Skip to content

Commit f8bb25c

Browse files
author
Barbara Selden
committed
updated all image names
1 parent 3c10fff commit f8bb25c

File tree

6 files changed

+6
-6
lines changed

6 files changed

+6
-6
lines changed

articles/active-directory/manage-apps/migrate-adfs-apps-to-azure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ To configure a SaaS application for SAML-based single sign-on, see [Configure SA
101101

102102
Many SaaS applications have an [application-specific tutorial](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list) that step you through the configuration for SAML-based single sign-on.
103103

104-
![app tutorial](media/migrate-adfs-apps-to-azure/apptutorial.png)
104+
![app tutorial](media/migrate-adfs-apps-to-azure/app-tutorial.png)
105105

106106
Some apps can be migrated easily. Apps with more complex requirements, such as custom claims, might require additional configuration in Azure AD and/or Azure AD Connect. For information about supported claims mappings, see [Claims mapping in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/active-directory-claims-mapping).
107107

@@ -305,7 +305,7 @@ The following are examples of types of MFA rules in AD FS, and how you can map t
305305

306306
MFA rule settings in AD FS:
307307

308-
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-mfa-basedon-location-1.png)
308+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/mfa-location-1.png)
309309

310310

311311
#### Example 1: Enforce MFA based on users/groups
@@ -322,7 +322,7 @@ Specify MFA rules for a user or a group in Azure AD:
322322
3. Configure the **Access controls** options as shown below:
323323
324324

325-
![AAD MFA settings](media/migrate-adfs-apps-to-azure/enforce-mfa-basedon-location-2.png)
325+
![AAD MFA settings](media/migrate-adfs-apps-to-azure/mfa-usersorgroups.png)
326326

327327

328328
#### Example 2: Enforce MFA for unregistered devices
@@ -336,7 +336,7 @@ Specify MFA rules for unregistered devices in Azure AD:
336336
3. Configure the **Access controls** options as shown below:
337337
338338

339-
![AAD MFA settings](media/migrate-adfs-apps-to-azure/enforce-mfa-for-unregistered-devices.png)
339+
![AAD MFA settings](media/migrate-adfs-apps-to-azure/mfa-unregistered-devices.png)
340340

341341

342342
When you set the For multiple controls option to Require one of the selected controls, it means that if any one of the conditions specified by the checkbox are fulfilled by the user, they will be granted access to your app.
@@ -353,12 +353,12 @@ Specify MFA rules based on a user's location in Azure AD:
353353

354354
1. Configure the **Conditions rules** to specify the locations for which you would like to enforce MFA.
355355

356-
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/enforce-MFA-basedon-location-1.png)
356+
![Azure AD MFA settings](media/migrate-adfs-apps-to-azure/mfa-location-1.png)
357357

358358
5. Configure the **Access controls** options as shown below:
359359

360360

361-
![Map access control policies](media/migrate-adfs-apps-to-azure/enforce-MFA-basedon-location-2.png)
361+
![Map access control policies](media/migrate-adfs-apps-to-azure/mfa-location-2.png)
362362

363363

364364
### Map Emit attributes as Claims rule

0 commit comments

Comments
 (0)