Skip to content

Commit 5b51d2e

Browse files
committed
Fixing numbered lists for LOC.
1 parent c1ebe6c commit 5b51d2e

File tree

95 files changed

+2309
-2309
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+2309
-2309
lines changed

articles/active-directory/saas-apps/timelive-tutorial.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: 'Tutorial: Azure Active Directory integration with TimeLive | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and TimeLive.
44
services: active-directory
@@ -50,7 +50,7 @@ In this tutorial, you test Azure AD single sign-on in a test environment.
5050
The scenario outlined in this tutorial consists of two main building blocks:
5151

5252
1. Adding TimeLive from the gallery
53-
2. Configuring and testing Azure AD single sign-on
53+
1. Configuring and testing Azure AD single sign-on
5454

5555
## Adding TimeLive from the gallery
5656
To configure the integration of TimeLive into Azure AD, you need to add TimeLive from the gallery to your list of managed SaaS apps.
@@ -61,15 +61,15 @@ To configure the integration of TimeLive into Azure AD, you need to add TimeLive
6161

6262
![The Azure Active Directory button][1]
6363

64-
2. Navigate to **Enterprise applications**. Then go to **All applications**.
64+
1. Navigate to **Enterprise applications**. Then go to **All applications**.
6565

6666
![The Enterprise applications blade][2]
6767

68-
3. To add new application, click **New application** button on the top of dialog.
68+
1. To add new application, click **New application** button on the top of dialog.
6969

7070
![The New application button][3]
7171

72-
4. In the search box, type **TimeLive**, select **TimeLive** from result panel then click **Add** button to add the application.
72+
1. In the search box, type **TimeLive**, select **TimeLive** from result panel then click **Add** button to add the application.
7373

7474
![TimeLive in the results list](./media/timelive-tutorial/tutorial_timelive_addfromgallery.png)
7575

@@ -84,10 +84,10 @@ In TimeLive, assign the value of the **user name** in Azure AD as the value of t
8484
To configure and test Azure AD single sign-on with TimeLive, you need to complete the following building blocks:
8585

8686
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
87-
2. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88-
3. **[Create a TimeLive test user](#create-a-timelive-test-user)** - to have a counterpart of Britta Simon in TimeLive that is linked to the Azure AD representation of user.
89-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90-
5. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
87+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88+
1. **[Create a TimeLive test user](#create-a-timelive-test-user)** - to have a counterpart of Britta Simon in TimeLive that is linked to the Azure AD representation of user.
89+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90+
1. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
9191

9292
### Configure Azure AD single sign-on
9393

@@ -99,11 +99,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
9999

100100
![Configure single sign-on link][4]
101101

102-
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102+
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
103103

104104
![Single sign-on dialog box](./media/timelive-tutorial/tutorial_timelive_samlbase.png)
105105

106-
3. On the **TimeLive Domain and URLs** section, perform the following steps:
106+
1. On the **TimeLive Domain and URLs** section, perform the following steps:
107107

108108
![TimeLive Domain and URLs single sign-on information](./media/timelive-tutorial/tutorial_timelive_url.png)
109109

@@ -114,25 +114,25 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
114114
> [!NOTE]
115115
> These values are not real. Update these values with the actual Identifier and Sign-On URL. Contact [TimeLive Client support team](mailto:[email protected]) to get these values.
116116

117-
4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
117+
1. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
118118

119119
![The Certificate download link](./media/timelive-tutorial/tutorial_timelive_certificate.png)
120120

121-
5. Click **Save** button.
121+
1. Click **Save** button.
122122

123123
![Configure Single Sign-On Save button](./media/timelive-tutorial/tutorial_general_400.png)
124124

125-
6. On the **TimeLive Configuration** section, click **Configure TimeLive** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
125+
1. On the **TimeLive Configuration** section, click **Configure TimeLive** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
126126

127127
![TimeLive Configuration](./media/timelive-tutorial/tutorial_timelive_configure.png)
128128

129-
7. In a different web browser window, log in to your TimeLive company site as an administrator.
129+
1. In a different web browser window, log in to your TimeLive company site as an administrator.
130130

131-
8. Select **Preferences** under **Admin Options**.
131+
1. Select **Preferences** under **Admin Options**.
132132

133133
![TimeLive Configuration](./media/timelive-tutorial/configure1.png)
134134

135-
9. In the **Application Preference** section, perform the following steps:
135+
1. In the **Application Preference** section, perform the following steps:
136136

137137
![TimeLive Configuration](./media/timelive-tutorial/configure2.png)
138138

@@ -165,15 +165,15 @@ The objective of this section is to create a test user in the Azure portal calle
165165

166166
![The Azure Active Directory button](./media/timelive-tutorial/create_aaduser_01.png)
167167

168-
2. To display the list of users, go to **Users and groups**, and then click **All users**.
168+
1. To display the list of users, go to **Users and groups**, and then click **All users**.
169169

