Skip to content

Commit 9d86f86

Browse files
committed
remove a powershell
1 parent 233b8f5 commit 9d86f86

1 file changed

Lines changed: 0 additions & 18 deletions

File tree

support/windows-server/active-directory/troubleshoot-ad-fs-sso-issue.md

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -79,12 +79,6 @@ Verify if the user agent string of your browser is in the list. If not, add the
7979
$wiaStrings = $wiaStrings+"NewUAString"
8080
```
8181

82-
Example:
83-
84-
```powershell
85-
$wiaStrings = $wiaStrings+" =~Windows\s*NT.*Edge"+"Mozilla/5.0"
86-
```
87-
8882
4. Update the WIASupportedUserAgents setting by running the following command:
8983

9084
```powershell
@@ -127,18 +121,6 @@ If the application is Microsoft Online Services, what you experience may be cont
127121
2. **NativeSupport**: The prompt=login parameter is sent as is to AD FS.
128122
3. **Disabled**: Nothing is sent to AD FS.
129123

130-
<a name='azure-active-directory-azure-ad-scenario'></a>
131-
132-
### Microsoft Entra scenario
133-
134-
If the authentication request sent to Microsoft Entra ID include [the prompt=login parameter](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login), disable the prompt=login capability by running the following command:
135-
136-
```powershell
137-
New-MgDomainFederationConfiguration -DomainId <domain_id> -PromptLoginBehavior Disabled
138-
```
139-
140-
After you run this command, Office 365 applications won't include the prompt=login parameter in each authentication request.
141-
142124
<a name='non-azure-ad-scenario'></a>
143125

144126
### Non Microsoft Entra scenario

0 commit comments

Comments
 (0)