Skip to content

Commit e607d53

Browse files
committed
edit pass: saas-tutorials-jeevansd
1 parent 3119b65 commit e607d53

File tree

3 files changed

+70
-73
lines changed

3 files changed

+70
-73
lines changed

articles/active-directory/saas-apps/pagedna-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ Integrating PageDNA with Azure AD provides you with the following benefits:
3030
* You can enable your users to be automatically signed in to PageDNA (single sign-on) with their Azure AD accounts.
3131
* You can manage your accounts in one central location: the Azure portal.
3232

33-
For details about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis). If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
33+
For details about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3434

3535
## Prerequisites
3636

3737
To configure Azure AD integration with PageDNA, you need the following items:
3838

39-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
39+
* An Azure AD subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
4040
* A PageDNA subscription with single sign-on enabled.
4141

4242
## Scenario description
@@ -80,7 +80,7 @@ To configure and test Azure AD single sign-on with PageDNA, you need to complete
8080
1. **[Configure PageDNA single sign-on](#configure-pagedna-single-sign-on)** to configure the single sign-on settings on the application side.
8181
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
8282
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
83-
1. **[Create a PageDNA test user](#create-pagedna-test-user)** so that there's a user named Britta Simon in PageDNA that's linked to the Azure AD user named Britta Simon.
83+
1. **[Create a PageDNA test user](#create-pagedna-test-user)** so that there's a user named Britta Simon in PageDNA who's linked to the Azure AD user named Britta Simon.
8484
1. **[Test single sign-on](#test-single-sign-on)** to verify whether the configuration works.
8585

8686
### Configure Azure AD single sign-on

articles/active-directory/saas-apps/tigertext-tutorial.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,12 @@ Integrating TigerText Secure Messenger with Azure AD provides you with the follo
3030
* You can manage your accounts in one central location: the Azure portal.
3131

3232
For details about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
33-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
3433

3534
## Prerequisites
3635

3736
To configure Azure AD integration with TigerText Secure Messenger, you need the following items:
3837

39-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/pricing/free-trial/).
38+
* An Azure AD subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
4039
* A TigerText Secure Messenger subscription with single sign-on enabled.
4140

4241
## Scenario description
@@ -76,7 +75,7 @@ To configure and test Azure AD single sign-on with TigerText Secure Messenger, y
7675
1. **[Configure TigerText Secure Messenger single sign-on](#configure-tigertext-secure-messenger-single-sign-on)** to configure the single sign-on settings on the application side.
7776
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
7877
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
79-
1. **[Create a TigerText Secure Messenger test user](#create-tigertext-secure-messenger-test-user)** so that there's a user named Britta Simon in TigerText Secure Messenger that's linked to the Azure AD user named Britta Simon.
78+
1. **[Create a TigerText Secure Messenger test user](#create-tigertext-secure-messenger-test-user)** so that there's a user named Britta Simon in TigerText Secure Messenger who's linked to the Azure AD user named Britta Simon.
8079
1. **[Test single sign-on](#test-single-sign-on)** to verify whether the configuration works.
8180

8281
### Configure Azure AD single sign-on
@@ -112,7 +111,7 @@ To configure Azure AD single sign-on with TigerText Secure Messenger, take the f
112111
> [!NOTE]
113112
> The **Identifier (Entity ID)** value isn't real. Update this value with the actual identifier. To get the value, contact the [TigerText Secure Messenger support team](mailto:[email protected]). You can also refer to the patterns shown in the **Basic SAML Configuration** pane in the Azure portal.
114113
115-
1. On the **Set up Single Sign-On with SAML** pane, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options and save it on your computer.
114+
1. On the **Set up Single Sign-On with SAML** pane, in the **SAML Signing Certificate** section, select **Download** to download the **Federation Metadata XML** from the given options and save it on your computer.
116115

117116
![The Federation Metadata XML download option](common/metadataxml.png)
118117

@@ -130,7 +129,7 @@ To configure single sign-on on the TigerText Secure Messenger side, you need to
130129

131130
### Create an Azure AD test user
132131

133-
In this section, you create a test user in the Azure portal named Britta Simon.
132+
In this section, you create a test user named Britta Simon in the Azure portal.
134133

135134
1. In the Azure portal, in the left pane, select **Azure Active Directory** > **Users** > **All users**.
136135

0 commit comments

Comments
 (0)