You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.subservice: app-mgmt
14
14
15
15
# Tutorial: Migrate Okta sign-on policies to Azure Active Directory Conditional Access
16
16
17
-
In this tutorial, learn to migrate an an organization from global or application-level sign-on policies in Okta Conditional Access in Azure Active Directory (Azure AD). Conditional Access policies secure user access in Azure AD and connected applications.
17
+
In this tutorial, learn to migrate an organization from global or application-level sign-on policies in Okta Conditional Access in Azure Active Directory (Azure AD). Conditional Access policies secure user access in Azure AD and connected applications.
18
18
19
19
Learn more: [What is Conditional Access?](/azure/active-directory/conditional-access/overview)
20
20
@@ -25,7 +25,7 @@ This tutorial assumes you have:
25
25
26
26
## Prerequisites
27
27
28
-
See the following two section for licensing and credentials prerequisites.
28
+
See the following two sections for licensing and credentials prerequisites.
29
29
30
30
### Licensing
31
31
@@ -47,18 +47,18 @@ Locate and evaluate Okta sign-on policies to determine what will be transitioned
47
47
48
48
2. Go to **Applications**.
49
49
3. From the submenu, select **Applications**
50
-
4. From the **Active apps list**, select the Microsft Office 365 connected instance.
50
+
4. From the **Active apps list**, select the Microsoft Office 365 connected instance.
51
51
52
52

53
53
54
54
5. Select **Sign On**.
55
55
6. Scroll to the bottom of the page.
56
56
57
-
The Microsft Office 365 application sign-on policy has four rules:
57
+
The Microsoft Office 365 application sign-on policy has four rules:
58
58
59
59
-**Enforce MFA for Mobile Sessions** - Requires MFA from modern authentication or browser sessions on iOS or Android
60
60
-**Allow Trusted Windows Devices** - Prevents unnecessary verification or factor prompts for trusted Okta devices
61
-
-**Require MFA from Untrusted Windows Devices** - Requires MFA from modern authentication or browser sessios on untrusted Windows devices
61
+
-**Require MFA from Untrusted Windows Devices** - Requires MFA from modern authentication or browser sessions on untrusted Windows devices
62
62
-**Block Legacy Authentication** - Prevents legacy authentication clients from connecting to the service
63
63
64
64

@@ -70,7 +70,7 @@ Configure Conditional Access policies to match Okta conditions. However, in some
70
70
* Okta network locations to named locations in Azure AD
71
71
*[Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md#named-locations)
72
72
* Okta device trust to device-based Conditional Access (two options to evaluate user devices):
73
-
* See the following section, **Hybrid Azure AD join configuration** to synchronizes Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD.
73
+
* See the following section, **Hybrid Azure AD join configuration** to synchronize Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD.
74
74
* See the following section, **Configure device compliance**
75
75
76
76
### Hybrid Azure AD join configuration
@@ -127,7 +127,7 @@ Before you convert to Conditional Access, confirm the base MFA tenant settings f
127
127
128
128

129
129
130
-
6.Esure the **Enforced** field is empty.
130
+
6.Ensure the **Enforced** field is empty.
131
131
7. Select the **Service settings** option.
132
132
8. Change the **App passwords** selection to **Do not allow users to create app passwords to sign in to non-browser apps**.
133
133
@@ -191,7 +191,7 @@ Learn more: [Enable combined security information registration in Azure Active D
191
191

192
192
193
193
4. The user is prompted for Conditional Access.
194
-
5. Ensure the policies were configured to be triggered for MFA.
194
+
5. Ensure the policies are configured to be triggered for MFA.
195
195
196
196

0 commit comments