You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Verify any settings that might have been customized for your federation design and deployment documentation. Specifically, look for customizations in **PreferredAuthenticationProtocol**, **federatedIdpMfaBehavior**, **SupportsMfa** (if **federatedIdpMfaBehavior**is not set), and **PromptLoginBehavior**.
57
+
Verify any settings that might have been customized for your federation design and deployment documentation. Specifically, look for customizations in **PreferredAuthenticationProtocol**, **federatedIdpMfaBehavior**, **SupportsMfa** (if **federatedIdpMfaBehavior**isn't set), and **PromptLoginBehavior**.
58
58
59
59
### Back up federation settings
60
60
@@ -113,7 +113,7 @@ You can't customize Azure AD sign-in experience. No matter how your users signed
113
113
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
114
114
115
115
>[!NOTE]
116
-
>Organization branding is not available in free Azure AD licenses unless you've a Microsoft 365 license.
116
+
>Organization branding isn't available in free Azure AD licenses unless you've a Microsoft 365 license.
117
117
118
118
### Plan for conditional access policies
119
119
@@ -140,7 +140,7 @@ The following table explains the behavior for each option. For more information,
140
140
141
141
For domains that have already set the **SupportsMfa** property, these rules determine how **federatedIdpMfaBehavior** and **SupportsMfa** work together:
142
142
143
-
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** is not supported.
143
+
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** isn't supported.
144
144
- Once **federatedIdpMfaBehavior** property is set, Azure AD ignores the **SupportsMfa** setting.
145
145
- If the **federatedIdpMfaBehavior** property is never set, Azure AD continues to honor the **SupportsMfa** setting.
146
146
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD defaults to `acceptIfMfaDoneByFederatedIdp` behavior.
@@ -174,7 +174,7 @@ Create groups for staged rollout and also for conditional access policies if you
174
174
175
175
We recommend you use a group mastered in Azure AD, also known as a cloud-only group. You can use Azure AD security groups or Microsoft 365 Groups for both moving users to MFA and for conditional access policies. For more information, see [creating an Azure AD security group](../fundamentals/active-directory-groups-create-azure-portal.md), and this [overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups).
176
176
177
-
The members in a group are automatically enabled for staged rollout. Nested and dynamic groups are not supported for staged rollout.
177
+
The members in a group are automatically enabled for staged rollout. Nested and dynamic groups aren't supported for staged rollout.
178
178
179
179
### Prework for SSO
180
180
@@ -266,7 +266,7 @@ Sign in to the [Azure portal](https://portal.azure.com/), browse to **Azure Acti
266
266
- The computer account's Kerberos decryption key is securely shared with Azure AD.
267
267
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD sign-in.
268
268
269
-
The domain administrator credentials are not stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
269
+
The domain administrator credentials aren't stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
270
270
271
271
6. On the **Ready to configure** page, make sure that the **Start the synchronization process when configuration completes** check box is selected. Then, select **Configure**.
0 commit comments