Skip to content

Commit 06c3b4c

Browse files
committed
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra
1 parent b6ccc64 commit 06c3b4c

40 files changed

+1234
-938
lines changed

articles/active-directory/saas-apps/velpicsaml-tutorial.md

Lines changed: 35 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Velpic SAML'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Velpic SAML.
2+
title: 'Tutorial: Microsoft Entra single sign-on (SSO) integration with Velpic SAML'
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and Velpic SAML.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -13,31 +13,31 @@ ms.date: 11/21/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Velpic SAML
16+
# Tutorial: Microsoft Entra single sign-on (SSO) integration with Velpic SAML
1717

18-
In this tutorial, you'll learn how to integrate Velpic SAML with Azure Active Directory (Azure AD). When you integrate Velpic SAML with Azure AD, you can:
18+
In this tutorial, you'll learn how to integrate Velpic SAML with Microsoft Entra ID. When you integrate Velpic SAML with Microsoft Entra ID, you can:
1919

20-
* Control in Azure AD who has access to Velpic SAML.
21-
* Enable your users to be automatically signed-in to Velpic SAML with their Azure AD accounts.
20+
* Control in Microsoft Entra ID who has access to Velpic SAML.
21+
* Enable your users to be automatically signed-in to Velpic SAML with their Microsoft Entra accounts.
2222
* Manage your accounts in one central location.
2323

2424
## Prerequisites
2525

2626
To get started, you need the following items:
2727

28-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28+
* A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2929
* Velpic SAML single sign-on (SSO) enabled subscription.
3030

3131
## Scenario description
3232

33-
In this tutorial, you configure and test Azure AD SSO in a test environment.
33+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
3434

3535
* Velpic SAML supports **SP** initiated SSO.
3636
* Velpic SAML supports [Automated user provisioning](velpic-provisioning-tutorial.md).
3737

3838
## Adding Velpic SAML from the gallery
3939

40-
To configure the integration of Velpic SAML into Azure AD, you need to add Velpic SAML from the gallery to your list of managed SaaS apps.
40+
To configure the integration of Velpic SAML into Microsoft Entra ID, you need to add Velpic SAML from the gallery to your list of managed SaaS apps.
4141

4242
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4343
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
@@ -46,22 +46,26 @@ To configure the integration of Velpic SAML into Azure AD, you need to add Velpi
4646

4747
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
4848

49-
## Configure and test Azure AD SSO for Velpic SAML
49+
<a name='configure-and-test-azure-ad-sso-for-velpic-saml'></a>
5050

51-
Configure and test Azure AD SSO with Velpic SAML using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Velpic SAML.
51+
## Configure and test Microsoft Entra SSO for Velpic SAML
5252

53-
To configure and test Azure AD SSO with Velpic SAML, perform the following steps:
53+
Configure and test Microsoft Entra SSO with Velpic SAML using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Velpic SAML.
5454

55-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
55+
To configure and test Microsoft Entra SSO with Velpic SAML, perform the following steps:
56+
57+
1. **[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58+
1. **[Create a Microsoft Entra test user](#create-an-azure-ad-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
59+
1. **[Assign the Microsoft Entra test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
5860
1. **[Configure Velpic SAML SSO](#configure-velpic-saml-sso)** - to configure the single sign-on settings on application side.
59-
1. **[Create Velpic SAML test user](#create-velpic-saml-test-user)** - to have a counterpart of B.Simon in Velpic SAML that is linked to the Azure AD representation of user.
61+
1. **[Create Velpic SAML test user](#create-velpic-saml-test-user)** - to have a counterpart of B.Simon in Velpic SAML that is linked to the Microsoft Entra representation of user.
6062
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6163

62-
## Configure Azure AD SSO
64+
<a name='configure-azure-ad-sso'></a>
65+
66+
## Configure Microsoft Entra SSO
6367

64-
Follow these steps to enable Azure AD SSO.
68+
Follow these steps to enable Microsoft Entra SSO.
6569

6670
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6771
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Velpic SAML** > **Single sign-on**.
@@ -89,7 +93,9 @@ Follow these steps to enable Azure AD SSO.
8993

