diff --git a/docs/identity/saas-apps/screensteps-tutorial.md b/docs/identity/saas-apps/screensteps-tutorial.md index 85f8de34ce4..2b5559e4606 100644 --- a/docs/identity/saas-apps/screensteps-tutorial.md +++ b/docs/identity/saas-apps/screensteps-tutorial.md @@ -135,7 +135,7 @@ In this section, you'll enable B.Simon to use single sign-on by granting access a. In the **Remote Login URL** field, paste the **Login URL** which you copied from the Microsoft Entra admin center. - b. In the **Logout URL** field, paste the **Logout URL** which you copied from the Microsoft Entra admin center. + b. Leave the **Logout URL** field blank c. Copy **SAML Consumer URL** value, paste this value into the **Sign-on URL** text box in the **Basic SAML Configuration** section in Microsoft Entra admin center. @@ -167,4 +167,4 @@ In this section, you test your Microsoft Entra single sign-on configuration with ## Next steps -Once you configure ScreenSteps you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad). \ No newline at end of file +Once you configure ScreenSteps you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).