Skip to content

Commit eedd442

Browse files
authored
Merge pull request #177349 from alexbuckgit/alexbuckgit/docutune-autopr-20211025-020331-4914206
DocuTune: Fix tab issues
2 parents b6edb59 + 28f4f11 commit eedd442

9 files changed

+133
-141
lines changed

articles/active-directory/authentication/how-to-nudge-authenticator-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The following table lists **authenticationMethodsRegistrationCampaign** properti
9191

9292
| Name | Possible values | Description |
9393
|------|-----------------|-------------|
94-
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
94+
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
9595
| snoozeDurationInDays | Range: 0 – 14 | Defines after how many days the user will see the nudge again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
9696
| includeTargets | N/A | Allows you to include different users and groups that you want the feature to target. |
9797
| excludeTargets | N/A | Allows you to exclude different users and groups that you want omitted from the feature. If a user is in a group that is excluded and a group that is included, the user will be excluded from the feature.|
@@ -155,7 +155,7 @@ Here are a few sample JSONs you can use to get started!
155155
"targetType": "group",
156156
"targetedAuthenticationMethod": "microsoftAuthenticator"
157157
},
158-
{
158+
{
159159
"id": "*********PLEASE ENTER GUID***********",
160160
"targetType": "user",
161161
"targetedAuthenticationMethod": "microsoftAuthenticator"
@@ -180,7 +180,7 @@ Here are a few sample JSONs you can use to get started!
180180
"id": "*********PLEASE ENTER GUID***********",
181181
"targetType": "group"
182182
},
183-
{
183+
{
184184
"id": "*********PLEASE ENTER GUID***********",
185185
"targetType": "user"
186186
}
@@ -191,7 +191,7 @@ Here are a few sample JSONs you can use to get started!
191191
"targetType": "group",
192192
"targetedAuthenticationMethod": "microsoftAuthenticator"
193193
},
194-
{
194+
{
195195
"id": "*********PLEASE ENTER GUID***********",
196196
"targetType": "user",
197197
"targetedAuthenticationMethod": "microsoftAuthenticator"

articles/active-directory/saas-apps/blink-tutorial.md

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -72,53 +72,52 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7474

75-
a. In the **Sign on URL** text box, type a URL using one of the following patterns:
76-
75+
1. In the **Sign on URL** text box, type a URL using one of the following patterns:
76+
7777
| Sign-on URL|
78-
|------------|
78+
|------------|
7979
| `https://app.joinblink.com` |
8080
| `https://<SUBDOMAIN>.joinblink.com` |
81-
|
82-
8381

84-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
82+
2. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
83+
8584
`https://api.joinblink.com/saml/o-<TENANTID>`
8685

87-
> [!NOTE]
88-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Blink Client support team](https://help.joinblink.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
> [!NOTE]
87+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Blink Client support team](https://help.joinblink.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8988
9089
1. Blink Meetings application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
9190

92-
![image](common/edit-attribute.png)
91+
![image](common/edit-attribute.png)
9392

9493
1. In addition to above, Blink Meetings application expects few more attributes to be passed back in SAML response. In the User Claims section on the User Attributes dialog, perform the following steps to add SAML token attribute as shown in the below table:
9594

96-
| Name | Source Attribute|
97-
| ---------------| --------- |
98-
| first_name | user.givenname |
99-
| second_name | user.surname |
100-
| email | user.mail |
95+
| Name | Source Attribute|
96+
| ---------------| --------- |
97+
| first_name | user.givenname |
98+
| second_name | user.surname |
99+
| email | user.mail |
101100
| | |
102101

103-
a. Click **Add new claim** to open the **Manage user claims** dialog.
102+
1. Click **Add new claim** to open the **Manage user claims** dialog.
104103

105-
b. In the **Name** textbox, type the attribute name shown for that row.
104+
1. In the **Name** textbox, type the attribute name shown for that row.
106105

107-
c. Leave the **Namespace** blank.
106+
1. Leave the **Namespace** blank.
108107

109-
d. Select Source as **Attribute**.
108+
1. Select Source as **Attribute**.
110109

111-
e. From the **Source attribute** list, type the attribute value shown for that row.
110+
1. From the **Source attribute** list, type the attribute value shown for that row.
112111