170170
![The "Users and groups" and "All users" links](./media/timelive-tutorial/create_aaduser_02.png)
171171

172-
3. To open the **User** dialog box, click **Add** at the top of the **All Users** dialog box.
172+
1. To open the **User** dialog box, click **Add** at the top of the **All Users** dialog box.
173173

174174
![The Add button](./media/timelive-tutorial/create_aaduser_03.png)
175175

176-
4. In the **User** dialog box, perform the following steps:
176+
1. In the **User** dialog box, perform the following steps:
177177

178178
![The User dialog box](./media/timelive-tutorial/create_aaduser_04.png)
179179

@@ -201,23 +201,23 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
201201

202202
![Assign User][201]
203203

204-
2. In the applications list, select **TimeLive**.
204+
1. In the applications list, select **TimeLive**.
205205

206206
![The TimeLive link in the Applications list](./media/timelive-tutorial/tutorial_timelive_app.png)
207207

208-
3. In the menu on the left, click **Users and groups**.
208+
1. In the menu on the left, click **Users and groups**.
209209

210210
![The "Users and groups" link][202]
211211

212-
4. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
212+
1. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
213213

214214
![The Add Assignment pane][203]
215215

216-
5. On **Users and groups** dialog, select **Britta Simon** in the Users list.
216+
1. On **Users and groups** dialog, select **Britta Simon** in the Users list.
217217

218-
6. Click **Select** button on **Users and groups** dialog.
218+
1. Click **Select** button on **Users and groups** dialog.
219219

220-
7. Click **Assign** button on **Add Assignment** dialog.
220+
1. Click **Assign** button on **Add Assignment** dialog.
221221

222222
### Test single sign-on
223223

articles/active-directory/saas-apps/timeoffmanager-tutorial.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: 'Tutorial: Azure Active Directory integration with TimeOffManager | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and TimeOffManager.
44
services: active-directory
@@ -50,7 +50,7 @@ In this tutorial, you test Azure AD single sign-on in a test environment.
5050
The scenario outlined in this tutorial consists of two main building blocks:
5151

5252
1. Add TimeOffManager from the gallery
53-
2. Configure and test Azure AD single sign-on
53+
1. Configure and test Azure AD single sign-on
5454

5555
## Add TimeOffManager from the gallery
5656
To configure the integration of TimeOffManager into Azure AD, you need to add TimeOffManager from the gallery to your list of managed SaaS apps.
@@ -61,15 +61,15 @@ To configure the integration of TimeOffManager into Azure AD, you need to add Ti
6161

6262
![Active Directory][1]
6363

64-
2. Navigate to **Enterprise applications**. Then go to **All applications**.
64+
1. Navigate to **Enterprise applications**. Then go to **All applications**.
6565

6666
![Applications][2]
6767

68-
3. To add new application, click **New application** button on the top of dialog.
68+
1. To add new application, click **New application** button on the top of dialog.
6969

7070
![Applications][3]
7171

72-
4. In the search box, type **TimeOffManager**, select **TimeOffManager** from result panel and then click **Add** button to add the application.
72+
1. In the search box, type **TimeOffManager**, select **TimeOffManager** from result panel and then click **Add** button to add the application.
7373

7474
![Add from gallery](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_addfromgallery.png)
7575

@@ -83,10 +83,10 @@ In TimeOffManager, assign the value of the **user name** in Azure AD as the valu
8383
To configure and test Azure AD single sign-on with TimeOffManager, you need to complete the following building blocks:
8484

8585
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
86-
2. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
87-
3. **[Create a TimeOffManager test user](#create-a-timeoffmanager-test-user)** - to have a counterpart of Britta Simon in TimeOffManager that is linked to the Azure AD representation of user.
88-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
89-
5. **[Test Single Sign-On](#test-single-sign-on)** - to verify whether the configuration works.
86+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
87+
1. **[Create a TimeOffManager test user](#create-a-timeoffmanager-test-user)** - to have a counterpart of Britta Simon in TimeOffManager that is linked to the Azure AD representation of user.
88+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
89+
1. **[Test Single Sign-On](#test-single-sign-on)** - to verify whether the configuration works.
9090

9191
### Configure Azure AD single sign-on
9292

@@ -98,11 +98,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
9898

9999
![Configure Single Sign-On][4]
100100

101-
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
101+
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102102

103103
![SAML based Sign-On](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_samlbase.png)
104104

105-
3. On the **TimeOffManager Domain and URLs** section, perform the following:
105+
1. On the **TimeOffManager Domain and URLs** section, perform the following:
106106

107107
![TimeOffManager Domain and URLs section](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_url.png)
108108

@@ -111,11 +111,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
111111
> [!NOTE]
112112
> This value is not real. Update this value with the actual Reply URL. You can get this value from **Single Sign on settings page** which is explained later in the tutorial or Contact [TimeOffManager support team](https://www.purelyhr.com/contact-us).
113113

