718b

Browse files
Merge pull request #134141 from TimShererWithAquent/us1760863ak
Message fixes: image-alt-text-duplicated
2 parents 3b718e5 + 0e2e631 commit 4b2718b

20 files changed

+93
-93
lines changed

articles/active-directory/saas-apps/sequr-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,15 +126,15 @@ To configure Azure AD single sign-on with Sequr, perform the following steps:
126126

127127
1. Click on the **Integrations** from the left navigation panel.
128128

129-
![Sequr Configuration](./media/sequr-tutorial/configure1.png)
129+
![Screenshot shows Integration selected from the navigation panel.](./media/sequr-tutorial/configure1.png)
130130

131131
1. Scroll down to the **Single Sign-On** section and click **Manage**.
132132

133-
![Sequr Configuration](./media/sequr-tutorial/configure2.png)
133+
![Screenshot shows the Single Sign-on section with the Manage button selected.](./media/sequr-tutorial/configure2.png)
134134

135135
1. In the **Manage Single Sign-On** section, perform the following steps:
136136

137-
![Sequr Configuration](./media/sequr-tutorial/configure3.png)
137+
![Screenshot shows the Manage Single Sign-On section where you can enter the values described.](./media/sequr-tutorial/configure3.png)
138138

139139
a. In the **Identity Provider Single Sign-On URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
140140

articles/active-directory/saas-apps/servicenow-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -289,11 +289,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
289289
> [!NOTE]
290290
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
291291

292-
> ![Screenshot of Test Results page](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
292+
> ![Screenshot shows the System Properties tab with a test connection called out.](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
293293
294294
1. When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
295295

296-
![Screenshot of Test Results page](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
296+
![Screenshot shows the S S O Login Test Results and the S S O Logout Test Results, along with the Activate button.](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
297297

298298
1. To configure **ServiceNow** manually, follow these steps:
299299

@@ -346,11 +346,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
346346
> [!NOTE]
347347
> If the Test Connection is failing and you are not able to activate this connection then ServiceNow does offer the override switch. You have to enter **Sys_properties.LIST** in the **Search Navigation** and it will open the new page of System Properties. Here you have to create a new property with the name as **glide.authenticate.multisso.test.connection.mandatory** with **datatype** as **True/False** and then set the **value** as **False**.
348348

349-
> ![Screenshot of Test Results page](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
349+
> ![Screenshot shows the System Properties tab with a test connection called out.](./media/servicenow-tutorial/testconnection-fail.png "Configure single sign-on")
350350

351351
* When asked for your credentials, enter them. You'll see the following page. The **SSO Logout Test Results** error is expected. Ignore the error and select **Activate**.
352352

353-
![Screenshot of Test Results page](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
353+
![Screenshot shows the S S O Login Test Results and the S S O Logout Test Results, along with the Activate button.](./media/servicenow-tutorial/servicenowactivate.png "Configure single sign-on")
354354

355355
### Create ServiceNow test user
356356

articles/active-directory/saas-apps/shibumi-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ To configure Azure AD single sign-on with Shibumi, perform the following steps:
9595

9696
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
9797

98-
![Shibumi Domain and URLs single sign-on information](common/idp-intiated.png)
98+
![Screenshot shows the Basic SAML Configuration, where you can enter Identifier, Reply U R L, and select Save.](common/idp-intiated.png)
9999

100100
a. In the **Identifier** text box, type a URL using the following pattern:
101101
`https://<SUBDOMAIN>.shibumi.com`
@@ -105,7 +105,7 @@ To configure Azure AD single sign-on with Shibumi, perform the following steps:
105105

106106
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
107107

108-
![Shibumi Domain and URLs single sign-on information](common/metadata-upload-additional-signon.png)
108+
![Screenshot shows Set additional U R Ls where you can enter a Sign on U R L.](common/metadata-upload-additional-signon.png)
109109

110110
In the **Sign-on URL** text box, type a URL using the following pattern:
111111
`https://<SUBDOMAIN>.shibumi.com/saml/SSO`

articles/active-directory/saas-apps/shiftplanning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,11 +127,11 @@ To configure Azure AD single sign-on with Humanity, perform the following steps:
127127
![Admin](./media/shiftplanning-tutorial/iC786619.png "Admin")
128128
3. Under **Integration**, click **Single Sign-On**.
129129