113-
f. Click **Save**.
112+
1. Click **Save**.
114113

115114
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
116115

117-
![The Certificate download link](common/metadataxml.png)
116+
![The Certificate download link](common/metadataxml.png)
118117

119118
1. On the **Set up Blink** section, copy the appropriate URL(s) based on your requirement.
120119

121-
![Copy configuration URLs](common/copy-configuration-urls.png)
120+
![Copy configuration URLs](common/copy-configuration-urls.png)
122121

123122
### Create an Azure AD test user
124123

articles/active-directory/saas-apps/egnyte-tutorial.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -133,21 +133,21 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
133133

134134
![Single Sign On Authentication](./media/egnyte-tutorial/authentication.png "Single Sign On Authentication")
135135

136-
a. As **Single sign-on authentication**, select **SAML 2.0**.
137-
138-
b. As **Identity provider**, select **AzureAD**.
139-
140-
c. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
141-
142-
d. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
143-
144-
e. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
145-
146-
f. As **Default user mapping**, select **Email address**.
147-
148-
g. As **Use domain-specific issuer value**, select **disabled**.
149-
150-
h. Click **Save**.
136+
1. As **Single sign-on authentication**, select **SAML 2.0**.
137+
138+
1. As **Identity provider**, select **AzureAD**.
139+
140+
1. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
141+
142+
1. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
143+
144+
1. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
145+
146+
1. As **Default user mapping**, select **Email address**.
147+
148+
1. As **Use domain-specific issuer value**, select **disabled**.
149+
150+
1. Click **Save**.
151151

152152
### Create Egnyte test user
153153

articles/active-directory/saas-apps/evidence-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -70,25 +70,25 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7070

7171
1. On the **Set up single sign-on with SAML** page, perform the following steps:
7272

73-
a. In the **Sign on URL** text box, type a URL using the following pattern:
73+
1. In the **Sign on URL** text box, type a URL using the following pattern:
7474
`https://<yourtenant>.evidence.com`
7575

76-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
76+
1. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
7777
`https://<yourtenant>.evidence.com`
7878

79-
c. In the **Reply URL** textbox, type a URL using the following pattern:
79+
1. In the **Reply URL** textbox, type a URL using the following pattern:
8080
`https://<your tenant>.evidence.com/?class=UIX&proc=Login`
81-
81+
8282
> [!NOTE]
83-
> These values are not real. Update these values with the actual Sign on URL, Identifier and Reply URL. Contact [Evidence.com Client support team](https://communities.taser.com/support/SupportContactUs?typ=LE) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
83+
> These values are not real. Update these values with the actual Sign on URL, Identifier and Reply URL. Contact [Evidence.com Client support team](https://communities.taser.com/support/SupportContactUs?typ=LE) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8484
8585
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8686

87-
![The Certificate download link](common/certificatebase64.png)
87+
![The Certificate download link](common/certificatebase64.png)
8888

8989
1. On the **Set up Evidence.com** section, copy the appropriate URL(s) based on your requirement.
9090

91-
![Copy configuration URLs](common/copy-configuration-urls.png)
91+
![Copy configuration URLs](common/copy-configuration-urls.png)
9292

9393
### Create an Azure AD test user
9494

articles/active-directory/saas-apps/flatter-files-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,12 +118,12 @@ To configure Azure AD single sign-on with Flatter Files, perform the following s
118118
![Screenshot that shows "DASHBOARD" selected in the "Flatter Files" app.](./media/flatter-files-tutorial/tutorial_flatter_files_05.png)
119119

120120
3. Click **Settings**, and then perform the following steps on the **Company** tab:
121-
121+
122122
![Screenshot that shows the "Company" tab with "Use S A M L 2.0 for Authentication" checked and the "Configure S A M L" button selected.](./media/flatter-files-tutorial/tutorial_flatter_files_06.png)
123+
124+
1. Select **Use SAML 2.0 for Authentication**.
123125

124-
a. Select **Use SAML 2.0 for Authentication**.
125-
126-
b. Click **Configure SAML**.
126+
1. Click **Configure SAML**.
127127

