Skip to content

Commit a7b55d2

Browse files
committed
Fix typos
1 parent c8a60c1 commit a7b55d2

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

docs/manage/security/scim/provision-with-microsoft-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Users assigned to the app are provisioned into Sumo Logic.
109109
1. Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID.
110110
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Users and Roles > Users**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Users and Roles** select **Users**. You can also click the **Go To...** menu at the top of the screen and select **Users**.
111111
1. Search for the users provisioned from Microsoft Entra ID.
112-
1. You should see the users listed, and with the role given to when you assigned them to the app in Microsoft Entra ID.
112+
1. You should see the users listed, and with the role given to them when you assigned them to the app in Microsoft Entra ID.
113113

114114
## Syncing between Microsoft Entra ID and Sumo Logic
115115

docs/manage/security/scim/provision-with-okta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ If it is not already set up, [set up SAML for single sign-on with Okta](/docs/ma
5858
* **Basic Auth**. Basic authentication method. If you choose this method, enter your access key credentials in the fields that appear:
5959
* **Username**. Enter your access ID.
6060
* **Password**. Enter your access key.
61-
* **HTTP Header**. HTTP authorization header method. If you choose this option, use [Base64 encoding](https://www.base64encode.org/) to encode `<access ID>:<access key>` and enter the resulting value into the **Authorization | Bearer Token** fields that appears.<br/><img src={useBaseUrl('img/security/provision-okta-provisioning-tab.png')} alt="Provisioning tab" style={{border: '1px solid gray'}} width="800" />
61+
* **HTTP Header**. HTTP authorization header method. If you choose this option, use [Base64 encoding](https://www.base64encode.org/) to encode `<access ID>:<access key>` and enter the resulting value into the **Authorization | Bearer Token** field that appears.<br/><img src={useBaseUrl('img/security/provision-okta-provisioning-tab.png')} alt="Provisioning tab" style={{border: '1px solid gray'}} width="800" />
6262
1. Click **Test Connector Configuration**. The results display:<br/><img src={useBaseUrl('img/security/provision-okta-test-connection.png')} alt="Test connector configuration" style={{border: '1px solid gray'}} width="300" />
6363
1. Click **Close** on the **Test Connector Configuration** dialog.
6464
1. Click **Save** to save the app provisioning integration settings.

docs/manage/security/scim/provision-with-onelogin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ On the **Configuration** tab, for **SCIM Base URL** enter the [API endpoint for
117117
1. Select **Users**.
118118
1. Click **Pending** on the user you want to approve for provisioning.<br/><img src={useBaseUrl('img/security/provision-onelogin-approve-user.png')} alt="Pending user" style={{border: '1px solid gray'}} width="800" />
119119
1. Click **Approve**.<br/><img src={useBaseUrl('img/security/provision-onelogin-approve-dialog.png')} alt="Approve dialog" style={{border: '1px solid gray'}} width="400" />
120-
1. The user is provisioned to Sumo Logic.f
120+
1. The user is provisioned to Sumo Logic.
121121

122122
### Step 6: Verify provisioning
123123

0 commit comments

Comments
 (0)