Skip to content

Commit 66c04d4

Browse files
committed
updating
1 parent 9b8f027 commit 66c04d4

6 files changed

+14
-14
lines changed

articles/active-directory/hybrid/how-to-connect-sso.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Azure AD Connect: Seamless Single Sign-On | Microsoft Docs'
3-
description: This topic describes Azure Active Directory (Azure AD) Seamless Single Sign-On and how it allows you to provide true single sign-on for corporate desktop users inside your corporate network.
2+
title: 'Azure AD Connect: Seamless single sign-on | Microsoft Docs'
3+
description: This topic describes Azure Active Directory (Azure AD) Seamless single sign-on and how it allows you to provide true single sign-on for corporate desktop users inside your corporate network.
44
services: active-directory
55
keywords: what is Azure AD Connect, install Active Directory, required components for Azure AD, SSO, Single Sign-on
66
documentationcenter: ''
@@ -16,17 +16,17 @@ ms.subservice: hybrid
1616
ms.author: billmath
1717
ms.collection: M365-identity-device-management
1818
---
19-
# Azure Active Directory Seamless Single Sign-On
19+
# Azure Active Directory Seamless single sign-on
2020

21-
## What is Azure Active Directory Seamless Single Sign-On?
21+
## What is Azure Active Directory Seamless single sign-on?
2222

23-
Azure Active Directory Seamless Single Sign-On (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to your cloud-based applications without needing any additional on-premises components.
23+
Azure Active Directory Seamless single sign-on (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to your cloud-based applications without needing any additional on-premises components.
2424

2525
>[!VIDEO https://www.youtube.com/embed/PyeAC85Gm7w]
2626
2727
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. Seamless SSO is _not_ applicable to Active Directory Federation Services (ADFS).
2828

29-
![Seamless Single Sign-On](./media/how-to-connect-sso/sso1.png)
29+
![Seamless single sign-on](./media/how-to-connect-sso/sso1.png)
3030

3131
## SSO via primary refresh token vs. Seamless SSO
3232

articles/active-directory/hybrid/how-to-connect-sync-technical-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Attribute flow occurs between the connector space and the metaverse bi-direction
5555
Attribute flow only occurs when these synchronizations are run. Attribute flows are defined in Synchronization Rules. These can be inbound (ISR in the picture above) or outbound (OSR in the picture above).
5656

5757
## Connected system
58-
Connected system (aka connected directory) is referring to the remote system Azure AD Connect sync has connected to and reading and writing identity data to and from.
58+
Connected system is referring to the remote system Azure AD Connect sync has connected to and reading and writing identity data to and from.
5959

6060
## Connector space
6161
Each connected data source is represented as a filtered subset of the objects and attributes in the connector space.

articles/active-directory/hybrid/plan-connect-design-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ While integrating your on-premises directory with Azure AD, it's important to un
175175
### Choosing the attribute for userPrincipalName
176176
When you're selecting the attribute for providing the value of UPN to be used in Azure one should ensure
177177

178-
* The attribute values conform to the UPN syntax (RFC 822), that is it should be of the format username\@domain
178+
* The attribute values conform to the UPN syntax (RFC 822), it should be in the format of username\@domain
179179
* The suffix in the values matches to one of the verified custom domains in Azure AD
180180

181181
In express settings, the assumed choice for the attribute is userPrincipalName. If the userPrincipalName attribute doesn't contain the value you want your users to sign in to Azure, then you must choose **Custom Installation**.

articles/active-directory/hybrid/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Over the years, several synchronization tools have existed and used for various
103103
104104
### Supported topologies
105105
When defining a synchronization strategy, the topology that is used must be determined. Depending on the information that was determined in step 2 you can determine which topology is the proper one to use.
106-
The single forest, single Azure AD topology is the most common and consists of a single Active Directory forest and a single instance of Azure AD. This topology is going to be used in a most scenarios and is the expected topology when using Azure AD Connect Express installation as shown in the figure below.
106+
The single forest, single Azure AD topology is the most common and consists of a single Active Directory forest and a single instance of Azure AD. This topology is going to be used in most scenarios and is the expected topology when using Azure AD Connect Express installation as shown in the figure below.
107107

108108
![Supported topologies](./media/plan-hybrid-identity-design-considerations/single-forest.png)
109109
Single Forest Scenario

articles/active-directory/hybrid/plan-hybrid-identity-design-considerations-incident-response-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Hybrid identity design - incident response requirements Azure | Microsoft Docs
3-
description: Determine monitoring and reporting capabilities for the hybrid identity solution that can be leveraged by IT to take actions to identify and mitigate a potential threats
3+
description: Determine monitoring and reporting capabilities for the hybrid identity solution that can be leveraged by IT to take actions to identify and mitigate a potential threat.
44
documentationcenter: ''
55
services: active-directory
66
author: billmath
@@ -39,7 +39,7 @@ Many times the identity system can also help in initial assessment phase mainly
3939

4040
The identity management system should assist IT admins to identify and report those suspicious activities. Usually these technical requirements can be fulfilled by monitoring all systems and having a reporting capability that can highlight potential threats. Use the questions below to help you design your hybrid identity solution while taking into consideration incident response requirements:
4141

42-
* Does your company has a security incident response in place?
42+
* Does your company have a security incident response in place?
4343
* If yes, is the current identity management system used as part of the process?
4444
* Does your company need to identify suspicious sign-on attempts from users across different devices?
4545
* Does your company need to detect potential compromised user’s credentials?

articles/active-directory/hybrid/tshoot-connect-attribute-not-syncing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,19 +29,19 @@ Before investigating attribute syncing issues, let’s understand the **Azure AD
2929
* **CS:** Connector Space, a table in database.
3030
* **MV:** Metaverse, a table in database.
3131
* **AD:** Active Directory
32-
* **AAD:** Azure Active Directory
32+
* **Azure AD:** Azure Active Directory
3333

3434
### **Synchronization Steps**
3535

3636
* Import from AD: Active Directory objects are brought into AD CS.
3737

38-
* Import from AAD: Azure Active Directory objects are brought into AAD CS.
38+
* Import from Azure AD: Azure Active Directory objects are brought into Azure AD CS.
3939

4040
* Synchronization: **Inbound Synchronization Rules** and **Outbound Synchronization Rules** are run in the order of precedence number from lower to higher. To view the Synchronization Rules, you can go to **Synchronization Rules Editor** from the desktop applications. The **Inbound Synchronization Rules** brings in data from CS to MV. The **Outbound Synchronization Rules** moves data from MV to CS.
4141

4242
* Export to AD: After running Synchronization, objects are exported from AD CS to **Active Directory**.
4343

44-
* Export to AAD: After running Synchronization, objects are exported from AAD CS to **Azure Active Directory**.
44+
* Export to Azure AD: After running Synchronization, objects are exported from Azure AD CS to **Azure Active Directory**.
4545

4646
### **Step by Step Investigation**
4747

0 commit comments

Comments
 (0)