You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Configure Conditional Access policies to match Okta conditions. However, in some
69
69
70
70
71
71
* Okta network locations to named locations in Azure AD
72
-
*[Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md#named-locations)
72
+
*[Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md)
73
73
* Okta device trust to device-based Conditional Access (two options to evaluate user devices):
74
74
* See the following section, **Hybrid Azure AD join configuration** to synchronize Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD
75
75
* See the following section, **Configure device compliance**
@@ -83,7 +83,7 @@ To enable hybrid Azure AD join on your Azure AD Connect server, run the configur
83
83
>[!NOTE]
84
84
>Hybrid Azure AD join isn't supported with the Azure AD Connect cloud provisioning agents.
85
85
86
-
1.[Configure hybrid Azure AD join](/articles/active-directory/devices/howto-hybrid-azure-ad-join.md).
86
+
1.[Configure hybrid Azure AD join](../devices/howto-hybrid-azure-ad-join.md).
87
87
2. On the **SCP configuration** page, select the **Authentication Service** dropdown.
88
88
89
89

@@ -153,12 +153,12 @@ After you configure the prerequisites and established base settings, you can bui
*[Building a Conditional Access policy](../conditional-access/concept-conditional-access-policies.md)
158
158
159
159
1. Go to the [Azure portal](https://portal.azure.com).
160
160
2. On **Manage Azure Active Directory**, select **View**.
161
-
3. Create a policy. See, [Common Conditional Access policy: Require MFA for all users](/articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md).
161
+
3. Create a policy. See, [Common Conditional Access policy: Require MFA for all users](../conditional-access/howto-conditional-access-policy-all-users-mfa.md).
162
162
4. Create a device trust-based Conditional Access rule.
163
163
164
164

@@ -177,7 +177,7 @@ For individual registration, users go to [Microsoft Sign-in pane](https://aka.ms
177
177
178
178
To manage registration, users go to [Microsoft My Sign-Ins | Security Info](https://aka.ms/mysecurityinfo).
179
179
180
-
Learn more: [Enable combined security information registration in Azure Active Directory](/articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md).
180
+
Learn more: [Enable combined security information registration in Azure Active Directory](../authentication/howto-registration-mfa-sspr-combined.md).
181
181
182
182
>[!NOTE]
183
183
>If users registered, they're redirected to the **My Security** page, after they satisfy MFA.
0 commit comments