Skip to content

Commit 02a17ec

Browse files
authored
Merge pull request #252273 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230920-132739-2854987-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra (part 43)
2 parents 0e26869 + 29d9255 commit 02a17ec

40 files changed

+1258
-974
lines changed

articles/active-directory/saas-apps/wayleadr-tutorial.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory SSO integration with Wayleadr
3-
description: Learn how to configure single sign-on between Azure Active Directory and Wayleadr.
2+
title: Microsoft Entra SSO integration with Wayleadr
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and Wayleadr.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -14,45 +14,51 @@ ms.author: jeedes
1414

1515
---
1616

17-
# Azure Active Directory SSO integration with Wayleadr
17+
# Microsoft Entra SSO integration with Wayleadr
1818

19-
In this article, you learn how to integrate Wayleadr with Azure Active Directory (Azure AD). Wayleadr is the world’s first software for managing parking, EV charger rotation and access control. Make arriving at your building easy. When you integrate Wayleadr with Azure AD, you can:
19+
In this article, you learn how to integrate Wayleadr with Microsoft Entra ID. Wayleadr is the world’s first software for managing parking, EV charger rotation and access control. Make arriving at your building easy. When you integrate Wayleadr with Microsoft Entra ID, you can:
2020

21-
* Control in Azure AD who has access to Wayleadr.
22-
* Enable your users to be automatically signed-in to Wayleadr with their Azure AD accounts.
21+
* Control in Microsoft Entra ID who has access to Wayleadr.
22+
* Enable your users to be automatically signed-in to Wayleadr with their Microsoft Entra accounts.
2323
* Manage your accounts in one central location.
2424

25-
You'll configure and test Azure AD single sign-on for Wayleadr in a test environment. Wayleadr supports both **SP** and **IDP** initiated single sign-on.
25+
You'll configure and test Microsoft Entra single sign-on for Wayleadr in a test environment. Wayleadr supports both **SP** and **IDP** initiated single sign-on.
2626

2727
> [!NOTE]
2828
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
2929
3030
## Prerequisites
3131

32-
To integrate Azure Active Directory with Wayleadr, you need:
32+
To integrate Microsoft Entra ID with Wayleadr, you need:
3333

34-
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34+
* A Microsoft Entra user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3535
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
36+
* A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3737
* Wayleadr single sign-on (SSO) enabled subscription.
3838

3939
## Add application and assign a test user
4040

41-
Before you begin the process of configuring single sign-on, you need to add the Wayleadr application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
41+
Before you begin the process of configuring single sign-on, you need to add the Wayleadr application from the Microsoft Entra gallery. You need a test user account to assign to the application and test the single sign-on configuration.
4242

43-
### Add Wayleadr from the Azure AD gallery
43+
<a name='add-wayleadr-from-the-azure-ad-gallery'></a>
4444

45-
Add Wayleadr from the Azure AD application gallery to configure single sign-on with Wayleadr. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
45+
### Add Wayleadr from the Microsoft Entra gallery
4646

47-
### Create and assign Azure AD test user
47+
Add Wayleadr from the Microsoft Entra application gallery to configure single sign-on with Wayleadr. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
48+
49+
<a name='create-and-assign-azure-ad-test-user'></a>
50+
51+
### Create and assign Microsoft Entra test user
4852

4953
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account called B.Simon.
5054

5155
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5256

53-
## Configure Azure AD SSO
57+
<a name='configure-azure-ad-sso'></a>
58+
59+
## Configure Microsoft Entra SSO
5460

55-
Complete the following steps to enable Azure AD single sign-on.
61+
Complete the following steps to enable Microsoft Entra single sign-on.
5662

5763
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
5864
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Wayleadr** > **Single sign-on**.
@@ -100,7 +106,7 @@ In this section, you create a user called Britta Simon at Wayleadr. Work with [W
100106

101107
## Test SSO
102108

103-
In this section, you test your Azure AD single sign-on configuration with following options.
109+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
104110

105111
#### SP initiated:
106112

@@ -112,13 +118,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
112118

113119
* Click on **Test this application**, and you should be automatically signed in to the Wayleadr for which you set up the SSO.
114120

115-
You can also use Microsoft My Apps to test the application in any mode. When you click the Wayleadr tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Wayleadr for which you set up the SSO. For more information, see [Azure AD My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
121+
You can also use Microsoft My Apps to test the application in any mode. When you click the Wayleadr tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Wayleadr for which you set up the SSO. For more information, see [Microsoft Entra My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
116122

117123
## Additional resources
118124

119-
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
125+
* [What is single sign-on with Microsoft Entra ID?](../manage-apps/what-is-single-sign-on.md)
120126
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
121127

122128
## Next steps
123129

124-
Once you configure Wayleadr you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
130+
Once you configure Wayleadr you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/waywedo-tutorial.md

Lines changed: 33 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure AD SSO integration with Way We Do'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Way We Do.
2+
title: 'Tutorial: Microsoft Entra SSO integration with Way We Do'
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and Way We Do.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -13,31 +13,31 @@ ms.date: 11/21/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure AD SSO integration with Way We Do
16+
# Tutorial: Microsoft Entra SSO integration with Way We Do
1717

18-
In this tutorial, you'll learn how to integrate Way We Do with Azure Active Directory (Azure AD). When you integrate Way We Do with Azure AD, you can:
18+
In this tutorial, you'll learn how to integrate Way We Do with Microsoft Entra ID. When you integrate Way We Do with Microsoft Entra ID, you can:
1919

