Fix identity matching links in documentation
@ -26,7 +26,7 @@ To test federation, the following prerequisites must be met:
|
|||||||
1. A Google Workspace environment, with users already created
|
1. A Google Workspace environment, with users already created
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Users require an email address defined in Google Workspace, which is used to match the users in Microsoft Entra ID.
|
> Users require an email address defined in Google Workspace, which is used to match the users in Microsoft Entra ID.
|
||||||
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-azure-ad).
|
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-microsoft-entra-id).
|
||||||
1. Individual Microsoft Entra accounts already created: each Google Workspace user will require a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
|
1. Individual Microsoft Entra accounts already created: each Google Workspace user will require a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
|
||||||
- School Data Sync (SDS)
|
- School Data Sync (SDS)
|
||||||
- Microsoft Entra Connect Sync for environment with on-premises AD DS
|
- Microsoft Entra Connect Sync for environment with on-premises AD DS
|
||||||
|
@ -46,7 +46,7 @@ To enable a federated sign-in experience, the following prerequisites must be me
|
|||||||
- PowerShell scripts that call the [Microsoft Graph API][GRAPH-1]
|
- PowerShell scripts that call the [Microsoft Graph API][GRAPH-1]
|
||||||
- provisioning tools offered by the IdP
|
- provisioning tools offered by the IdP
|
||||||
|
|
||||||
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-azure-ad).
|
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-microsoft-entra-id).
|
||||||
1. Licenses assigned to the Microsoft Entra user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Microsoft Entra ID, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Microsoft Entra ID][AZ-2]
|
1. Licenses assigned to the Microsoft Entra user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Microsoft Entra ID, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Microsoft Entra ID][AZ-2]
|
||||||
1. Enable Federated sign-in or Web sign-in on the Windows devices, depending if the devices are shared or assigned to a single student
|
1. Enable Federated sign-in or Web sign-in on the Windows devices, depending if the devices are shared or assigned to a single student
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 8.4 KiB |
Before Width: | Height: | Size: 15 KiB |
@ -3,11 +3,11 @@ author: paolomatarazzo
|
|||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
ms.topic: include
|
ms.topic: include
|
||||||
ms.date: 01/11/2024
|
ms.date: 01/11/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
:::row:::
|
:::row:::
|
||||||
:::column span="1":::
|
:::column span="1":::
|
||||||
:::image type="content" source="../images/insider.png" alt-text="Logo of Windows Insider." border="false":::
|
:::image type="content" source="insider.png" alt-text="Logo of Windows Insider." border="false":::
|
||||||
:::column-end:::
|
:::column-end:::
|
||||||
:::column span="3":::
|
:::column span="3":::
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
|
Before Width: | Height: | Size: 17 KiB After Width: | Height: | Size: 17 KiB |
@ -205,7 +205,7 @@ You may also want to set up **automatic logon** for your kiosk device. When your
|
|||||||
> If you are using a Windows client device restriction CSP to set "Preferred Microsoft Entra tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile.
|
> If you are using a Windows client device restriction CSP to set "Preferred Microsoft Entra tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
||||||
|
|
||||||
**How to edit the registry to have an account sign in automatically**
|
**How to edit the registry to have an account sign in automatically**
|
||||||
|
|
||||||
|
After Width: | Height: | Size: 23 KiB |
After Width: | Height: | Size: 6.8 KiB |
After Width: | Height: | Size: 6.8 KiB |
After Width: | Height: | Size: 7.9 KiB |