Skip to content

Commit f6c5e63

Browse files
committed
Minor correction.
1 parent fcfd17b commit f6c5e63

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ You can use scoping filters to define attribute-based rules that determine which
7676

7777
It's possible to use the Azure AD user provisioning service to provision B2B (guest) users in Azure AD to SaaS applications. However, for B2B users to sign in to the SaaS application using Azure AD, you must manually configure the SaaS application to use Azure AD as a Security Assertion Markup Language (SAML) identity provider.
7878

79-
Follow these general guidelines when configuring SaaS apps for B2B collaboration:
79+
Follow these general guidelines when configuring SaaS apps for B2B (guest) users:
8080
- For most of the apps, user setup needs to happen manually. Users must be created manually in the app as well.
8181
- For apps that support automatic setup, such as Dropbox, separate invitations are created from the apps. Users must be sure to accept each invitation.
8282
- In the user attributes, to mitigate any issues with mangled user profile disk (UPD) in guest users, always set the user identifier to **user.mail**.

0 commit comments

Comments
 (0)