Skip to content

Commit 0947981

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-azcopy
2 parents 40b8080 + a0a5a65 commit 0947981

File tree

59 files changed

+1005
-725
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+1005
-725
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,12 @@
99
"source_path": "articles/azure-government/documentation-government-get-started-connect-with-vs.md",
1010
"redirect_url": "/azure/azure-government/documentation-government-welcome",
1111
"redirect_document_id": false
12-
},
12+
},
13+
{
14+
"source_path": "articles/container-registry/container-registry-auth-aks.md",
15+
"redirect_url": "/azure/aks/cluster-container-registry-integration",
16+
"redirect_document_id": true
17+
},
1318
{
1419
"source_path": "articles/security/develop/security-code-analysis-install.md",
1520
"redirect_url": "/azure/security/develop/security-code-analysis-onboard",

articles/active-directory/conditional-access/technical-reference.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,6 @@ You can assign a Conditional Access policy to the following cloud apps from Micr
7070
- Project Online
7171
- Skype for Business Online
7272
- Virtual Private Network (VPN)
73-
- Visual Studio App Center
7473
- Windows Defender ATP
7574

7675
### Other applications

articles/active-directory/manage-apps/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ metadata:
77
title: Application management documentation
88
description: Azure Active Directory provides secure and seamless access to cloud and on-premises applications. Plus, there's no need to manage passwords. Your end-users can sign in once to access Office 365 and thousands of other applications. Learn how to manage and deploy applications with our quickstarts, tutorials, and guidance.
99
ms.service: active-directory
10-
ms.subservice: manage-apps
10+
ms.subservice: app-mgmt
1111
ms.workload: identity
1212
ms.topic: landing-page
13-
ms.date: 08/16/2019
13+
ms.date: 10/10/2019
1414
author: msmimart
1515
ms.author: mimart
1616
manager: celested

articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use this feature, you need:
3939

4040
1. Sign in to the [Azure portal](https://portal.azure.com).
4141

42-
2. Select **Azure Active Directory** > **Activity** > **Audit logs**.
42+
2. Select **Azure Active Directory** > **Monitoring** > **Audit logs**.
4343

4444
3. Select **Export Settings**.
4545

articles/active-directory/saas-apps/adglobalview-tutorial.md

Lines changed: 68 additions & 147 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/dome9arc-tutorial.md

