Fix identity matching links in documentation
@ -26,7 +26,7 @@ To test federation, the following prerequisites must be met:
|
||||
1. A Google Workspace environment, with users already created
|
||||
> [!IMPORTANT]
|
||||
> Users require an email address defined in Google Workspace, which is used to match the users in Microsoft Entra ID.
|
||||
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-azure-ad).
|
||||
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-microsoft-entra-id).
|
||||
1. Individual Microsoft Entra accounts already created: each Google Workspace user will require a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
|
||||
- School Data Sync (SDS)
|
||||
- Microsoft Entra Connect Sync for environment with on-premises AD DS
|
||||
|
@ -46,7 +46,7 @@ To enable a federated sign-in experience, the following prerequisites must be me
|
||||
- PowerShell scripts that call the [Microsoft Graph API][GRAPH-1]
|
||||
- provisioning tools offered by the IdP
|
||||
|
||||
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-azure-ad).
|
||||
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-microsoft-entra-id).
|
||||
1. Licenses assigned to the Microsoft Entra user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Microsoft Entra ID, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Microsoft Entra ID][AZ-2]
|
||||
1. Enable Federated sign-in or Web sign-in on the Windows devices, depending if the devices are shared or assigned to a single student
|
||||
|
||||
|
Before Width: | Height: | Size: 8.4 KiB |
Before Width: | Height: | Size: 15 KiB |
@ -7,7 +7,7 @@ ms.date: 01/11/2024
|
||||
|
||||
:::row:::
|
||||
:::column span="1":::
|
||||
:::image type="content" source="../images/insider.png" alt-text="Logo of Windows Insider." border="false":::
|
||||
:::image type="content" source="insider.png" alt-text="Logo of Windows Insider." border="false":::
|
||||
:::column-end:::
|
||||
:::column span="3":::
|
||||
> [!IMPORTANT]
|
||||
|
Before Width: | Height: | Size: 17 KiB After Width: | Height: | Size: 17 KiB |
@ -205,7 +205,7 @@ You may also want to set up **automatic logon** for your kiosk device. When your
|
||||
> If you are using a Windows client device restriction CSP to set "Preferred Microsoft Entra tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile.
|
||||
|
||||
> [!TIP]
|
||||
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
||||
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
||||
|
||||
**How to edit the registry to have an account sign in automatically**
|
||||
|
||||
|
After Width: | Height: | Size: 23 KiB |
After Width: | Height: | Size: 6.8 KiB |
After Width: | Height: | Size: 6.8 KiB |
After Width: | Height: | Size: 7.9 KiB |