Skip to content

Commit d40daff

Browse files
committed
Update how-to-mfa-server-migration-utility.md
1 parent d57f318 commit d40daff

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -341,9 +341,8 @@ Content-Type: application/json
341341

342342

343343
#### Response
344-
>[!NOTE]
345-
>The response object shown here might be shortened for readability.
346-
344+
>**Note:** The response object shown here might be shortened for readability.
345+
<!-- {
347346
"blockType": "response",
348347
"truncated": true,
349348
"@odata.type": "microsoft.graph.internalDomainFederation"
@@ -414,12 +413,11 @@ If the upgrade had issues, follow these steps to roll back:
414413
"federatedIdpMfaBehavior": "enforceMfaByFederatedIdp"
415414
}
416415
```
417-
416+
417+
The following response object is shortened for readability.
418418

419419
**Response**
420420

421-
>[!NOTE]
422-
>The response object shown here might be shortened for readability.
423421
<!-- {
424422
"blockType": "response",
425423
"truncated": true,
@@ -452,6 +450,7 @@ If the upgrade had issues, follow these steps to roll back:
452450

453451
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
454452

453+
455454
## Next steps
456455

457456
- [Overview of how to migrate from MFA Server to Azure AD Multi-Factor Authentication](how-to-migrate-mfa-server-to-azure-mfa.md)

0 commit comments

Comments
 (0)