Skip to content

Commit c1e0192

Browse files
authored
Merge pull request #113557 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 95d5980 + f8f218c commit c1e0192

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ In the following examples, you create, update, link, and delete policies on appl
163163

164164
If nothing is returned, it means you have no policies created in your tenant.
165165

166-
### Example: Set HRD policy for an application
166+
### Example: Set an HRD policy for an application
167167

168168
In this example, you create a policy that when it is assigned to an application either:
169169
- Auto-accelerates users to an AD FS sign-in screen when they are signing in to an application when there is a single domain in your tenant.
@@ -246,7 +246,7 @@ Note the **ObjectID** of the policy that you want to list assignments for.
246246
Get-AzureADPolicyAppliedObject -id <ObjectId of the Policy>
247247
```
248248

249-
### Example: Remove an HRD policy for an application
249+
### Example: Remove an HRD policy from an application
250250
#### Step 1: Get the ObjectID
251251
Use the previous example to get the **ObjectID** of the policy, and that of the application service principal from which you want to remove it.
252252

articles/active-directory/saas-apps/float-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
3434
To get started, you need the following items:
3535

3636
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37-
* Float single sign-on (SSO) enabled subscription.
37+
* A Float subscription. If you don't have a subscription, you can get a [free account](https://app.float.com/join?).
3838

3939
## Scenario description
4040

@@ -89,7 +89,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8989
In the **Sign-on URL** text box, type a URL in the pattern `https://<hostname>.float.com/login`.
9090

9191
> [!NOTE]
92-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
92+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Replace <hostname> with your Float hostname. Contact [Float Client support team](mailto:[email protected]) if you are unsure. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9393
9494
1. Float application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9595

@@ -140,11 +140,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
140140

141141
## Configure Float SSO
142142

143-
To configure single sign-on on **Float** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Float support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
143+
To configure single sign-on on **Float** side, visit the Float Team Settings section and select Configure from the Authentication module. Paste the Azure AD Login URL in the SAML 2.0 Endpoint URL field, paste the Azure AD Indentifier in the Identity Provider Issuer URL field, paste the full text from the downloaded **Certificate (Base64)** in the X.509 Certificate field, and Save.
144144

145145
### Create Float test user
146146

147-
In this section, you create a user called Britta Simon in Float. Work with [Float support team](mailto:[email protected]) to add the users in the Float platform. Users must be created and activated before you use single sign-on.
147+
In this section, create a user called Britta Simon in Float. Add the user from the People section or Team Settings Guest section, and grant them an access right. Users must be created and accept the invitation before you use single sign-on.
148148

149149
## Test SSO
150150

0 commit comments

Comments
 (0)