130-
![Single Sign-On](./media/shiftplanning-tutorial/iC786620.png "Single Sign-On")
130+
![Screenshot shows Single Sign-On selected from the Integration menu.](./media/shiftplanning-tutorial/iC786620.png "Single Sign-On")
131131

132132
4. In the **Single Sign-On** section, perform the following steps:
133133

134-
![Single Sign-On](./media/shiftplanning-tutorial/iC786905.png "Single Sign-On")
134+
![Screenshot shows the Single Sign-On section where you can enter the values described.](./media/shiftplanning-tutorial/iC786905.png "Single Sign-On")
135135

136136
a. Select **SAML Enabled**.
137137

articles/active-directory/saas-apps/showpad-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -125,15 +125,15 @@ To configure Azure AD single sign-on with Showpad, perform the following steps:
125125

126126
1. In the menu on the top, click the **Settings**.
127127

128-
![Configure Single Sign-On On App Side](./media/showpad-tutorial/tutorial_showpad_001.png)
128+
![Screenshot shows Settings selected from the Settings menu.](./media/showpad-tutorial/tutorial_showpad_001.png)
129129

130130
1. Navigate to **Single Sign-On** and click **Enable**.
131131

132-
![Configure Single Sign-On On App Side](./media/showpad-tutorial/tutorial_showpad_002.png)
132+
![Screenshot shows Single Sign-On selected with an Enable option.](./media/showpad-tutorial/tutorial_showpad_002.png)
133133

134134
1. On the **Add a SAML 2.0 Service** dialog, perform the following steps:
135135

136-
![Configure Single Sign-On On App Side](./media/showpad-tutorial/tutorial_showpad_003.png)
136+
![Screenshot shows the Add a SAML 2.0 Service dialog box where you can enter the values described.](./media/showpad-tutorial/tutorial_showpad_003.png)
137137

138138
a. In the **Name** textbox, type the name of Identifier Provider (for example: your company name).
139139

articles/active-directory/saas-apps/silkroad-life-suite-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -98,15 +98,15 @@ To configure Azure AD single sign-on with SilkRoad Life Suite, perform the follo
9898
9999
a. Click **Upload metadata file**.
100100

101-
![image](common/upload-metadata.png)
101+
![Screenshot shows Basic SAML Configuration with the Upload metadata file link.](common/upload-metadata.png)
102102

103103
b. Click on **folder logo** to select the metadata file and click **Upload**.
104104

105-
![image](common/browse-upload-metadata.png)
105+
![Screenshot shows a dialog box where you can select and upload a file.](common/browse-upload-metadata.png)
106106

107107
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section:
108108

109-
![image](common/sp-identifier-reply.png)
109+
![Screenshot shows the Basic SAML Configuration, where you can enter Identifier, Reply U R L, and select Save.](common/sp-identifier-reply.png)
110110

111111
> [!Note]
112112
> If the **Identifier** and **Reply URL** values are not getting auto polulated, then fill in the values manually according to your requirement.
@@ -157,35 +157,35 @@ To configure Azure AD single sign-on with SilkRoad Life Suite, perform the follo
157157
158158
1. Go to **Service Provider**, and then click **Federation Details**.
159159

160-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_06.png)
160+
![Screenshot shows Federation Details selected from Service Provider.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_06.png)
161161

162162
1. Click **Download Federation Metadata**, and then save the metadata file on your computer. Use Downloaded Federation Metadata as a **Service Provider metadata file** in the **Basic SAML Configuration** section in the Azure portal.
163163

164-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_07.png)
164+
![Screenshot shows the Download Federation Metadata link.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_07.png)
165165

166166
1. In your **SilkRoad** application, click **Authentication Sources**.
167167

168-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_08.png)
168+
![Screenshot shows Authentication Sources selected.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_08.png)
169169

170170
1. Click **Add Authentication Source**.
171171

172-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_09.png)
172+
![Screenshot shows the Add Authentication Source link.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_09.png)
173173

174174
1. In the **Add Authentication Source** section, perform the following steps:
175175

176-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_10.png)
176+
![Screenshot shows Add Authentication Source with the Create Identity Provider using File Data button selected.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_10.png)
177177

178178
a. Under **Option 2 - Metadata File**, click **Browse** to upload the downloaded metadata file from Azure portal.
179179