114-
4. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
114+
1. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
115115

116116
![SAML Signing Certificate section](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_certificate.png)
117117

118-
5. The objective of this section is to outline how to enable users to authenticate to TimeOffManger with their account in Azure AD using federation based on the SAML protocol.
118+
1. The objective of this section is to outline how to enable users to authenticate to TimeOffManger with their account in Azure AD using federation based on the SAML protocol.
119119

120120
Your TimeOffManger application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this.
121121

@@ -139,20 +139,20 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
139139

140140
d. Click **Ok**.
141141

142-
6. Click **Save** button.
142+
1. Click **Save** button.
143143

144144
![Configure Single Sign-On](./media/timeoffmanager-tutorial/tutorial_general_400.png)
145145

146-
7. On the **TimeOffManager Configuration** section, click **Configure TimeOffManager** to open **Configure sign-on** window. Copy the **Sign-Out URL, SAML Entity ID, and SAML Single Sign-On Service URL** from the **Quick Reference section.**
146+
1. On the **TimeOffManager Configuration** section, click **Configure TimeOffManager** to open **Configure sign-on** window. Copy the **Sign-Out URL, SAML Entity ID, and SAML Single Sign-On Service URL** from the **Quick Reference section.**
147147

148148
![TimeOffManager Configuration section](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_configure.png)
149149

150-
8. In a different web browser window, log into your TimeOffManager company site as an administrator.
150+
1. In a different web browser window, log into your TimeOffManager company site as an administrator.
151151

152-
9. Go to **Account \> Account Options \> Single Sign-On Settings**.
152+
1. Go to **Account \> Account Options \> Single Sign-On Settings**.
153153

154154
![Single Sign-On Settings](./media/timeoffmanager-tutorial/ic795917.png "Single Sign-On Settings")
155-
7. In the **Single Sign-On Settings** section, perform the following steps:
155+
1. In the **Single Sign-On Settings** section, perform the following steps:
156156

157157
![Single Sign-On Settings](./media/timeoffmanager-tutorial/ic795918.png "Single Sign-On Settings")
158158

@@ -170,7 +170,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
170170

171171
g. click **Save Changes**.
172172

173-
11. In **Single Sign on settings** page, copy the value of **Assertion Consumer Service URL** and paste it in the **Reply URL** text box under **TimeOffManager Domain and URLs** section in Azure portal.
173+
1. In **Single Sign on settings** page, copy the value of **Assertion Consumer Service URL** and paste it in the **Reply URL** text box under **TimeOffManager Domain and URLs** section in Azure portal.
174174

175175
![Single Sign-On Settings](./media/timeoffmanager-tutorial/ic795915.png "Single Sign-On Settings")
176176

@@ -189,15 +189,15 @@ The objective of this section is to create a test user in the Azure portal calle
189189

190190
![Creating an Azure AD test user](./media/timeoffmanager-tutorial/create_aaduser_01.png)
191191

192-
2. To display the list of users, go to **Users and groups** and click **All users**.
192+
1. To display the list of users, go to **Users and groups** and click **All users**.
193193

194194
![Users and groups --> All users](./media/timeoffmanager-tutorial/create_aaduser_02.png)
195195

196-
3. To open the **User** dialog, click **Add** on the top of the dialog.
196+
1. To open the **User** dialog, click **Add** on the top of the dialog.
197197

198198
![Add Button](./media/timeoffmanager-tutorial/create_aaduser_03.png)
199199

200-
4. On the **User** dialog page, perform the following steps:
200+
1. On the **User** dialog page, perform the following steps:
201201

202202
![User dialog page](./media/timeoffmanager-tutorial/create_aaduser_04.png)
203203

@@ -233,23 +233,23 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
233233

234234
![Assign User][201]
235235

236-
2. In the applications list, select **TimeOffManager**.
236+
1. In the applications list, select **TimeOffManager**.
237237

238238
![TimeOffManager in app list](./media/timeoffmanager-tutorial/tutorial_timeoffmanager_app.png)
239239

240-
3. In the menu on the left, click **Users and groups**.
240+
1. In the menu on the left, click **Users and groups**.
241241

242242
![Assign User][202]
243243

244-
4. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
244+
1. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
245245

246246
![Assign User][203]
247247

248-
5. On **Users and groups** dialog, select **Britta Simon** in the Users list.
248+
1. On **Users and groups** dialog, select **Britta Simon** in the Users list.
249249

250-
6. Click **Select** button on **Users and groups** dialog.
250+
1. Click **Select** button on **Users and groups** dialog.
251251

252-
7. Click **Assign** button on **Add Assignment** dialog.
252+
1. Click **Assign** button on **Add Assignment** dialog.
253253

254254
### Test single sign-on
255255

0 commit comments

Comments
 (0)