Skip to content

Commit 5144eda

Browse files
authored
Merge pull request #112269 from craigcaseyMSFT/vcraic0421
fix broken links from OPS report
2 parents 07caa12 + b79fcdc commit 5144eda

19 files changed

+38
-38
lines changed

articles/active-directory/saas-apps/cognidox-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
103103

104104
| Name | Namespace | Transformation | Parameter 1 |
105105
| ---------------| --------------- | --------- |
106-
| wanshort | http://appinux.com/windowsaccountname2 | ExtractMailPrefix() | user.userprincipalname |
106+
| wanshort | http:\//appinux.com/windowsaccountname2 | ExtractMailPrefix() | user.userprincipalname |
107107

108108

109109
a. Click **Add new claim** to open the **Manage user claims** dialog.

articles/active-directory/saas-apps/cs-stars-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ To configure Azure AD single sign-on with CS Stars, perform the following steps:
109109
`https://<subdomain>.csstars.com/enterprise/`
110110

111111
> [!NOTE]
112-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [CS Stars Client support team](http://www.riskonnectclearsight.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
112+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [CS Stars Client support team](https://riskonnect.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
113113

114114
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
115115

@@ -127,7 +127,7 @@ To configure Azure AD single sign-on with CS Stars, perform the following steps:
127127

128128
### Configure CS Stars Single Sign-On
129129

130-
To configure single sign-on on **CS Stars** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CS Stars support team](http://www.riskonnectclearsight.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
130+
To configure single sign-on on **CS Stars** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CS Stars support team](https://riskonnect.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
131131

132132
### Create an Azure AD test user
133133

@@ -182,7 +182,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
182182

183183
### Create CS Stars test user
184184

185-
In this section, you create a user called Britta Simon in CS Stars. Work with [CS Stars support team](http://www.riskonnectclearsight.com/support/) to add the users in the CS Stars platform. Users must be created and activated before you use single sign-on.
185+
In this section, you create a user called Britta Simon in CS Stars. Work with [CS Stars support team](https://riskonnect.com/support/) to add the users in the CS Stars platform. Users must be created and activated before you use single sign-on.
186186

187187
### Test single sign-on
188188

articles/active-directory/saas-apps/hr2day-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ To configure Azure AD single sign-on with HR2day by Merces, perform the followin
161161
To configure single sign-on on **HR2day by Merces** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [HR2day by Merces support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
162162

163163
> [!NOTE]
164-
> Mention to the Merces team that this integration needs the Entity ID to be set with the pattern **https://hr2day.force.com/INSTANCENAME**.
164+
> Mention to the Merces team that this integration needs the Entity ID to be set with the pattern **https:\//hr2day.force.com/INSTANCENAME**.
165165
166166
### Create an Azure AD test user
167167

articles/active-directory/saas-apps/jobscience-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
114114
`http://<company name>.my.salesforce.com`
115115

116116
> [!NOTE]
117-
> This value is not real. Update this value with the actual Sign-On URL. Get this value by [Jobscience Client support team](https://www.jobscience.com/support) or from the SSO profile you will create which is explained later in the tutorial.
117+
> This value is not real. Update this value with the actual Sign-On URL. Get this value by [Jobscience Client support team](http://www.jobscience.com/support) or from the SSO profile you will create which is explained later in the tutorial.
118118
119119
1. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
120120

articles/active-directory/saas-apps/linkedinsalesnavigator-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ The first step is to retrieve your LinkedIn access token. If you are an Enterpri
9696

9797
11. Fill in the following fields under **Admin Credentials** :
9898

99-
* In the **Tenant URL** field, enter https://api.linkedin.com.
99+
* In the **Tenant URL** field, enter https://developer.linkedin.com.
100100

101101
* In the **Secret Token** field, enter the access token you generated in step 1 and click **Test Connection** .
102102

articles/active-directory/saas-apps/mitel-connect-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ In this section, you'll enable Britta Simon to use Azure single sign-on by grant
198198

199199
In this section, you create a user named Britta Simon on your MiCloud Connect account. Users must be created and activated before using single sign-on.
200200

201-
For details about adding users in the Mitel Account portal, see the [Adding a User](https://docs.shoretel.com/connectcloud/Account/Users/AddUser) article in the Mitel Knowledge Base.
201+
For details about adding users in the Mitel Account portal, see the [Adding a User](https://oneview.mitel.com/s/article/Adding-a-User-092815) article in the Mitel Knowledge Base.
202202

203203
Create a user on your MiCloud Connect account with the following details:
204204

articles/active-directory/saas-apps/oneteam-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ To configure Azure AD single sign-on with Oneteam, perform the following steps:
117117
`https://<team name>.one-team.io/`
118118

119119
> [!NOTE]
120-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Oneteam Client support team](https://support.one-team.com/hc/requests/new) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
120+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact Oneteam Client support team to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
121121

122122
6. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
123123

@@ -135,7 +135,7 @@ To configure Azure AD single sign-on with Oneteam, perform the following steps:
135135

136136
### Configure Oneteam Single Sign-On
137137

138-
To configure single sign-on on **Oneteam** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Oneteam support team](https://support.one-team.com/hc/requests/new). They set this setting to have the SAML SSO connection set properly on both sides.
138+
To configure single sign-on on **Oneteam** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to Oneteam support team. They set this setting to have the SAML SSO connection set properly on both sides.
139139