20-
* Control in Azure AD who has access to Way We Do.
21-
* Enable your users to be automatically signed-in to Way We Do with their Azure AD accounts.
20+
* Control in Microsoft Entra ID who has access to Way We Do.
21+
* Enable your users to be automatically signed-in to Way We Do with their Microsoft Entra accounts.
2222
* Manage your accounts in one central location.
2323

2424
## Prerequisites
2525

26-
To configure Azure AD integration with Way We Do, you need the following items:
26+
To configure Microsoft Entra integration with Way We Do, you need the following items:
2727

28-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
28+
* A Microsoft Entra subscription. If you don't have a Microsoft Entra environment, you can get a [free account](https://azure.microsoft.com/free/).
2929
* Way We Do single sign-on enabled subscription.
3030

3131
## Scenario description
3232

33-
In this tutorial, you configure and test Azure AD SSO in a test environment.
33+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
3434

3535
* Way We Do supports **SP** initiated SSO.
3636
* Way We Do supports **Just In Time** user provisioning.
3737

3838
## Add Way We Do from the gallery
3939

40-
To configure the integration of Way We Do into Azure AD, you need to add Way We Do from the gallery to your list of managed SaaS apps.
40+
To configure the integration of Way We Do into Microsoft Entra ID, you need to add Way We Do from the gallery to your list of managed SaaS apps.
4141

4242
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4343
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
@@ -46,22 +46,26 @@ To configure the integration of Way We Do into Azure AD, you need to add Way We
4646

4747
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
4848

49-
## Configure and test Azure AD SSO for Way We Do
49+
<a name='configure-and-test-azure-ad-sso-for-way-we-do'></a>
5050

51-
Configure and test Azure AD SSO with Way We Do using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Way We Do.
51+
## Configure and test Microsoft Entra SSO for Way We Do
5252

53-
To configure and test Azure AD SSO with Way We Do, perform the following steps:
53+
Configure and test Microsoft Entra SSO with Way We Do using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Way We Do.
5454

55-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
55+
To configure and test Microsoft Entra SSO with Way We Do, perform the following steps:
56+
57+
1. **[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58+
1. **[Create a Microsoft Entra test user](#create-an-azure-ad-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
59+
1. **[Assign the Microsoft Entra test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
5860
1. **[Configure Way We Do SSO](#configure-way-we-do-sso)** - to configure the single sign-on settings on application side.
59-
1. **[Create Way We Do test user](#create-way-we-do-test-user)** - to have a counterpart of B.Simon in Way We Do that is linked to the Azure AD representation of user.
61+
1. **[Create Way We Do test user](#create-way-we-do-test-user)** - to have a counterpart of B.Simon in Way We Do that is linked to the Microsoft Entra representation of user.
6062
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6163

62-
## Configure Azure AD SSO
64+
<a name='configure-azure-ad-sso'></a>
65+
66+
## Configure Microsoft Entra SSO
6367

64-
Follow these steps to enable Azure AD SSO.
68+
Follow these steps to enable Microsoft Entra SSO.
6569

6670
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6771
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Way We Do** application integration page, find the **Manage** section and select **Single sign-on**.
@@ -89,7 +93,9 @@ Follow these steps to enable Azure AD SSO.
8993

9094
![Copy configuration URLs](common/copy-configuration-urls.png)
9195

92-
### Create an Azure AD test user
96+
<a name='create-an-azure-ad-test-user'></a>
97+
98+
### Create a Microsoft Entra test user
9399

94100
In this section, you'll create a test user called B.Simon.
95101

@@ -103,7 +109,9 @@ In this section, you'll create a test user called B.Simon.
103109
1. Select **Review + create**.
104110
1. Select **Create**.
105111

106-
### Assign the Azure AD test user
112+
<a name='assign-the-azure-ad-test-user'></a>
113+
114+
### Assign the Microsoft Entra test user
107115

108116
In this section, you'll enable B.Simon to use single sign-on by granting access to Way We Do.
109117

@@ -138,7 +146,7 @@ In this section, you'll enable B.Simon to use single sign-on by granting access
138146

139147
1. In the **Single sign-on name** textbox, enter your name.
140148

141-
1. In the **Entity ID** textbox, paste the value of **Azure AD Identifier**, which you copied previously.
149+
1. In the **Entity ID** textbox, paste the value of **Microsoft Entra Identifier**, which you copied previously.
142150

143151
1. In the **SAML SSO URL** textbox, paste the value of **Login URL**, which you copied previously.
144152

@@ -164,14 +172,14 @@ In this section, a user called Britta Simon is created in Way We Do. Way We Do s
164172
165173
## Test SSO
166174

167-
In this section, you test your Azure AD single sign-on configuration with following options.
175+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
168176

169177
* Click on **Test this application**, this will redirect to Way We Do Sign-on URL where you can initiate the login flow.
170178

171179
* Go to Way We Do Sign-on URL directly and initiate the login flow from there.
172180

173-
* You can use Microsoft My Apps. When you click the Way We Do tile in the My Apps, this will redirect to Way We Do Sign-on URL. For more information, see [Azure AD My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
181+
* You can use Microsoft My Apps. When you click the Way We Do tile in the My Apps, this will redirect to Way We Do Sign-on URL. For more information, see [Microsoft Entra My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
174182

175183
## Next steps
176184

177-
Once you configure Way We Do you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
185+
Once you configure Way We Do you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)