You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/kisi-physical-security-provisioning-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
70
70
71
71
## Step 5. Configure automatic user provisioning to Kisi Physical Security
72
72
73
-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Kisi Physical Security based on user and/or group assignments in Azure AD.
73
+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and groups in Kisi Physical Security based on user and/or group assignments in Azure AD.
74
74
75
75
### To configure automatic user provisioning for Kisi Physical Security in Azure AD:
76
76
@@ -129,7 +129,7 @@ This section guides you through the steps to configure the Azure AD provisioning
129
129
130
130

131
131
132
-
1. Define the users and/or groups that you would like to provision to Kisi Physical Security by choosing the desired values in **Scope** in the **Settings** section.
132
+
1. Define the users and groups that you would like to provision to Kisi Physical Security by choosing the appropriate values in **Scope** in the **Settings** section.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
41
41
42
42
To test the steps in this tutorial, you should follow these recommendations:
43
43
44
-
-Do not use your production environment, unless it is necessary.
44
+
-Don't use your production environment, unless it is necessary.
45
45
- If you don't have an Azure AD trial environment, you can get a one-month trial [here](https://azure.microsoft.com/pricing/free-trial/).
46
46
47
47
## Step 1. Plan your provisioning deployment
@@ -53,13 +53,13 @@ To test the steps in this tutorial, you should follow these recommendations:
53
53
54
54
Before configuring and enabling the provisioning service, you need to decide what users in Azure AD represent the users who need access to your Workplace by Facebook app. Once decided, you can assign these users to your Workplace by Facebook app by following the instructions here:
55
55
56
-
* It is recommended that a single Azure AD user is assigned to Workplace by Facebook to test the provisioning configuration. More users may be assigned later.
56
+
* It's recommended that a single Azure AD user is assigned to Workplace by Facebook to test the provisioning configuration. More users may be assigned later.
57
57
58
-
* When assigning a user to Workplace by Facebook, you must select a valid user role. The "Default Access" role does not work for provisioning.
58
+
* When assigning a user to Workplace by Facebook, you must select a valid user role. The "Default Access" role doesn't work for provisioning.
59
59
60
60
## Step 3. Add Workplace by Facebook from the Azure AD application gallery
61
61
62
-
Add Workplace by Facebook from the Azure AD application gallery to start managing provisioning to Workplace by Facebook. If you have previously setup Workplace by Facebook for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
62
+
Add Workplace by Facebook from the Azure AD application gallery to start managing provisioning to Workplace by Facebook. If you have previously setup Workplace by Facebook for SSO, you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
63
63
64
64
## Step 4. Define who will be in scope for provisioning
65
65
@@ -88,7 +88,7 @@ This section guides you through the steps to configure the Azure AD provisioning
88
88
89
89

90
90
91
-
5. Under the **Admin Credentials** section, click on **Authorize**. You will be redirected to Workplace by Facebook's authorization page. Input your Workplace by Facebook username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Workplace by Facebook. If the connection fails, ensure your Workplace by Facebook account has Admin permissions and try again.
91
+
5. Under the **Admin Credentials** section, click on **Authorize**. You'll be redirected to Workplace by Facebook's authorization page. Input your Workplace by Facebook username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Workplace by Facebook. If the connection fails, ensure your Workplace by Facebook account has Admin permissions and try again.
92
92
93
93

94
94
@@ -143,11 +143,11 @@ This section guides you through the steps to configure the Azure AD provisioning
143
143
144
144

145
145
146
-
12. Define the users that you would like to provision to Workplace by Facebook by choosing the desired values in **Scope** in the **Settings** section.
146
+
12. Define the users that you would like to provision to Workplace by Facebook by choosing the appropriate values in **Scope** in the **Settings** section.
0 commit comments