Fix inconsistent alerts by using the markdown notation - part 1 (#35220)
Co-authored-by: Alex Nguyen <150945400+nguyenalex836@users.noreply.github.com>
This commit is contained in:
@@ -25,11 +25,8 @@ Then, you will configure SAML and SCIM. At this time, users, groups, and identit
|
||||
|
||||
If you're new to {% data variables.product.prodname_emus %} and haven't yet configured authentication for your enterprise, you do not need to migrate and can set up SAML single sign-on (SSO) immediately. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users)."
|
||||
|
||||
{% warning %}
|
||||
|
||||
**Warning:** {% data reusables.enterprise_user_management.migration-teams-warning %}
|
||||
|
||||
{% endwarning %}
|
||||
> [!WARNING]
|
||||
> {% data reusables.enterprise_user_management.migration-teams-warning %}
|
||||
|
||||
## Prerequisites
|
||||
|
||||
|
||||
@@ -27,11 +27,8 @@ When you migrate from SAML to OIDC, {% data variables.enterprise.prodname_manage
|
||||
|
||||
If you're new to {% data variables.product.prodname_emus %} and haven't yet configured authentication for your enterprise, you do not need to migrate and can set up OIDC single sign-on immediately. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-oidc-for-enterprise-managed-users)."
|
||||
|
||||
{% warning %}
|
||||
|
||||
**Warning:** {% data reusables.enterprise_user_management.migration-teams-warning %}
|
||||
|
||||
{% endwarning %}
|
||||
> [!WARNING]
|
||||
> {% data reusables.enterprise_user_management.migration-teams-warning %}
|
||||
|
||||
## Prerequisites
|
||||
|
||||
@@ -43,11 +40,8 @@ If you're new to {% data variables.product.prodname_emus %} and haven't yet conf
|
||||
|
||||
To migrate your enterprise from SAML to OIDC, you will disable your existing {% data variables.product.prodname_emu_idp_application %} application on Entra ID, prepare and begin the migration as the setup user for your enterprise on {% data variables.product.github %}, then install and configure the new application for OIDC on Entra ID. After the migration is complete and Entra ID provisions your users, the users can authenticate to access your enterprise's resources on {% data variables.product.github %} using OIDC.
|
||||
|
||||
{% warning %}
|
||||
|
||||
**Warning**: Migration of your enterprise from SAML to OIDC can take up to an hour. During the migration, users cannot access your enterprise on {% data variables.product.github %}.
|
||||
|
||||
{% endwarning %}
|
||||
> [!WARNING]
|
||||
> Migration of your enterprise from SAML to OIDC can take up to an hour. During the migration, users cannot access your enterprise on {% data variables.product.github %}.
|
||||
|
||||
1. Before you begin the migration, sign in to Azure and disable provisioning in the existing {% data variables.product.prodname_emu_idp_application %} application.
|
||||
1. If you use [Conditional Access (CA) network location policies](https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition) in Entra ID, and you're currently using an IP allow list with your enterprise account or any of the organizations owned by the enterprise account, disable the IP allow lists. For more information, see "[AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise#managing-allowed-ip-addresses-for-organizations-in-your-enterprise)" and "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-allowed-ip-addresses-for-your-organization)."
|
||||
@@ -62,11 +56,9 @@ To migrate your enterprise from SAML to OIDC, you will disable your existing {%
|
||||
1. After you grant consent, a new browser window will open to {% data variables.product.github %} and display a new set of recovery codes for your {% data variables.enterprise.prodname_emu_enterprise %}. Download the codes, then click **Enable OIDC authentication**.
|
||||
1. Wait for the migration to complete, which can take up to an hour. To check the status of the migration, navigate to your enterprise's authentication security settings page. If "Require SAML authentication" is selected, the migration is still in progress.
|
||||
|
||||
{% warning %}
|
||||
> [!WARNING]
|
||||
> Do not provision new users from the application on Entra ID during the migration.
|
||||
|
||||
**Warning:** Do not provision new users from the application on Entra ID during the migration.
|
||||
|
||||
{% endwarning %}
|
||||
1. In a new tab or window, while signed in as the setup user, create a {% data variables.product.pat_v1 %} with the **scim:enterprise** scope and **no expiration** and copy it to your clipboard. For more information about creating a new token, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users#creating-a-personal-access-token)."
|
||||
1. In the provisioning settings for the {% data variables.product.prodname_emu_idp_oidc_application %} application in the Microsoft Entra admin center, under "Tenant URL", type the tenant URL for your enterprise:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user