Skip to content

Commit 89016a3

Browse files
committed
[BULK] DocuTune - Standardize formatting of Azure portal links
1 parent fba2fd7 commit 89016a3

27 files changed

+126
-154
lines changed

articles/active-directory/saas-apps/adobe-identity-management-provisioning-oidc-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
* Review the [adobe documentation](https://helpx.adobe.com/enterprise/admin-guide.html/enterprise/using/add-azure-sync.ug.html) on user provisioning
4141

4242
> [!NOTE]
43-
> If your organization uses the User Sync Tool or a UMAPI integration, you must first pause the integration. Then, add Azure AD automatic provisioning to automate user management from the Azure Portal. Once Azure AD automatic provisioning is configured and running, you can completely remove the User Sync Tool or UMAPI integration.
43+
> If your organization uses the User Sync Tool or a UMAPI integration, you must first pause the integration. Then, add Azure AD automatic provisioning to automate user management from the Azure portal. Once Azure AD automatic provisioning is configured and running, you can completely remove the User Sync Tool or UMAPI integration.
4444
4545
## Step 1. Plan your provisioning deployment
4646
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).

articles/active-directory/saas-apps/adobe-identity-management-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
* Review the [adobe documentation](https://helpx.adobe.com/enterprise/admin-guide.html/enterprise/using/add-azure-sync.ug.html) on user provisioning
4141

4242
> [!NOTE]
43-
> If your organization uses the User Sync Tool or a UMAPI integration, you must first pause the integration. Then, add Azure AD automatic provisioning to automate user management from the Azure Portal. Once Azure AD automatic provisioning is configured and running, you can completely remove the User Sync Tool or UMAPI integration.
43+
> If your organization uses the User Sync Tool or a UMAPI integration, you must first pause the integration. Then, add Azure AD automatic provisioning to automate user management from the Azure portal. Once Azure AD automatic provisioning is configured and running, you can completely remove the User Sync Tool or UMAPI integration.
4444
4545
## Step 1. Plan your provisioning deployment
4646
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).

articles/active-directory/saas-apps/box-userprovisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If automatic provisioning is enabled, then the assigned users and/or groups are
7676
* If group objects were configured to be provisioned, then all assigned group objects are provisioned to Box, and all users that are members of those groups. The group and user memberships are preserved upon being written to Box.
7777

7878
> [!TIP]
79-
> You may also choose to enabled SAML-based Single Sign-On for Box, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
79+
> You may also choose to enabled SAML-based Single Sign-On for Box, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
8080
8181
### To configure automatic user account provisioning:
8282

@@ -129,4 +129,4 @@ In your Box tenant, synchronized users are listed under **Managed Users** in the
129129

130130
* [Managing user account provisioning for Enterprise Apps](tutorial-list.md)
131131
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
132-
* [Configure Single Sign-on](box-tutorial.md)
132+
* [Configure Single Sign-on](box-tutorial.md)

articles/active-directory/saas-apps/cernercentral-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Before configuring and enabling the provisioning service, you should decide what
4747
This section guides you through connecting your Azure AD to Cerner Central’s User Roster using Cerner's SCIM user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in Cerner Central based on user and group assignment in Azure AD.
4848

4949
> [!TIP]
50-
> You may also choose to enable SAML-based single sign-on for Cerner Central, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features complement each other. For more information, see the [Cerner Central single sign-on tutorial](cernercentral-tutorial.md).
50+
> You may also choose to enable SAML-based single sign-on for Cerner Central, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features complement each other. For more information, see the [Cerner Central single sign-on tutorial](cernercentral-tutorial.md).
5151
5252
### To configure automatic user account provisioning to Cerner Central in Azure AD:
5353

articles/active-directory/saas-apps/citrixgotomeeting-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before configuring and enabling the provisioning service, you need to decide wha
4545
This section guides you through connecting your Azure AD to GoToMeeting's user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in GoToMeeting based on user and group assignment in Azure AD.
4646

4747
> [!TIP]
48-
> You may also choose to enabled SAML-based Single Sign-On for GoToMeeting, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
48+
> You may also choose to enabled SAML-based Single Sign-On for GoToMeeting, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
4949
5050
### To configure automatic user account provisioning:
5151

articles/active-directory/saas-apps/concur-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before configuring and enabling the provisioning service, you need to decide wha
4545
This section guides you through connecting your Azure AD to Concur's user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in Concur based on user and group assignment in Azure AD.
4646

4747
> [!Tip]
48-
> You may also choose to enabled SAML-based Single Sign-On for Concur, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
48+
> You may also choose to enabled SAML-based Single Sign-On for Concur, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
4949
5050
### To configure user account provisioning:
5151

articles/active-directory/saas-apps/docusign-provisioning-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before configuring and enabling the provisioning service, you need to decide wha
4545
This section guides you through connecting your Azure AD to DocuSign's user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in DocuSign based on user and group assignment in Azure AD.
4646

4747
> [!Tip]
48-
> You may also choose to enabled SAML-based Single Sign-On for DocuSign, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
48+
> You may also choose to enabled SAML-based Single Sign-On for DocuSign, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features compliment each other.
4949
5050
### To configure user account provisioning:
5151

@@ -63,9 +63,9 @@ The objective of this section is to outline how to enable user provisioning of A
6363

6464
1. Under the **Admin Credentials** section, provide the following configuration settings:
6565

66-
a. In the **Admin User Name** textbox, type a DocuSign account name that has the **System Administrator** profile in DocuSign.com assigned.
66+
1. In the **Admin User Name** textbox, type a DocuSign account name that has the **System Administrator** profile in DocuSign.com assigned.
6767

