Skip to content

Commit a8683a2

Browse files
authored
Update migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md
1 parent 2b71458 commit a8683a2

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/manage-apps/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.subservice: app-mgmt
1414

1515
# Tutorial: Migrate Okta sign-on policies to Azure Active Directory Conditional Access
1616

17-
In this tutorial, learn to migrate an an organization from global or application-level sign-on policies in Okta Conditional Access in Azure Active Directory (Azure AD). Conditional Access policies secure user access in Azure AD and connected applications.
17+
In this tutorial, learn to migrate an organization from global or application-level sign-on policies in Okta Conditional Access in Azure Active Directory (Azure AD). Conditional Access policies secure user access in Azure AD and connected applications.
1818

1919
Learn more: [What is Conditional Access?](/azure/active-directory/conditional-access/overview)
2020

@@ -25,7 +25,7 @@ This tutorial assumes you have:
2525

2626
## Prerequisites
2727

28-
See the following two section for licensing and credentials prerequisites.
28+
See the following two sections for licensing and credentials prerequisites.
2929

3030
### Licensing
3131

@@ -47,18 +47,18 @@ Locate and evaluate Okta sign-on policies to determine what will be transitioned
4747

4848
2. Go to **Applications**.
4949
3. From the submenu, select **Applications**
50-
4. From the **Active apps list**, select the Microsft Office 365 connected instance.
50+
4. From the **Active apps list**, select the Microsoft Office 365 connected instance.
5151

5252
![Screenshot of settings under Sign On, for Microsoft Office 365.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/global-sign-on-policies-enforce-mfa.png)
5353

5454
5. Select **Sign On**.
5555
6. Scroll to the bottom of the page.
5656

57-
The Microsft Office 365 application sign-on policy has four rules:
57+
The Microsoft Office 365 application sign-on policy has four rules:
5858

5959
- **Enforce MFA for Mobile Sessions** - Requires MFA from modern authentication or browser sessions on iOS or Android
6060
- **Allow Trusted Windows Devices** - Prevents unnecessary verification or factor prompts for trusted Okta devices
61-
- **Require MFA from Untrusted Windows Devices** - Requires MFA from modern authentication or browser sessios on untrusted Windows devices
61+
- **Require MFA from Untrusted Windows Devices** - Requires MFA from modern authentication or browser sessions on untrusted Windows devices
6262
- **Block Legacy Authentication** - Prevents legacy authentication clients from connecting to the service
6363

6464
![Screenshot of conditions and actions for the four rules, on the Sign On Policy screen.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/sign-on-rules.png)
@@ -70,7 +70,7 @@ Configure Conditional Access policies to match Okta conditions. However, in some
7070
* Okta network locations to named locations in Azure AD
7171
* [Using the location condition in a Conditional Access policy](/articles/active-directory/conditional-access/location-condition.md#named-locations)
7272
* Okta device trust to device-based Conditional Access (two options to evaluate user devices):
73-
* See the following section, **Hybrid Azure AD join configuration** to synchronizes Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD.
73+
* See the following section, **Hybrid Azure AD join configuration** to synchronize Windows devices, such as Windows 10, Windows Server 2016 and 2019, to Azure AD.
7474
* See the following section, **Configure device compliance**
7575

7676
### Hybrid Azure AD join configuration
@@ -127,7 +127,7 @@ Before you convert to Conditional Access, confirm the base MFA tenant settings f
127127

128128
![Screenshot of the multi-factor authentication screen with the search feature highlighted.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/disable-user-legacy-azure-ad-portal.png)
129129

130-
6. Esure the **Enforced** field is empty.
130+
6. Ensure the **Enforced** field is empty.
131131
7. Select the **Service settings** option.
132132
8. Change the **App passwords** selection to **Do not allow users to create app passwords to sign in to non-browser apps**.
133133

@@ -191,7 +191,7 @@ Learn more: [Enable combined security information registration in Azure Active D
191191
![Screenshot of MFA verification through Okta.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta.png)
192192

193193
4. The user is prompted for Conditional Access.
194-
5. Ensure the policies were configured to be triggered for MFA.
194+
5. Ensure the policies are configured to be triggered for MFA.
195195

196196
![Screenshot of MFA verification through Okta prompted for Conditional Access.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta-prompted-ca.png)
197197

0 commit comments

Comments
 (0)