Skip to content

Commit 99af2f7

Browse files
authored
Merge pull request #111663 from MicrosoftDocs/master
4/16 AM Publish
2 parents b55d7c8 + 19a5f0f commit 99af2f7

File tree

72 files changed

+652
-436
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+652
-436
lines changed

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before combined registration, users registered authentication methods for Azure
2222
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2323

2424
> [!div class="nextstepaction"]
25-
> [Enable combined security regiration](howto-registration-mfa-sspr-combined.md)
25+
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2626
2727
![My Profile showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defualts-registered.png)
2828

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ landingContent:
5454
url: whatis-phs.md
5555
- text: What is passthrough authentication?
5656
url: how-to-connect-pta.md
57-
- text: What is federtation?
57+
- text: What is federation?
5858
url: whatis-fed.md
5959
- text: What is single sign-on?
6060
url: how-to-connect-sso.md
@@ -100,4 +100,4 @@ landingContent:
100100

101101

102102

103-
103+

articles/active-directory/saas-apps/highground-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.highground.com/`
84+
`https://app.highground.com/`
8585

8686
b. In the **Reply URL** text box, type a URL using the following pattern:
87-
`https://<SUBDOMAIN>.highground.com/svc/SSONoAuth/<companyName>`
87+
`https://app.highground.com/svc/SSONoAuth/SAML?groupid=<company-guid>`
8888

8989
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9090

9191
In the **Sign-on URL** text box, type a URL using the following pattern:
92-
`https://app.highground.com/#/login/<companyName>`
92+
`https://app.highground.com/#/login/<company-slug>`
9393

9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
-36.2 KB
Loading
-22.3 KB
Loading
-18.3 KB
Loading
-15.5 KB
Loading
-28 KB
Loading
-23.7 KB
Loading
-29.6 KB
Loading

0 commit comments

Comments
 (0)