9094
![Copy configuration URLs](common/copy-configuration-urls.png)
9195

92-
### Create an Azure AD test user
96+
<a name='create-an-azure-ad-test-user'></a>
97+
98+
### Create a Microsoft Entra test user
9399

94100
In this section, you'll create a test user called B.Simon.
95101

@@ -103,7 +109,9 @@ In this section, you'll create a test user called B.Simon.
103109
1. Select **Review + create**.
104110
1. Select **Create**.
105111

106-
### Assign the Azure AD test user
112+
<a name='assign-the-azure-ad-test-user'></a>
113+
114+
### Assign the Microsoft Entra test user
107115

108116
In this section, you'll enable B.Simon to use single sign-on by granting access to Velpic SAML.
109117

@@ -136,15 +144,15 @@ In this section, you'll enable B.Simon to use single sign-on by granting access
136144

137145
7. Enter the name of the new SAML plugin and click the **Add** button.
138146

139-
![Screenshot shows the Add new SAML plugin dialog box with Azure A D entered.](./media/velpicsaml-tutorial/new-plugin.png)
147+
![Screenshot shows the Add new SAML plugin dialog box with Microsoft Entra ID entered.](./media/velpicsaml-tutorial/new-plugin.png)
140148

141149
8. Enter the details as follows:
142150

143-
![Screenshot shows the Azure A D page where you can enter the values described.](./media/velpicsaml-tutorial/details.png)
151+
![Screenshot shows the Microsoft Entra ID page where you can enter the values described.](./media/velpicsaml-tutorial/details.png)
144152

145153
a. In the **Name** textbox, type the name of SAML plugin.
146154

147-
b. In the **Issuer URL** textbox, paste the **Azure AD Identifier** you copied from the **Configure sign-on** window.
155+
b. In the **Issuer URL** textbox, paste the **Microsoft Entra Identifier** you copied from the **Configure sign-on** window.
148156

149157
c. In the **Provider Metadata Config** upload the Metadata XML file which you downloaded previously.
150158

@@ -185,13 +193,13 @@ Sign into your Velpic SAML company site as an administrator and perform followin
185193
186194
## Test SSO
187195

188-
In this section, you test your Azure AD single sign-on configuration using the My Apps.
196+
In this section, you test your Microsoft Entra single sign-on configuration using the My Apps.
189197

190-
1. When you click the Velpic SAML tile in the My Apps, you should get login page of Velpic SAML application. You should see the **Log In With Azure AD** button on the sign in page.
198+
1. When you click the Velpic SAML tile in the My Apps, you should get login page of Velpic SAML application. You should see the **Log In With Microsoft Entra ID** button on the sign in page.
191199

192-
![Screenshot shows the Learning Portal with Log In With Azure A D selected.](./media/velpicsaml-tutorial/login.png)
200+
![Screenshot shows the Learning Portal with Log In With Microsoft Entra ID selected.](./media/velpicsaml-tutorial/login.png)
193201

194-
1. Click on the **Log In With Azure AD** button to log in to Velpic using your Azure AD account.
202+
1. Click on the **Log In With Microsoft Entra ID** button to log in to Velpic using your Microsoft Entra account.
195203

196204
## Next steps
197205

articles/active-directory/saas-apps/venafi-control-plane-tutorial.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory SSO integration with Venafi Control Plane - Datacenter
3-
description: Learn how to configure single sign-on between Azure Active Directory and Venafi Control Plane - Datacenter.
2+
title: Microsoft Entra SSO integration with Venafi Control Plane - Datacenter
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and Venafi Control Plane - Datacenter.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -14,42 +14,48 @@ ms.author: jeedes
1414

1515
---
1616

17-
# Azure Active Directory SSO integration with Venafi Control Plane - Datacenter
17+
# Microsoft Entra SSO integration with Venafi Control Plane - Datacenter
1818

19-
In this article, you'll learn how to integrate Venafi Control Plane - Datacenter with Azure Active Directory (Azure AD). The Venafi Control Plane includes TLS Protect Datacenter, SSH Protect and CodeSign Protect. When you integrate Venafi Control Plane - Datacenter with Azure AD, you can:
19+
In this article, you'll learn how to integrate Venafi Control Plane - Datacenter with Microsoft Entra ID. The Venafi Control Plane includes TLS Protect Datacenter, SSH Protect and CodeSign Protect. When you integrate Venafi Control Plane - Datacenter with Microsoft Entra ID, you can:
2020

