Skip to content

Commit 7a5cfa0

Browse files
authored
Update migrate-from-federation-to-cloud-authentication.md
1 parent 80564fa commit 7a5cfa0

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ To find your current federation settings, run [Get-MgDomainFederationConfigurati
5454
Get-MgDomainFederationConfiguration –DomainID yourdomain.com
5555
```
5656

57-
Verify any settings that might have been customized for your federation design and deployment documentation. Specifically, look for customizations in **PreferredAuthenticationProtocol**, **federatedIdpMfaBehavior**, **SupportsMfa** (if **federatedIdpMfaBehavior** is not set), and **PromptLoginBehavior**.
57+
Verify any settings that might have been customized for your federation design and deployment documentation. Specifically, look for customizations in **PreferredAuthenticationProtocol**, **federatedIdpMfaBehavior**, **SupportsMfa** (if **federatedIdpMfaBehavior** isn't set), and **PromptLoginBehavior**.
5858

5959
### Back up federation settings
6060

@@ -113,7 +113,7 @@ You can't customize Azure AD sign-in experience. No matter how your users signed
113113
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
114114
115115
>[!NOTE]
116-
>Organization branding is not available in free Azure AD licenses unless you've a Microsoft 365 license.
116+
>Organization branding isn't available in free Azure AD licenses unless you've a Microsoft 365 license.
117117
118118
### Plan for conditional access policies
119119
@@ -140,7 +140,7 @@ The following table explains the behavior for each option. For more information,
140140
141141
For domains that have already set the **SupportsMfa** property, these rules determine how **federatedIdpMfaBehavior** and **SupportsMfa** work together:
142142
143-
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** is not supported.
143+
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** isn't supported.
144144
- Once **federatedIdpMfaBehavior** property is set, Azure AD ignores the **SupportsMfa** setting.
145145
- If the **federatedIdpMfaBehavior** property is never set, Azure AD continues to honor the **SupportsMfa** setting.
146146
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD defaults to `acceptIfMfaDoneByFederatedIdp` behavior.
@@ -174,7 +174,7 @@ Create groups for staged rollout and also for conditional access policies if you
174174

175175
We recommend you use a group mastered in Azure AD, also known as a cloud-only group. You can use Azure AD security groups or Microsoft 365 Groups for both moving users to MFA and for conditional access policies. For more information, see [creating an Azure AD security group](../fundamentals/active-directory-groups-create-azure-portal.md), and this [overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups).
176176

177-
The members in a group are automatically enabled for staged rollout. Nested and dynamic groups are not supported for staged rollout.
177+
The members in a group are automatically enabled for staged rollout. Nested and dynamic groups aren't supported for staged rollout.
178178

179179
### Prework for SSO
180180

@@ -266,7 +266,7 @@ Sign in to the [Azure portal](https://portal.azure.com/), browse to **Azure Acti
266266
- The computer account's Kerberos decryption key is securely shared with Azure AD.
267267
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD sign-in.
268268

269-
The domain administrator credentials are not stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
269+
The domain administrator credentials aren't stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
270270

271271
6. On the **Ready to configure** page, make sure that the **Start the synchronization process when configuration completes** check box is selected. Then, select **Configure**.
272272

0 commit comments

Comments
 (0)