Skip to content

Commit

Permalink
Merge pull request #5519 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Merge main to live, 4 AM
  • Loading branch information
v-ccolin authored Oct 10, 2024
2 parents 41cf8c1 + db5e36c commit e3c436c
Show file tree
Hide file tree
Showing 16 changed files with 28 additions and 334 deletions.
10 changes: 10 additions & 0 deletions .openpublishing.redirection.json
Original file line number Diff line number Diff line change
Expand Up @@ -1071,6 +1071,16 @@
"source_path_from_root": "/docs/identity/saas-apps/concur-provisioning-tutorial.md",
"redirect_url": "/entra/identity/saas-apps/sap-concur-provisioning-tutorial",
"redirect_document_id": false
},
{
"source_path_from_root": "/docs/identity/saas-apps/ghae-tutorial.md",
"redirect_url": "/entra/identity/saas-apps/tutorial-list",
"redirect_document_id": false
},
{
"source_path_from_root": "/docs/identity/saas-apps/ghae-provisioning-tutorial.md",
"redirect_url": "/entra/identity/saas-apps/tutorial-list",
"redirect_document_id": false
}
]
}
1 change: 0 additions & 1 deletion docs/id-governance/apps.md
Original file line number Diff line number Diff line change
Expand Up @@ -339,7 +339,6 @@ Microsoft Entra ID Governance can be integrated with many other applications, us
| [Genesys Cloud for Azure](~/identity/saas-apps/purecloud-by-genesys-provisioning-tutorial.md) |||
| [getAbstract](~/identity/saas-apps/getabstract-provisioning-tutorial.md) |||
| [Getty Images](~/identity/saas-apps/getty-images-tutorial.md) | ||
| [GHAE](~/identity/saas-apps/ghae-provisioning-tutorial.md) |||
| [GitHub](~/identity/saas-apps/github-provisioning-tutorial.md) |||
| [GitHub AE](~/identity/saas-apps/github-ae-provisioning-tutorial.md) |||
| [GitHub Enterprise Cloud - Enterprise Account](~/identity/saas-apps/github-enterprise-cloud-enterprise-account-tutorial.md) | ||
Expand Down
2 changes: 1 addition & 1 deletion docs/identity/authentication/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@
items:
- name: Plan phishing-resistant passwordless authentication
items:
- name: Prerequisites
- name: Get started
href: how-to-plan-prerequisites-phishing-resistant-passwordless-authentication.md
- name: Plan and deploy
href: how-to-deploy-phishing-resistant-passwordless-authentication.md
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Plan prerequisites for a phishing-resistant passwordless authentication deployment in Microsoft Entra ID
title: Get started with a phishing-resistant passwordless authentication deployment in Microsoft Entra ID
description: Detailed guidance for planning the prerequisites to deploy passwordless and phishing-resistant authentication for organizations that use Microsoft Entra ID.

ms.service: entra-id
Expand All @@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
# Customer intent: As an identity administrator, I want to understand how to plan phishing-resistant and passwordless authentication deployment in Microsoft Entra ID

---
# Phishing-resistant passwordless authentication deployment in Microsoft Entra ID
# Get started with phishing-resistant passwordless authentication deployment in Microsoft Entra ID

Passwords are the primary attack vector for modern adversaries, and a source of friction for users and administrators. As part of an overall [Zero Trust security strategy](https://www.microsoft.com/security/business/zero-trust), Microsoft recommends [moving to phishing-resistant passwordless](https://www.microsoft.com/security/business/solutions/passwordless-authentication) in your authentication solution. This guide helps you select, prepare, and deploy the right phishing-resistant passwordless credentials for your organization. Use this guide to plan and execute your phishing-resistant passwordless project.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ manager: amycolannino
ms.service: entra-id
ms.subservice: multitenant-organizations
ms.topic: how-to
ms.date: 03/11/2024
ms.date: 10/09/2024
ms.author: rolyon
ms.custom: it-pro
#Customer intent: As a dev, devops, or it admin, I want to
Expand Down Expand Up @@ -130,6 +130,12 @@ In this step, you automatically redeem invitations in the source tenant.

1. In the source tenant, browse to **Identity** > **External Identities** > **Cross-tenant synchronization**.

:::image type="content" source="./media/cross-tenant-synchronization-configure/navigation-cross-tenant-sync-entra.png" alt-text="Screenshot that shows the Cross-tenant synchronization navigation in the Microsoft Entra admin center." lightbox="./media/cross-tenant-synchronization-configure/navigation-cross-tenant-sync-entra.png":::

If you are using the Azure portal, browse to **Microsoft Entra ID** > **Manage** > **Cross-tenant synchronization**.

:::image type="content" source="./media/cross-tenant-synchronization-configure/navigation-cross-tenant-sync-azure.png" alt-text="Screenshot that shows the Cross-tenant synchronization navigation in the Azure portal." lightbox="./media/cross-tenant-synchronization-configure/navigation-cross-tenant-sync-azure.png":::

1. Select **Configurations**.

1. At the top of the page, select **New configuration**.
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
159 changes: 0 additions & 159 deletions docs/identity/saas-apps/ghae-provisioning-tutorial.md

This file was deleted.

Loading

0 comments on commit e3c436c

Please sign in to comment.