Skip to content

Commit 890416a

Browse files
authored
Update migrate-from-federation-to-cloud-authentication.md
1 parent ba7d463 commit 890416a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,11 +78,11 @@ When technology projects fail, it's typically because of mismatched expectations
7878
7979
After migrating to cloud authentication, the user sign-in experience for accessing Microsoft 365 and other resources that are authenticated through Azure AD changes. Users who are outside the network see only the Azure AD sign-in page.
8080
81-
Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
81+
Proactively communicate with your users how their experience changes, when it changes, and how to gain support if they experience issues.
8282
8383
### Plan the maintenance window
8484
85-
Modern authentication clients (Office 2016 and Office 2013, iOS, and Android apps) use a valid refresh token to obtain new access tokens for continued access to resources instead of returning to AD FS. These clients are immune to any password prompts resulting from the domain conversion process. The clients will continue to function without extra configuration.
85+
Modern authentication clients (Office 2016 and Office 2013, iOS, and Android apps) use a valid refresh token to obtain new access tokens for continued access to resources instead of returning to AD FS. These clients are immune to any password prompts resulting from the domain conversion process. The clients continue to function without extra configuration.
8686
8787
>[!NOTE]
8888
>When you migrate from federated to cloud authentication, the process to convert the domain from federated to managed may take up to 60 minutes. During this process, users might not be prompted for credentials for any new logins to Azure portal or other browser based applications protected with Azure AD. We recommend that you include this delay in your maintenance window.
@@ -142,8 +142,8 @@ For domains that have already set the **SupportsMfa** property, these rules dete
142142
143143
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** is not supported.
144144
- Once **federatedIdpMfaBehavior** property is set, Azure AD ignores the **SupportsMfa** setting.
145-
- If the **federatedIdpMfaBehavior** property is never set, Azure AD will continue to honor the **SupportsMfa** setting.
146-
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD will default to `acceptIfMfaDoneByFederatedIdp` behavior.
145+
- If the **federatedIdpMfaBehavior** property is never set, Azure AD continues to honor the **SupportsMfa** setting.
146+
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD defaults to `acceptIfMfaDoneByFederatedIdp` behavior.
147147
148148
You can check the status of protection by running [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true):
149149
@@ -273,7 +273,7 @@ Sign in to the [Azure portal](https://portal.azure.com/), browse to **Azure Acti
273273
![Ready to configure page](media/deploy-cloud-user-authentication/ready-to-configure.png)
274274

275275
> [!IMPORTANT]
276-
> At this point, all your federated domains will change to managed authentication. Your selected User sign-in method is the new method of authentication.
276+
> At this point, all your federated domains changes to managed authentication. Your selected User sign-in method is the new method of authentication.
277277
278278
1. In the Azure portal, select **Azure Active Directory**, and then select **Azure AD Connect**.
279279

0 commit comments

Comments
 (0)