You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/veracode-tutorial.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,13 +125,13 @@ Notes:
125
125
126
126
1. From the menu on the top, select **Settings** > **Admin**.
127
127
128
-

128
+

129
129
130
130
1. Select the **SAML** tab.
131
131
132
132
1. In the **SAML Certificate** section, perform the following steps:
133
133
134
-

134
+

135
135
136
136
a. For **Issuer**, paste the value of the **Azure AD Identifier** that you've copied from the Azure portal.
137
137
@@ -145,7 +145,7 @@ Notes:
145
145
146
146
1. Select the **JIT Provisioning** tab.
147
147
148
-

148
+

149
149
150
150
1. In the **Organization Settings** section, toggle the **Configure Default Settings for Just-in-Time user provisioning** setting to **On**.
151
151
@@ -180,4 +180,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
180
180
181
181
## Next steps
182
182
183
-
Once you configure Veracode you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
183
+
Once you configure Veracode you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments