Skip to content

Commit d1dbe11

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents cf8b76e + f1a1ca1 commit d1dbe11

File tree

248 files changed

+2943
-978
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

248 files changed

+2943
-978
lines changed

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The following table describes the password policy settings applied to user accou
7777

7878
| Property | Requirements |
7979
| --- | --- |
80-
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ‘ , . ? / ` ~ " ( ) ;</li></ul> |
80+
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ‘ , . ? / \` ~ " ( ) ;</li></ul> |
8181
| Characters not allowed |<ul><li>Unicode characters.</li><li>Spaces.</li><li> Cannot contain a dot character "." immediately preceding the "\@\" symbol”.</li></ul> |
8282
| Password restrictions |<ul><li>A minimum of 8 characters and a maximum of 16 characters.</li><li>Requires three out of four of the following:<ul><li>Lowercase characters.</li><li>Uppercase characters.</li><li>Numbers (0-9).</li><li>Symbols (see the previous password restrictions).</li></ul></li></ul> |
8383
| Password expiry duration |<ul><li>Default value: **90** days.</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |

articles/active-directory/managed-identities-azure-resources/qs-configure-rest-vm.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ To create an Azure VM with the system-assigned managed identity enabled,your acc
7676
```
7777

7878
**Request headers**
79+
7980
|Request header |Description |
8081
|---------|---------|
8182
|*Content-Type* | Required. Set to `application/json`. |

articles/active-directory/saas-apps/ideascale-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ To configure Azure AD single sign-on with IdeaScale, perform the following steps
105105
`https://<companyname>.ideascale.com`
106106

107107
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
108+
108109
| |
109110
|--|
110111
| `http://<companyname>.ideascale.com` |

articles/active-directory/saas-apps/impacriskmanager-tutorial.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
111111
a. In the **Identifier** textbox, type a value provided by IMPAC
112112

113113
b. In the **Reply URL** textbox, type a URL using the following pattern:
114+
114115
| Environment | URL Pattern |
115116
| ---------------|--------------- |
116117
| For Production |`https://www.riskmanager.co.nz/DotNet/SSOv2/AssertionConsumerService.aspx?client=<ClientSuffix>`|
@@ -124,6 +125,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
124125
![IMPAC Risk Manager Domain and URLs single sign-on information](./media/impacriskmanager-tutorial/tutorial_impacriskmanager_url1_new.png)
125126

126127
In the **Sign-on URL** textbox, type a URL using the following pattern:
128+
127129
| Environment | URL Pattern |
128130
| ---------------|--------------- |
129131
| For Production |`https://www.riskmanager.co.nz/SSOv2/<ClientSuffix>`|

articles/active-directory/saas-apps/inforretailinformationmanagement-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
109109
![Infor Retail – Information Management Domain and URLs single sign-on information IDP](./media/inforretailinformationmanagement-tutorial/tutorial_inforretailinformationmanagement_url.png)
110110

111111
a. In the **Identifier** textbox, type a URL using the following patterns:
112+
112113
| |
113114
| -- |
114115
| `https://<company name>.mingle.infor.com` |

articles/active-directory/saas-apps/insigniasamlsso-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
109109
![Insignia SAML SSO Domain and URLs single sign-on information](./media/insigniasamlsso-tutorial/tutorial_insigniasamlsso_url.png)
110110

111111
a. In the **Sign-on URL** textbox, type a URL using the following pattern:
112+
112113
| |
113114
|--|
114115
| `https://<customername>.insigniails.com/ils` |

articles/active-directory/saas-apps/intacct-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
111111
![Configure Single Sign-On](./media/intacct-tutorial/tutorial_intacct_url.png)
112112

113113
In the **Reply URL** textbox, type a URL using the following pattern:
114+
114115
| |
115116
|--|
116117
| `https://<companyname>.intacct.com/ia/acct/sso_response.phtml`|

articles/active-directory/saas-apps/iqualify-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,12 +109,14 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
109109
![iQualify LMS Domain and URLs single sign-on information](./media/iqualify-tutorial/tutorial_iqualify_url.png)
110110

111111
a. In the **Identifier** textbox, type a URL using the following pattern:
112+
112113
| |
113114
|--|--|
114115
| Production Environment: `https://<yourorg>.iqualify.com/`|
115116
| Test Environment: `https://<yourorg>.iqualify.io`|
116117

117118
b. In the **Reply URL** textbox, type a URL using the following pattern:
119+
118120
| |
119121
|--|--|
120122
| Production Environment: `https://<yourorg>.iqualify.com/auth/saml2/callback` |
@@ -125,6 +127,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
125127
![iQualify LMS Domain and URLs single sign-on information](./media/iqualify-tutorial/tutorial_iqualify_url1.png)
126128

127129
In the **Sign-on URL** textbox, type a URL using the following pattern:
130+
128131
| |
129132
|--|--|
130133
| Production Environment: `https://<yourorg>.iqualify.com/login` |

articles/active-directory/saas-apps/itslearning-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
111111
![Configure Single Sign-On](./media/itslearning-tutorial/tutorial_itslearning_url.png)
112112

113113
a. In the **Sign-on URL** textbox, type a URL as:
114+
114115
| |
115116
|--|
116117
| `https://www.itslearning.com/index.aspx`|

articles/active-directory/saas-apps/ivanti-service-manager-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,7 @@ To configure Azure AD single sign-on with Ivanti Service Manager (ISM), perform
103103
![Ivanti Service Manager (ISM) Domain and URLs single sign-on information](common/idp-intiated.png)
104104

105105
a. In the **Identifier** text box, type a URL using the following pattern:
106+
106107
| |
107108
|--|
108109
| `https://<customer>.saasit.com/` |

0 commit comments

Comments
 (0)