Skip to content

Commit c12179c

Browse files
committed
address feedback
1 parent 0722cc4 commit c12179c

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/governance/identity-governance-applications-not-provisioned-users.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ ms.collection: M365-identity-device-management
2525

2626
There are three common scenarios in which it's necessary to populate Azure Active Directory (Azure AD) with existing users of an application before you use the application with a Microsoft Entra identity governance feature such as [access reviews](access-reviews-application-preparation.md).
2727

28-
1. Application migrated to Azure AD after using its own identity provider
29-
1. Application that doesn't use Azure AD as its only identity provider
30-
1. Application does not use Azure AD as its identity provider nor does it support provisioning
28+
- Application migrated to Azure AD after using its own identity provider
29+
- Application that doesn't use Azure AD as its only identity provider
30+
- Application does not use Azure AD as its identity provider nor does it support provisioning
3131

3232
For more information on those first two scenarios, where the application supports provisioning, or uses an LDAP directory, SQL database or relies upon Azure AD as its identity provider, see the article [govern an application's existing users](identity-governance-applications-existing-users.md). That article covers how to use identity governance features for existing users of those categories of applications.
3333

@@ -225,19 +225,19 @@ When an application role assignment is created in Azure AD for a user to an appl
225225

226226
## Create the review of the application role assignments
227227

228-
Once the users are in the application roles, and you have the the reviewers identified, then you can configure Azure AD to [start a review](access-reviews-application-preparation.md#create-the-reviews).
228+
Once the users are in the application roles, and you have the reviewers identified, then you can configure Azure AD to [start a review](access-reviews-application-preparation.md#create-the-reviews).
229229

230230
Follow the instructions in the [guide for creating an access review of groups or applications](create-access-review.md), to create the review of the application's role assignments. Configure the review to apply results when it completes.
231231

232232
## Retrieve the assignments that are updated when the reviews are complete
233233

234-
1. When the review completes, you can retrieve the updated list of users with application role assignments.
234+
1. When the review completes, you can retrieve the updated list of users with application role assignments.
235235

236236
```powershell
237237
$res = (Get-MgServicePrincipalAppRoleAssignedTo -ServicePrincipalId $azuread_sp.Id -All)
238238
```
239239

240-
1. The columns `PrincipalDisplayName` and `PrincipalId` contain the display names and Azure AD user IDs of each user who retains an application role assignment.
240+
1. The columns `PrincipalDisplayName` and `PrincipalId` contain the display names and Azure AD user IDs of each user who retains an application role assignment.
241241

242242

243243
## Next steps

0 commit comments

Comments
 (0)