180180
b. Click **Create Identity Provider using File Data**.
181181

182182
1. In the **Authentication Sources** section, click **Edit**.
183183

184-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_11.png)
184+
![Screenshot shows Authentication Sources with the Edit option selected.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_11.png)
185185

186186
1. On the **Edit Authentication Source** dialog, perform the following steps:
187187

188-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_12.png)
188+
![Screenshot shows the Edit Authentication Source dialog box where you can enter the values described.](./media/silkroad-life-suite-tutorial/tutorial_silkroad_12.png)
189189

190190
a. As **Enabled**, select **Yes**.
191191

@@ -205,7 +205,7 @@ To configure Azure AD single sign-on with SilkRoad Life Suite, perform the follo
205205

206206
1. Disable all other authentication sources.
207207

208-
![Azure AD Single Sign-On](./media/silkroad-life-suite-tutorial/tutorial_silkroad_13.png)
208+
![Screenshot shows Authentication Sources where you can disable other sources. ](./media/silkroad-life-suite-tutorial/tutorial_silkroad_13.png)
209209

210210
### Create an Azure AD test user
211211

articles/active-directory/saas-apps/skillsbase-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,11 +129,11 @@ To configure Azure AD single sign-on with Skills Base, perform the following ste
129129

130130
3. On the **Authentication** Page, select Single Sign-On as **SAML 2**.
131131

132-
![The single](./media/skillsbase-tutorial/tutorial_skillsbase_single.png)
132+
![Screenshot shows the Authentication page with SAML 2 selected for Sing Sign-on.](./media/skillsbase-tutorial/tutorial_skillsbase_single.png)
133133

134134
4. On the **Authentication** Page, Perform the following steps:
135135

136-
![The single](./media/skillsbase-tutorial/tutorial_skillsbase_save.png)
136+
![Screenshot shows the Authentication page where you can enter the values described.](./media/skillsbase-tutorial/tutorial_skillsbase_save.png)
137137

138138
a. Click on **Update IdP metadata** button next to **Status** option and paste the contents of Metadata XML that you downloaded from the Azure portal in the specified textbox.
139139

articles/active-directory/saas-apps/skydeskemail-tutorial.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -121,32 +121,32 @@ To configure Azure AD single sign-on with SkyDesk Email, perform the following s
121121

122122
1. In the menu on the top, click **Setup**, and select **Org**.
123123

124-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_51.png)
124+
![Screenshot shows Org selected from the Setup menu.](./media/skydeskemail-tutorial/tutorial_skydeskemail_51.png)
125125

126126
1. Click on **Domains** from the left panel.
127127

128-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_53.png)
128+
![Screenshot shows Domains selected from Control Panel.](./media/skydeskemail-tutorial/tutorial_skydeskemail_53.png)
129129

130130
1. Click on **Add Domain**.
131131

132-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_54.png)
132+
![Screenshot shows Add Domain selected.](./media/skydeskemail-tutorial/tutorial_skydeskemail_54.png)
133133

134134
1. Enter your Domain name, and then verify the Domain.
135135

136-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_55.png)
136+
![Screenshot shows the Add Domain tab where you can enter your domain.](./media/skydeskemail-tutorial/tutorial_skydeskemail_55.png)
137137

138138
1. Click on **SAML Authentication** from the left panel.
139139

140-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_52.png)
140+
![Screenshot shows SAML Authentication selected from Control Panel.](./media/skydeskemail-tutorial/tutorial_skydeskemail_52.png)
141141

142142
1. On the **SAML Authentication** dialog page, perform the following steps:
143143

144-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_56.png)
144+
![Screenshot shows the SAML Authentication Details dialog box where you can enter the values described.](./media/skydeskemail-tutorial/tutorial_skydeskemail_56.png)
145145

146146
> [!NOTE]
147147
> To use SAML based authentication, you should either have **verified domain** or **portal URL** setup. You can set the portal URL with the unique name.
148148
149-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_57.png)
149+
![Screenshot shows the Portal U R L where you enter the name.](./media/skydeskemail-tutorial/tutorial_skydeskemail_57.png)
150150

151151
a. In the **Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
152152

@@ -217,7 +217,7 @@ In this section, you create a user called Britta Simon in SkyDesk Email.
217217

218218
Click on **User Access** from the left panel in SkyDesk Email and then enter your username.
219219

220-
![Configure Single Sign-On](./media/skydeskemail-tutorial/tutorial_skydeskemail_58.png)
220+
![Screenshot shows User Access selected from Control Panel.](./media/skydeskemail-tutorial/tutorial_skydeskemail_58.png)
221221

