Skip to content

Commit a28bc02

Browse files
Merge pull request #217509 from v-hgampala/broken-links-fixing
Product Backlog Item 2157610: SaaS App Tutorial: Fixing Broken links …
2 parents 48dc1ce + 401b105 commit a28bc02

File tree

5 files changed

+13
-13
lines changed

5 files changed

+13
-13
lines changed

articles/active-directory/saas-apps/invision-provisioning-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 06/25/2020
16+
ms.date: 11/08/2022
1717
ms.author: thwimmer
1818
---
1919

@@ -35,7 +35,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3535

3636
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
3737
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
38-
* An [InVision Enterprise account](https://www.invisionapp.com/enterprise) with SSO enabled.
38+
* An [InVision Enterprise account](https://www.invisionapp.com/) with SSO enabled.
3939
* A user account in InVision with Admin permissions.
4040

4141
## Step 1. Plan your provisioning deployment
@@ -45,7 +45,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4545

4646
## Step 2. Configure InVision to support provisioning with Azure AD
4747

48-
1. Sign in to your [InVision Enterprise account](https://www.invisionapp.com/enterprise) as an Admin or Owner. Open the **Team Settings** drawer on the bottom left and select **Settings**.
48+
1. Sign in to your [InVision Enterprise account](https://www.invisionapp.com/) as an Admin or Owner. Open the **Team Settings** drawer on the bottom left and select **Settings**.
4949

5050
![SCIM setup configuration](./media/invision-provisioning-tutorial/invision-scim-settings.png)
5151

articles/active-directory/saas-apps/juno-journey-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 04/16/2020
12+
ms.date: 11/08/2022
1313
ms.author: thwimmer
1414
---
1515

@@ -31,7 +31,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3131

3232
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
3333
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
34-
* A [Juno Journey tenant](https://www.junojourney.com/getstarted).
34+
* A [Juno Journey tenant](https://app.junojourney.com/login).
3535
* A user account in Juno Journey with Admin permissions.
3636

3737
## Step 1. Plan your provisioning deployment

articles/active-directory/saas-apps/mobilexpense-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/29/2022
12+
ms.date: 11/08/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Mobile Xpense
@@ -88,7 +88,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8888
`https://<sub-domain>.mobilexpense.com/<customername>`
8989

9090
> [!NOTE]
91-
> These values are not real. Update these values with the actual Reply URL and Sign-on URL. Contact [Mobile Xpense Client support team](https://www.mobilexpense.net/contact) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
91+
> These values are not real. Update these values with the actual Reply URL and Sign-on URL. Contact [Mobile Xpense Client support team](https://www.mobilexpense.com/contact) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9292

9393
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
9494

@@ -124,11 +124,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124124

125125
## Configure Mobile Xpense SSO
126126

127-
To configure single sign-on on **Mobile Xpense** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Mobile Xpense support team](https://www.mobilexpense.net/contact). They set this setting to have the SAML SSO connection set properly on both sides.
127+
To configure single sign-on on **Mobile Xpense** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Mobile Xpense support team](https://www.mobilexpense.com/contact). They set this setting to have the SAML SSO connection set properly on both sides.
128128

129129
### Create Mobile Xpense test user
130130

131-
In this section, you create a user called Britta Simon in Mobile Xpense. Work with [Mobile Xpense support team](https://www.mobilexpense.net/contact) to add the users in the Mobile Xpense platform. Users must be created and activated before you use single sign-on.
131+
In this section, you create a user called Britta Simon in Mobile Xpense. Work with [Mobile Xpense support team](https://www.mobilexpense.com/contact) to add the users in the Mobile Xpense platform. Users must be created and activated before you use single sign-on.
132132

133133
## Test SSO
134134

articles/active-directory/saas-apps/predictixpricereporting-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8484
`https://<companyname-pricing>.predictix.com/sso/request`
8585

8686
> [!NOTE]
87-
> These values are placeholders. Update these values with the actual Identifier and Sign on URL. Contact the [Predictix Price Reporting support team](https://www.infor.com/company/customer-center/) to get the values. You can also refer to the patterns shown in the **Basic SAML Configuration** dialog box in the Azure portal.
87+
> These values are placeholders. Update these values with the actual Identifier and Sign on URL. Contact the [Predictix Price Reporting support team](https://www.infor.com/customer-center) to get the values. You can also refer to the patterns shown in the **Basic SAML Configuration** dialog box in the Azure portal.
8888

8989
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select the **Download** link next to **Certificate (Base64)**, per your requirements, and save the certificate on your computer:
9090

@@ -120,11 +120,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
120120

121121
## Configure Predictix Price Reporting SSO
122122

123-
To configure single sign-on on the Predictix Price Reporting side, you need to send the certificate that you downloaded and the URLs that you copied from the Azure portal to the [Predictix Price Reporting support team](https://www.infor.com/company/customer-center/). This team ensures the SAML SSO connection is set properly on both sides.
123+
To configure single sign-on on the Predictix Price Reporting side, you need to send the certificate that you downloaded and the URLs that you copied from the Azure portal to the [Predictix Price Reporting support team](https://www.infor.com/customer-center). This team ensures the SAML SSO connection is set properly on both sides.
124124

125125
### Create a Predictix Price Reporting test user
126126

127-
Next, you need to create a user named Britta Simon in Predictix Price Reporting. Work with the [Predictix Price Reporting support team](https://www.infor.com/company/customer-center/) to add users. Users need to be created and activated before you use single sign-on.
127+
Next, you need to create a user named Britta Simon in Predictix Price Reporting. Work with the [Predictix Price Reporting support team](https://www.infor.com/customer-center) to add users. Users need to be created and activated before you use single sign-on.
128128

129129
## Test SSO
130130

articles/active-directory/saas-apps/zendesk-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4646

4747
## Step 2. Configure Zendesk to support provisioning with Azure AD
4848

49-
1. Log in to [Admin Center](https://support.zendesk.com/hc/en-us/articles/4408839227290#topic_hfg_dyz_1hb), click **Apps and integrations** in the sidebar, then select **APIs > Zendesk APIs**.
49+
1. Log in to [Admin Center](https://support.zendesk.com/hc/en-us/articles/4581766374554#topic_hfg_dyz_1hb), click **Apps and integrations** in the sidebar, then select **APIs > Zendesk APIs**.
5050
1. Click the **Settings** tab, and make sure Token Access is **enabled**.
5151
1. Click the **Add API token** button to the right of **Active API Tokens**.The token is generated and displayed.
5252
1. Enter an **API token description**.

0 commit comments

Comments
 (0)