Skip to content

Commit 78cbf2a

Browse files
authored
Update migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md
1 parent 4b85eb2 commit 78cbf2a

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/manage-apps/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Configure Conditional Access policies to match Okta conditions. However, in some
6969

7070

7171
* Okta network locations to named locations in Azure AD
72-
* [Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md#named-locations)
72+
* [Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md)
7373
* Okta device trust to device-based Conditional Access (two options to evaluate user devices):
7474
* See the following section, **Hybrid Azure AD join configuration** to synchronize Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD
7575
* See the following section, **Configure device compliance**
@@ -83,7 +83,7 @@ To enable hybrid Azure AD join on your Azure AD Connect server, run the configur
8383
>[!NOTE]
8484
>Hybrid Azure AD join isn't supported with the Azure AD Connect cloud provisioning agents.
8585
86-
1. [Configure hybrid Azure AD join](/articles/active-directory/devices/howto-hybrid-azure-ad-join.md).
86+
1. [Configure hybrid Azure AD join](../devices/howto-hybrid-azure-ad-join.md).
8787
2. On the **SCP configuration** page, select the **Authentication Service** dropdown.
8888

8989
![Screenshot of the Authentication Service dropdown on the Microsoft Azure Active Directory Connect dialog.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/scp-configuration.png)
@@ -153,12 +153,12 @@ After you configure the prerequisites and established base settings, you can bui
153153

154154
Before you get started:
155155

156-
* [Understand Conditional Access policy components](/articles/active-directory/conditional-access/plan-conditional-access.md#understand-conditional-access-policy-components)
157-
* [Building a Conditional Access policy](/azure/active-directory/conditional-access/concept-conditional-access-policies)
156+
* [Understand Conditional Access policy components](../conditional-access/plan-conditional-access.md#understand-conditional-access-policy-components)
157+
* [Building a Conditional Access policy](../conditional-access/concept-conditional-access-policies.md)
158158

159159
1. Go to the [Azure portal](https://portal.azure.com).
160160
2. On **Manage Azure Active Directory**, select **View**.
161-
3. Create a policy. See, [Common Conditional Access policy: Require MFA for all users](/articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md).
161+
3. Create a policy. See, [Common Conditional Access policy: Require MFA for all users](../conditional-access/howto-conditional-access-policy-all-users-mfa.md).
162162
4. Create a device trust-based Conditional Access rule.
163163

164164
![Screenshot of entries for Require Trusted Devices for Access, under Conditional Access.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/test-user.png)
@@ -177,7 +177,7 @@ For individual registration, users go to [Microsoft Sign-in pane](https://aka.ms
177177

178178
To manage registration, users go to [Microsoft My Sign-Ins | Security Info](https://aka.ms/mysecurityinfo).
179179

180-
Learn more: [Enable combined security information registration in Azure Active Directory](/articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md).
180+
Learn more: [Enable combined security information registration in Azure Active Directory](../authentication/howto-registration-mfa-sspr-combined.md).
181181

182182
>[!NOTE]
183183
>If users registered, they're redirected to the **My Security** page, after they satisfy MFA.

0 commit comments

Comments
 (0)