222222
> [!NOTE]
223223
> If you need to create bulk users, you need to contact the [SkyDesk Email Client support team](https://www.skydesk.jp/apps/support/).

articles/active-directory/saas-apps/skysite-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -83,15 +83,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8383

8484
1. SKYSITE application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
8585

86-
![image](common/edit-attribute.png)
86+
![Screenshot shows User Attributes with the Edit icon selected.](common/edit-attribute.png)
8787

8888
1. In addition to above, SKYSITE application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** section on the **Group Claims (Preview)** dialog, perform the following steps:
8989

9090
a. Click the **pen** next to **Groups returned in claim**.
9191

92-
![image](./media/skysite-tutorial/config01.png)
92+
![Screenshot shows User claims with the option to Add new claim.](./media/skysite-tutorial/config01.png)
9393

94-
![image](./media/skysite-tutorial/config02.png)
94+
![Screenshot shows the Manage user claims dialog box where you can enter the values described.](./media/skysite-tutorial/config02.png)
9595

9696
b. Select **All Groups** from the radio list.
9797

@@ -143,11 +143,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143143

144144
4. Click on **Settings** on the top right side of page and then navigate to **Account setting**.
145145

146-
![Configuration](./media/skysite-tutorial/config03.png)
146+
![Screenshot shows Account setting selected from Settings.](./media/skysite-tutorial/config03.png)
147147

148148
5. Switch to **Single sign on (SSO)** tab, perform the following steps:
149149

150-
![Configuration](./media/skysite-tutorial/config04.png)
150+
![Screenshot shows the Single sign on tab where you can enter the values described.](./media/skysite-tutorial/config04.png)
151151

152152
a. In the **Identity Provider sign in URL** text box, paste the value of **User access URL**, which you have copied from the **properties** tab in Azure portal.
153153

articles/active-directory/saas-apps/smallimprovements-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -124,15 +124,15 @@ To configure Azure AD single sign-on with Small Improvements, perform the follow
124124

125125
1. From the main dashboard page, click **Administration** button on the left.
126126

127-
![Configure Single Sign-On](./media/smallimprovements-tutorial/tutorial_smallimprovements_06.png)
127+
![Screenshot shows the Administration button selected.](./media/smallimprovements-tutorial/tutorial_smallimprovements_06.png)
128128

129129
1. Click the **SAML SSO** button from **Integrations** section.
130130

131-
![Configure Single Sign-On](./media/smallimprovements-tutorial/tutorial_smallimprovements_07.png)
131+
![Screenshot shows the SAML S S O icon selected in Integrations.](./media/smallimprovements-tutorial/tutorial_smallimprovements_07.png)
132132

133133
1. On the SSO Setup page, perform the following steps:
134134

135-
![Configure Single Sign-On](./media/smallimprovements-tutorial/tutorial_smallimprovements_08.png)
135+
![Screenshot shows the S S O Setup page where you can enter the values described.](./media/smallimprovements-tutorial/tutorial_smallimprovements_08.png)
136136

137137
a. In the **HTTP Endpoint** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
138138

@@ -207,15 +207,15 @@ To enable Azure AD users to log in to Small Improvements, they must be provision
207207

208208
1. Click the **User Directory** button from User Management section.
209209

210-
![Creating an Azure AD test user](./media/smallimprovements-tutorial/tutorial_smallimprovements_10.png)
210+
![Screenshot shows the User Directory selected from Administration Overview.](./media/smallimprovements-tutorial/tutorial_smallimprovements_10.png)
211211

212212
1. Click **Add users**.
213213

214-
![Creating an Azure AD test user](./media/smallimprovements-tutorial/tutorial_smallimprovements_11.png)
214+
![Screenshot shows the Add users button.](./media/smallimprovements-tutorial/tutorial_smallimprovements_11.png)
215215

216216
1. On the **Add Users** dialog, perform the following steps:
217217

218-
![Creating an Azure AD test user](./media/smallimprovements-tutorial/tutorial_smallimprovements_12.png)
218+
![Screenshot shows the Add users dialog box where you can enter the values described.](./media/smallimprovements-tutorial/tutorial_smallimprovements_12.png)
219219

220220
a. Enter the **first name** of user like **Britta**.
221221

0 commit comments

Comments
 (0)