128128
4. On the **SAML Configuration** dialog, perform the following steps:
129129

articles/active-directory/saas-apps/fortiweb-web-application-firewall-tutorial.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -72,26 +72,24 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7474

75-
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
76-
`https://www.<CUSTOMER_DOMAIN>.com`
75+
1. In the **Identifier (Entity ID)** text box, type a URL using the following pattern: `https://www.<CUSTOMER_DOMAIN>.com`
7776

78-
b. In the **Reply URL** text box, type a URL using the following pattern:
77+
1. In the **Reply URL** text box, type a URL using the following pattern:
7978
`https://www.<CUSTOMER_DOMAIN>.com/<FORTIWEB_NAME>/saml.sso/SAML2/POST`
8079

81-
c. In the **Sign on URL** text box, type a URL using the following pattern:
80+
1. In the **Sign on URL** text box, type a URL using the following pattern:
8281
`https://www.<CUSTOMER_DOMAIN>.com`
8382

84-
d. In the **Logout URL** text box, type a URL using the following pattern:
83+
1. In the **Logout URL** text box, type a URL using the following pattern:
8584
`https://www.<CUSTOMER_DOMAIN>.info/<FORTIWEB_NAME>/saml.sso/SLO/POST`
8685

87-
> [!NOTE]
86+
> [!NOTE]
8887
> `<FORTIWEB_NAME>` is a name identifier that will be used later when supplying configuration to FortiWeb.
8988
> Contact [FortiWeb Web Application Firewall support team](mailto:[email protected]) to get the real URL values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9089
9190
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9291

93-
![The Certificate download link](common/metadataxml.png)
94-
92+
![The Certificate download link](common/metadataxml.png)
9593

9694
### Create an Azure AD test user
9795

articles/active-directory/saas-apps/freshdesk-tutorial.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Configure and test Azure AD SSO with FreshDesk using a test user called **B.Simo
5151
To configure and test Azure AD SSO with FreshDesk, perform the following steps:
5252

5353
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
54-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
55-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
54+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
55+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
5656
1. **[Configure FreshDesk SSO](#configure-freshdesk-sso)** - to configure the Single Sign-On settings on application side.
57-
1. **[Create FreshDesk test user](#create-freshdesk-test-user)** - to have a counterpart of Britta Simon in FreshDesk that is linked to the Azure AD representation of user.
57+
1. **[Create FreshDesk test user](#create-freshdesk-test-user)** - to have a counterpart of Britta Simon in FreshDesk that is linked to the Azure AD representation of user.
5858
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
5959

6060
## Configure Azure AD SSO
@@ -67,29 +67,29 @@ To configure and test Azure AD SSO with FreshDesk, perform the following steps:
6767

6868
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
6969

70-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
70+
1. In the **Sign-on URL** text box, type a URL using the following pattern:
7171
`https://<tenant-name>.freshdesk.com` or any other value Freshdesk has suggested.
7272

73-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
73+
1. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
7474
`https://<tenant-name>.freshdesk.com` or any other value Freshdesk has suggested.
7575

76-
c. In the **Reply URL** text box, type a URL using the following pattern:
76+
1. In the **Reply URL** text box, type a URL using the following pattern:
7777
`https://<tenant-name>.freshdesk.com/login/saml`
78-
79-
> [!NOTE]
80-
> These values are not real. Update these values with the actual Sign on URL, Identifier and Reply URL. Contact [FreshDesk Client support team](https://freshdesk.com/helpdesk-software?utm_source=Google-AdWords&utm_medium=Search-IND-Brand&utm_campaign=Search-IND-Brand&utm_term=freshdesk&device=c&gclid=COSH2_LH7NICFVUDvAodBPgBZg) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
78+
79+
> [!NOTE]
80+
> These values are not real. Update these values with the actual Sign on URL, Identifier and Reply URL. Contact [FreshDesk Client support team](https://freshdesk.com/helpdesk-software?utm_source=Google-AdWords&utm_medium=Search-IND-Brand&utm_campaign=Search-IND-Brand&utm_term=freshdesk&device=c&gclid=COSH2_LH7NICFVUDvAodBPgBZg) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8181
8282
1. FreshDesk application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, whereas **Unique User Identifier** is mapped with **user.userprincipalname** but FreshDesk expects this claim to be mapped with **user.mail**, so you need to edit the attribute mapping by clicking on Edit icon and change the attribute mapping.
8383