68-
b. In the **Admin Password** textbox, type the password for this account.
68+
1. In the **Admin Password** textbox, type the password for this account.
6969

7070
> [!NOTE]
7171
> If both SSO and user provisioning is setup, the authorization credentials used for provisioning needs to be configured to work with both SSO and Username/Password.

articles/active-directory/saas-apps/f5-big-ip-headers-easy-button.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
9797

9898
This first step creates a tenant app registration that will be used to authorize the **Easy Button** access to Graph. Through these permissions, the BIG-IP will be allowed to push the configurations required to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
9999

100-
1. Sign-in to the [Azure portal](https://portal.azure.com/) using an account with Application Administrative rights.
100+
1. Sign in to the [Azure portal](https://portal.azure.com/) using an account with Application Administrative rights.
101101
2. From the left navigation pane, select the **Azure Active Directory** service.
102102
3. Under Manage, select **App registrations > New registration**.
103103
4. Enter a display name for your application. For example, `F5 BIG-IP Easy Button`.
@@ -280,13 +280,13 @@ Our backend application sits on HTTP port 80 but obviously switch to 443 if your
280280

281281
Enabling SSO allows users to access BIG-IP published services without having to enter credentials. The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO, the latter of which we’ll enable to configure the following.
282282

283-
* **Header Operation:** Insert
284-
* **Header Name:** upn
285-
* **Header Value:** %{session.saml.last.identity}
283+
* **Header Operation:** `Insert`
284+
* **Header Name:** `upn`
285+
* **Header Value:** `%{session.saml.last.identity}`
286286

287-
* **Header Operation:** Insert
288-
* **Header Name:** employeeid
289-
* **Header Value:** %{session.saml.last.attr.name.employeeid}
287+
* **Header Operation:** `Insert`
288+
* **Header Name:** `employeeid`
289+
* **Header Value:** `%{session.saml.last.attr.name.employeeid}`
290290

291291
![Screenshot for SSO and HTTP headers.](./media/f5-big-ip-headers-easy-button/sso-http-headers.png)
292292

articles/active-directory/saas-apps/f5-big-ip-sap-erp-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Before a client or service can access Microsoft Graph, it must be trusted by the
9999

100100
The Easy Button client must also be registered in Azure AD, before it is allowed to establish a trust between each SAML SP instance of a BIG-IP published application, and Azure AD as the SAML IdP.
101101

102-
1. Sign-in to the [Azure portal](https://portal.azure.com/) using an account with Application Administrative rights
102+
1. Sign in to the [Azure portal](https://portal.azure.com/) using an account with Application Administrative rights
103103

104104
2. From the left navigation pane, select the **Azure Active Directory** service
105105

@@ -379,4 +379,4 @@ If you don’t see a BIG-IP error page, then the issue is probably more related
379379

380380
2. Select the link for your active session. The **View Variables** link in this location may also help determine root cause KCD issues, particularly if the BIG-IP APM fails to obtain the right user and domain identifiers from session variables
381381

382-
See [BIG-IP APM variable assign examples]( https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference]( https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.
382+
See [BIG-IP APM variable assign examples]( https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference]( https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.

articles/active-directory/saas-apps/hashicorp-cloud-platform-hcp-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,13 +59,13 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
5959

6060
1. On the **Basic SAML Configuration** section, perform the following steps:
6161

62-
a. In the **Identifier** textbox, type a value using the following pattern:
62+
1. In the **Identifier** textbox, type a value using the following pattern:
6363
`urn:hashicorp:HCP-SSO-<HCP_ORG_ID>-samlp`
6464

65-
b. In the **Reply URL** textbox, type a URL using the following pattern:
65+
1. In the **Reply URL** textbox, type a URL using the following pattern:
6666
`https://auth.hashicorp.com/login/callback?connection=HCP-SSO-<ORG_ID>-samlp`
6767

68-
c. In the **Sign on URL** textbox, type a URL using the following pattern:
68+
1. In the **Sign on URL** textbox, type a URL using the following pattern:
6969
`https://portal.cloud.hashicorp.com/sign-in?conn-id=HCP-SSO-<HCP_ORG_ID>-samlp`
7070

7171
> [!NOTE]
@@ -85,7 +85,7 @@ To configure single sign-on on the **HashiCorp Cloud Platform (HCP)** side, you
8585

8686
## Test SSO
8787

88-
In the previous [Create and assign Azure AD test user](#create-and-assign-azure-ad-test-user) section, you created a user called B.Simon and assigned it to the HashiCorp Cloud Platform (HCP) app within the Azure Portal. This can now be used for testing the SSO connection. You may also use any account that is already associated with the HashiCorp Cloud Platform (HCP) app in the Azure Portal.
88+
In the previous [Create and assign Azure AD test user](#create-and-assign-azure-ad-test-user) section, you created a user called B.Simon and assigned it to the HashiCorp Cloud Platform (HCP) app within the Azure portal. This can now be used for testing the SSO connection. You may also use any account that is already associated with the HashiCorp Cloud Platform (HCP) app in the Azure portal.
8989

9090
## Additional resources
9191

@@ -95,4 +95,4 @@ In the previous [Create and assign Azure AD test user](#create-and-assign-azure-
9595

9696
## Next steps
9797

98-
Once you configure HashiCorp Cloud Platform (HCP) you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
98+
Once you configure HashiCorp Cloud Platform (HCP) you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)