Lines changed: 69 additions & 77 deletions
Large diffs are not rendered by default.
Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,147 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with ExponentHR | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and ExponentHR.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: ccfeea70-1cbd-49fb-9154-1dd3f9a0417c
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 10/04/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with ExponentHR
24+
25+
In this tutorial, you'll learn how to integrate ExponentHR with Azure Active Directory (Azure AD). When you integrate ExponentHR with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to ExponentHR.
28+
* Enable your users to be automatically signed-in to ExponentHR with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* ExponentHR single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* ExponentHR supports **SP** initiated SSO
45+
46+
* ExponentHR supports **WS-Fed** protocol
47+
48+
> [!NOTE]
49+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
50+
51+
## Adding ExponentHR from the gallery
52+
53+
To configure the integration of ExponentHR into Azure AD, you need to add ExponentHR from the gallery to your list of managed SaaS apps.
54+
55+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
56+
1. On the left navigation pane, select the **Azure Active Directory** service.
57+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
58+
1. To add new application, select **New application**.
59+
1. In the **Add from the gallery** section, type **ExponentHR** in the search box.
60+
1. Select **ExponentHR** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
61+
62+
## Configure and test Azure AD single sign-on for ExponentHR
63+
64+
Configure and test Azure AD SSO with ExponentHR using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExponentHR.
65+
66+
To configure and test Azure AD SSO with ExponentHR, complete the following building blocks:
67+
68+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
69+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
70+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
71+
1. **[Configure ExponentHR SSO](#configure-exponenthr-sso)** - to configure the single sign-on settings on application side.
72+
1. **[Create ExponentHR test user](#create-exponenthr-test-user)** - to have a counterpart of B.Simon in ExponentHR that is linked to the Azure AD representation of user.
73+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
74+
75+
## Configure Azure AD SSO
76+
77+
Follow these steps to enable Azure AD SSO in the Azure portal.
78+
79+
1. In the [Azure portal](https://portal.azure.com/), on the **ExponentHR** application integration page, find the **Manage** section and select **single sign-on**.
80+
1. On the **Select a single sign-on method** page, select **SAML**.
81+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
82+
83+
![Edit Basic SAML Configuration](common/edit-urls.png)
84+
85+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
86+
87+
In the **Sign-on URL** text box, type a URL using the following pattern:
88+
`https://www.exponenthr.com/service/saml/login.aspx`
89+
90+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
91+
92+
![The Certificate download link](common/copy-metadataurl.png)
93+
94+
### Create an Azure AD test user
95+
96+
In this section, you'll create a test user in the Azure portal called B.Simon.
97+
98+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
99+
1. Select **New user** at the top of the screen.
100+
1. In the **User** properties, follow these steps:
101+
1. In the **Name** field, enter `B.Simon`.
102+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
103+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
104+
1. Click **Create**.
105+
106+
### Assign the Azure AD test user
107+
108+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExponentHR.
109+
110+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
111+
1. In the applications list, select **ExponentHR**.
112+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
113+
114+
![The "Users and groups" link](common/users-groups-blade.png)
115+
116+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
117+
118+
![The Add User link](common/add-assign-user.png)
119+
120+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
121+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
122+
1. In the **Add Assignment** dialog, click the **Assign** button.
123+
124+
## Configure ExponentHR SSO
125+
126+
To configure single sign-on on **ExponentHR** side, you need to send the **App Federation Metadata Url** to [ExponentHR support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
127+
128+
### Create ExponentHR test user
129+
130+
In this section, you create a user called B.Simon in ExponentHR. Work with [ExponentHR support team](mailto:[email protected]) to add the users in the ExponentHR platform. Users must be created and activated before you use single sign-on.
131+
132+
## Test SSO
133+
134+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
135+
136+
When you click the ExponentHR tile in the Access Panel, you should be automatically signed in to the ExponentHR for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
137+
138+
## Additional resources
139+
140+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
141+
142+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
143+
144+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
145+
146+
- [Try ExponentHR with Azure AD](https://aad.portal.azure.com/)
147+
Lines changed: 146 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,146 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with In Case of Crisis - Mobile | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and In Case of Crisis - Mobile.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 6afa98e9-a123-4cbb-add6-afcefc1242e5
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 10/04/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with In Case of Crisis - Mobile
24+
25+
In this tutorial, you'll learn how to integrate In Case of Crisis - Mobile with Azure Active Directory (Azure AD). When you integrate In Case of Crisis - Mobile with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to In Case of Crisis - Mobile.
28+
* Enable your users to be automatically signed-in to In Case of Crisis - Mobile with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* In Case of Crisis - Mobile single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* In Case of Crisis - Mobile supports **IDP** initiated SSO
45+
46+
> [!NOTE]
47+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
48+
49+
## Adding In Case of Crisis - Mobile from the gallery
50+
51+
To configure the integration of In Case of Crisis - Mobile into Azure AD, you need to add In Case of Crisis - Mobile from the gallery to your list of managed SaaS apps.
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
54+
1. On the left navigation pane, select the **Azure Active Directory** service.
55+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
56+
1. To add new application, select **New application**.
57+
1. In the **Add from the gallery** section, type **In Case of Crisis - Mobile** in the search box.
58+
1. Select **In Case of Crisis - Mobile** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
59+
60+
## Configure and test Azure AD single sign-on for In Case of Crisis - Mobile
61+
62+
Configure and test Azure AD SSO with In Case of Crisis - Mobile using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in In Case of Crisis - Mobile.
63+
64+
To configure and test Azure AD SSO with In Case of Crisis - Mobile, complete the following building blocks:
65+
66+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
67+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
69+
1. **[Configure In Case of Crisis - Mobile SSO](#configure-in-case-of-crisis---mobile-sso)** - to configure the single sign-on settings on application side.
70+
1. **[Create In Case of Crisis - Mobile test user](#create-in-case-of-crisis---mobile-test-user)** - to have a counterpart of B.Simon in In Case of Crisis - Mobile that is linked to the Azure AD representation of user.
71+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
72+
73+
## Configure Azure AD SSO
74+
75+
Follow these steps to enable Azure AD SSO in the Azure portal.
76+
77+
1. In the [Azure portal](https://portal.azure.com/), on the **In Case of Crisis - Mobile** application integration page, find the **Manage** section and select **single sign-on**.
78+
1. On the **Select a single sign-on method** page, select **SAML**.
79+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
80+
81+
![Edit Basic SAML Configuration](common/edit-urls.png)
82+
83+
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
84+
85+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Raw)** and select **Download** to download the certificate and save it on your computer.
86+
87+
![The Certificate download link](common/certificateraw.png)
88+
89+
1. Navigate to the **Manage** section on left side of page, click on **Properties tab** then copy the **User access URL** and save it on your computer.
90+
91+
![Single sign-on properties](./media/in-case-of-crisis-mobile-tutorial/properties.png)
92+
93+
### Create an Azure AD test user
94+
95+
In this section, you'll create a test user in the Azure portal called B.Simon.
96+
97+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
98+
1. Select **New user** at the top of the screen.
99+
1. In the **User** properties, follow these steps:
100+
1. In the **Name** field, enter `B.Simon`.
101+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
102+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
103+
1. Click **Create**.
104+
105+
### Assign the Azure AD test user
106+
107+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to In Case of Crisis - Mobile.
108+
109+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
110+
1. In the applications list, select **In Case of Crisis - Mobile**.
111+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
112+
113+
![The "Users and groups" link](common/users-groups-blade.png)
114+
115+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116+
117+
![The Add User link](common/add-assign-user.png)
118+
119+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
120+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
121+
1. In the **Add Assignment** dialog, click the **Assign** button.
122+
123+
## Configure In Case of Crisis - Mobile SSO
124+
125+
To configure single sign-on on **In Case of Crisis - Mobile** side, you need to send the downloaded **Certificate (Raw)** and copied **User access URL** from Azure portal to [In Case of Crisis - Mobile support team](https://www.rockdovesolutions.com/features/enterprise-ready). They set this setting to have the SAML SSO connection set properly on both sides.
126+
127+
### Create In Case of Crisis - Mobile test user
128+
129+
In this section, you create a user called Britta Simon in In Case of Crisis - Mobile. Work with [In Case of Crisis - Mobile support team](https://www.rockdovesolutions.com/features/enterprise-ready) to add the users in the In Case of Crisis - Mobile platform. Users must be created and activated before you use single sign-on.
130+
131+
## Test SSO
132+
133+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
134+
135+
When you click the In Case of Crisis - Mobile tile in the Access Panel, you should be automatically signed in to the In Case of Crisis - Mobile for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
136+
137+
## Additional resources
138+
139+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
140+
141+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
142+
143+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
144+
145+
- [Try In Case of Crisis - Mobile with Azure AD](https://aad.portal.azure.com/)
146+

0 commit comments

Comments
 (0)