140140
### Create an Azure AD test user
141141

@@ -193,7 +193,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
193193
In this section, a user called Britta Simon is created in Oneteam. Oneteam supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Oneteam, a new one is created after authentication.
194194

195195
>[!NOTE]
196-
>If you need to create an user manually, you can raise the support ticket with [Oneteam support team](https://support.one-team.com/hc/requests/new).
196+
>If you need to create an user manually, you can raise the support ticket with Oneteam support team.
197197
198198
### Test single sign-on
199199

articles/active-directory/saas-apps/rackspacesso-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
184184

185185
### Set up Attribute Mapping in the Rackspace control panel
186186

187-
Rackspace uses an **Attribute Mapping Policy** to assign Rackspace roles and groups to your single sign-on users. The **Attribute Mapping Policy** translates Azure AD SAML claims into the user configuration fields Rackspace requires. More documentation can be found in the Rackspace [Attribute Mapping Basics documentation](https://developer.rackspace.com/docs/rackspace-federation/attribmapping-basics/). Some considerations:
187+
Rackspace uses an **Attribute Mapping Policy** to assign Rackspace roles and groups to your single sign-on users. The **Attribute Mapping Policy** translates Azure AD SAML claims into the user configuration fields Rackspace requires. More documentation can be found in the Rackspace [Attribute Mapping Basics documentation](https://developer.rackspace.com/docs/rackspace-federation/appendix/map/). Some considerations:
188188

189189
* If you want to assign varying levels of Rackspace access using Azure AD groups, you will need to enable the Groups claim in the Azure **Rackspace SSO** Single Sign-on settings. The **Attribute Mapping Policy** will then be used to match those groups to desired Rackspace roles and groups:
190190

@@ -223,7 +223,7 @@ mapping:
223223
> [!TIP]
224224
> Ensure that you use a text editor that validates YAML syntax when editing your policy file.
225225
226-
See the Rackspace [Attribute Mapping Basics documentation](https://developer.rackspace.com/docs/rackspace-federation/attribmapping-basics/) for more examples.
226+
See the Rackspace [Attribute Mapping Basics documentation](https://developer.rackspace.com/docs/rackspace-federation/appendix/map/) for more examples.
227227
228228
### Test single sign-on
229229

articles/active-directory/saas-apps/splunkenterpriseandsplunkcloud-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,15 +112,15 @@ To configure Azure AD single sign-on with Splunk Enterprise and Splunk Cloud, pe
112112
`https://<splunkserver>/saml/acs`
113113

114114
> [!NOTE]
115-
> These values are not real. Update these values with the actual Sign-On URL, Identifier and Reply URL. Contact [Splunk Enterprise and Splunk Cloud Client support team](https://www.splunk.com/about-us/contact.html#tabs/customer-support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115+
> These values are not real. Update these values with the actual Sign-On URL, Identifier and Reply URL. Contact [Splunk Enterprise and Splunk Cloud Client support team](https://www.splunk.com/en_us/about-splunk/contact-us.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
116116

117117
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
118118

119119
![The Certificate download link](common/metadataxml.png)
120120

121121
### Configure Splunk Enterprise and Splunk Cloud Single Sign-On
122122

123-
To configure single sign-on on **Splunk Enterprise and Splunk Cloud** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Splunk Enterprise and Splunk Cloud support team](https://www.splunk.com/about-us/contact.html#tabs/customer-support). They set this setting to have the SAML SSO connection set properly on both sides.
123+
To configure single sign-on on **Splunk Enterprise and Splunk Cloud** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Splunk Enterprise and Splunk Cloud support team](https://www.splunk.com/en_us/about-splunk/contact-us.html). They set this setting to have the SAML SSO connection set properly on both sides.
124124

125125
### Create an Azure AD test user
126126

@@ -175,7 +175,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
175175

176176
### Create Splunk Enterprise and Splunk Cloud test user
177177

178-
In this section, you create a user called Britta Simon in Splunk Enterprise and Splunk Cloud. Work with [Splunk Enterprise and Splunk Cloud support team](https://www.splunk.com/about-us/contact.html#tabs/customer-support) to add the users in the Splunk Enterprise and Splunk Cloud platform. Users must be created and activated before you use single sign-on.
178+
In this section, you create a user called Britta Simon in Splunk Enterprise and Splunk Cloud. Work with [Splunk Enterprise and Splunk Cloud support team](https://www.splunk.com/en_us/about-splunk/contact-us.html) to add the users in the Splunk Enterprise and Splunk Cloud platform. Users must be created and activated before you use single sign-on.
179179

180180
### Test single sign-on
181181

articles/active-directory/saas-apps/spring-cm-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
199199
To enable Azure Active Directory users to sign in to SpringCM, they must be provisioned into SpringCM. In the case of SpringCM, provisioning is a manual task.
200200

201201
> [!NOTE]
202-
> For more information, see [Create and Edit a SpringCM User](https://knowledge.springcm.com/create-and-edit-a-springcm-user).
202+
> For more information, see [Create and Edit a SpringCM User](http://community.springcm.com/s/article/Create-and-Edit-a-SpringCM-User-1619481053).
203203
204204
**To provision a user account to SpringCM, perform the following steps:**
205205

0 commit comments

Comments
 (0)