84-
![image](common/edit-attribute.png)
84+
![image](common/edit-attribute.png)
8585

8686
1. On the **Set-up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8787

88-
![The Certificate download link](common/certificatebase64.png)
88+
![The Certificate download link](common/certificatebase64.png)
8989

9090
1. On the **Set-up FreshDesk** section, copy the appropriate URL(s) as per your requirement.
9191

92-
![Copy configuration URLs](common/copy-configuration-urls.png)
92+
![Copy configuration URLs](common/copy-configuration-urls.png)
9393

9494

9595
### Create an Azure AD test user
@@ -122,23 +122,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
122122

123123
2. Select the **Security icon** and in the **Security** section, perform the following steps:
124124

125-
![Single Sign On](./media/freshdesk-tutorial/configure-1.png "Single Sign On")
125+
![Single Sign On](./media/freshdesk-tutorial/configure-1.png "Single Sign On")
126126

127-
a. For **Single Sign On**, select **On**.
127+
1. For **Single Sign On**, select **On**.
128128

129-
b. In the **Login Method**, select **SAML SSO**.
129+
1. In the **Login Method**, select **SAML SSO**.
130130

131-
c. In the **Entity ID provided by the IdP** textbox, paste **Entity ID** value, which you have copied from the Azure portal.
131+
1. In the **Entity ID provided by the IdP** textbox, paste **Entity ID** value, which you have copied from the Azure portal.
132132

133-
d. In the **SAML SSO URL** textbox, paste **Login URL** value, which you have copied from the Azure portal.
133+
1. In the **SAML SSO URL** textbox, paste **Login URL** value, which you have copied from the Azure portal.
134134

135-
e. In the **Signing Options**, select **Only Signed Assertions** from the dropdown.
135+
1. In the **Signing Options**, select **Only Signed Assertions** from the dropdown.
136136

137-
f. In the **Logout URL** textbox, paste **Logout URL** value, which you have copied from the Azure portal.
137+
1. In the **Logout URL** textbox, paste **Logout URL** value, which you have copied from the Azure portal.
138138

139-
g. In the **Security Certificate** textbox, paste **Certificate (Base64)** value, which you have obtained earlier.
139+
1. In the **Security Certificate** textbox, paste **Certificate (Base64)** value, which you have obtained earlier.
140140

141-
h. Click **Save**.
141+
1. Click **Save**.
142142

143143
## Create FreshDesk test user
144144

@@ -151,21 +151,21 @@ In the case of FreshDesk, provisioning is a manual task.
151151

152152
1. In the menu on the left, click **Admin** and in the **General Settings** tab, click **Agents**.
153153

154-
![Agents](./media/freshdesk-tutorial/create-user-1.png "Agents")
154+
![Agents](./media/freshdesk-tutorial/create-user-1.png "Agents")
155155

156156
1. Click **New Agent**.
157157

158158
![New Agent](./media/freshdesk-tutorial/create-user-2.png "New Agent")
159159

160160
1. On the Agent Information dialog, enter the required fields and click on **Create agent**.
161161

162-
![Agent Information](./media/freshdesk-tutorial/create-user-3.png "Agent Information")
162+
![Agent Information](./media/freshdesk-tutorial/create-user-3.png "Agent Information")
163163

164-
>[!NOTE]
165-
>The Azure AD account holder will get an email that includes a link to confirm the account before it is activated.
166-
>
167-
>[!NOTE]
168-
>You can use any other Freshdesk user account creation tools or APIs provided by Freshdesk to provision Azure AD user accounts to FreshDesk.
164+
>[!NOTE]
165+
>The Azure AD account holder will get an email that includes a link to confirm the account before it is activated.
166+
>
167+
>[!NOTE]
168+
>You can use any other Freshdesk user account creation tools or APIs provided by Freshdesk to provision Azure AD user accounts to FreshDesk.
169169
170170
### Test SSO
171171

0 commit comments

Comments
 (0)