Skip to content

Commit 5d6faca

Browse files
committed
incorporating feedback
1 parent e2f3907 commit 5d6faca

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

articles/machine-learning/how-to-setup-authentication.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ can require two-factor authentication, or allow sign in only from managed device
332332

333333
### Check for service principal
334334

335-
Before adding the conditional access policy, verify that the application ID is listed in the __Enterprisee applications__ section of the [Azure portal](https://portal.azure.com):
335+
Before adding the conditional access policy, verify that the application ID is listed in the __Enterprise applications__ section of the [Azure portal](https://portal.azure.com):
336336

337337
> [!IMPORTANT]
338338
> To perform the steps in this section, you must have __Microsoft Entra ID P2__. For more information, see [Microsoft Entra licensing](/entra/fundamentals/licensing).
@@ -343,6 +343,9 @@ Before adding the conditional access policy, verify that the application ID is l
343343

344344
1. From Enterprise Applications, use the __Search by application name or object ID__ field to search for the entry you want to use with conditional access. If an entry appears, a service principal already exists for the application ID. Skip the rest of the steps in this section and go to the [Add conditional access](#add-conditional-access) section.
345345

346+
> [!IMPORTANT]
347+
> The only filter should be __Application ID starts with__. Remove any other filter that may be present.
348+
346349
:::image type="content" source="./media/how-to-setup-authentication/no-application-found.png" alt-text="Screenshot of the Enterprise Applications search with no matching results." lightbox="./media/how-to-setup-authentication/no-application-found.png":::
347350

348351
1. If no entry appears, use the following [Azure Powershell](/powershell/azure/install-azure-powershell) cmdlet to create a service principal for the application ID:
@@ -353,7 +356,7 @@ Before adding the conditional access policy, verify that the application ID is l
353356
354357
For example, `New-AzADServicePrincipal -ApplicationId "d7304df8-741f-47d3-9bc2-df0e24e2071f"`.
355358
356-
1. After creating the service principal, return to __Enterprise applications__ and verify that you can now find the application ID.
359+
1. After creating the service principal, return to __Enterprise applications__ and verify that you can now find the application ID. You can find the list of IDs in the [Use Conditional Access](#use-conditional-access) section.
357360
358361
### Add conditional access
359362
688 Bytes
Loading

0 commit comments

Comments
 (0)