21-
* Control in Azure AD who has access to Venafi Control Plane - Datacenter.
22-
* Enable your users to be automatically signed-in to Venafi Control Plane - Datacenter with their Azure AD accounts.
21+
* Control in Microsoft Entra ID who has access to Venafi Control Plane - Datacenter.
22+
* Enable your users to be automatically signed-in to Venafi Control Plane - Datacenter with their Microsoft Entra accounts.
2323
* Manage your accounts in one central location.
2424

25-
You'll configure and test Azure AD single sign-on for Venafi Control Plane - Datacenter in a test environment. Venafi Control Plane - Datacenter supports both **SP** and **IDP** initiated single sign-on.
25+
You'll configure and test Microsoft Entra single sign-on for Venafi Control Plane - Datacenter in a test environment. Venafi Control Plane - Datacenter supports both **SP** and **IDP** initiated single sign-on.
2626

2727
## Prerequisites
2828

29-
To integrate Azure Active Directory with Venafi Control Plane - Datacenter, you need:
29+
To integrate Microsoft Entra ID with Venafi Control Plane - Datacenter, you need:
3030

31-
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31+
* A Microsoft Entra user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3232
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
33+
* A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3434
* Venafi Control Plane - Datacenter single sign-on (SSO) enabled subscription.
3535

3636
## Add application and assign a test user
3737

38-
Before you begin the process of configuring single sign-on, you need to add the Venafi Control Plane - Datacenter application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
38+
Before you begin the process of configuring single sign-on, you need to add the Venafi Control Plane - Datacenter application from the Microsoft Entra gallery. You need a test user account to assign to the application and test the single sign-on configuration.
3939

40-
### Add Venafi Control Plane - Datacenter from the Azure AD gallery
40+
<a name='add-venafi-control-plane---datacenter-from-the-azure-ad-gallery'></a>
4141

42-
Add Venafi Control Plane - Datacenter from the Azure AD application gallery to configure single sign-on with Venafi Control Plane - Datacenter. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
42+
### Add Venafi Control Plane - Datacenter from the Microsoft Entra gallery
4343

44-
### Create and assign Azure AD test user
44+
Add Venafi Control Plane - Datacenter from the Microsoft Entra application gallery to configure single sign-on with Venafi Control Plane - Datacenter. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
45+
46+
<a name='create-and-assign-azure-ad-test-user'></a>
47+
48+
### Create and assign Microsoft Entra test user
4549

4650
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account called B.Simon.
4751

4852
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
4953

50-
## Configure Azure AD SSO
54+
<a name='configure-azure-ad-sso'></a>
55+
56+
## Configure Microsoft Entra SSO
5157

52-
Complete the following steps to enable Azure AD single sign-on.
58+
Complete the following steps to enable Microsoft Entra single sign-on.
5359

5460
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
5561
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Venafi Control Plane - Datacenter** > **Single sign-on**.
@@ -88,7 +94,7 @@ In this section, you create a user called Britta Simon in Venafi Control Plane -
8894

8995
## Test SSO
9096

91-
In this section, you test your Azure AD single sign-on configuration with following options.
97+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
9298

9399
#### SP initiated:
94100

@@ -100,13 +106,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
100106

101107
* Click on **Test this application**, and you should be automatically signed in to the Venafi Control Plane - Datacenter for which you set up the SSO.
102108

103-
You can also use Microsoft My Apps to test the application in any mode. When you click the Venafi Control Plane - Datacenter tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Venafi Control Plane - Datacenter for which you set up the SSO. For more information, see [Azure AD My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
109+
You can also use Microsoft My Apps to test the application in any mode. When you click the Venafi Control Plane - Datacenter tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Venafi Control Plane - Datacenter for which you set up the SSO. For more information, see [Microsoft Entra My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
104110

105111
## Additional resources
106112

107-
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
113+
* [What is single sign-on with Microsoft Entra ID?](../manage-apps/what-is-single-sign-on.md)
108114
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
109115

110116
## Next steps
111117

112-
Once you configure Venafi Control Plane - Datacenter you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
118+
Once you configure Venafi Control Plane - Datacenter you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)