Skip to content

Commit 0a261a1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ml-g-dashboardext
2 parents dbf7b5a + 22639fc commit 0a261a1

File tree

644 files changed

+4517
-3842
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

644 files changed

+4517
-3842
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/release-notes.md",
40+
"redirect_url": "/azure/azure-monitor/app/app-insights-overview",
41+
"redirect_document_id": false
42+
},
3843
{
3944
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-web-app.md",
4045
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-web-app",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -665,13 +665,17 @@
665665
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-mapping-debugger",
666666
"redirect_document_id": false
667667
},
668+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-monitoring-tab.md",
669+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-monitoring-and-health-checks-tabs",
670+
"redirect_document_id": false
671+
},
668672
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
669673
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
670674
"redirect_document_id": false
671675
},
672676
{ "source_path_from_root": "/articles/healthcare-apis/events/events-export-logs-metrics.md",
673677
"redirect_url": "/azure/healthcare-apis/events/events-enable-diagnostic-settings",
674-
"redirect_document_id": true
678+
"redirect_document_id": false
675679
}
676680
]
677681
}

.openpublishing.redirection.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6313,16 +6313,6 @@
63136313
"redirect_url": "/azure/architecture/service-fabric/migrate-from-cloud-services",
63146314
"redirect_document_id": false
63156315
},
6316-
{
6317-
"source_path_from_root": "/articles/batch/batch-custom-image-pools-to-azure-compute-gallery-migration-guide.md",
6318-
"redirect_url": "/azure/batch",
6319-
"redirect_document_id": false
6320-
},
6321-
{
6322-
"source_path_from_root": "/articles/batch/batch-pools-to-simplified-compute-node-communication-model-migration-guide.md",
6323-
"redirect_url": "/azure/batch",
6324-
"redirect_document_id": false
6325-
},
63266316
{
63276317
"source_path_from_root": "/articles/batch/big-compute-resources.md",
63286318
"redirect_url": "/azure/architecture/topics/high-performance-computing/",
Lines changed: 91 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -1,105 +1,126 @@
11
---
2-
title: Tutorial for configuring Saviynt with Azure Active Directory B2C
2+
title: Tutorial to configure Saviynt with Azure Active Directory B2C
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Azure Active Directory B2C with Saviynt for cross application integration to streamline IT modernization and promote better security, governance, and compliance. 
4+
description: Learn to configure Azure AD B2C with Saviynt for cross-application integration for better security, governance, and compliance. 
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/20/2021
12+
ms.date: 03/07/2023
1413
ms.author: gasinh
1514
ms.subservice: B2C
1615
---
1716

18-
# Tutorial for configuring Saviynt with Azure Active Directory B2C
19-
20-
In this sample tutorial, we provide guidance on how to integrate Azure Active Directory (AD) B2C with [Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/). Saviynt’s Security Manager platform provides the visibility, security, and governance today’s businesses need, in a single unified platform. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
17+
# Tutorial to configure Saviynt with Azure Active Directory B2C
2118

22-
In this sample tutorial, you'll set up Saviynt to provide fine grained access control based delegated administration for Azure AD B2C users. Saviynt does the following checks to determine if a user is authorized to manage Azure AD B2C users.
19+
Learn to integrate Azure Active Directory B2C (Azure AD B2C) with the Saviynt Security Manager platform, which has visibility, security, and governance. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
2320

24-
- Feature level security to determine if a user can perform a specific operation. For example, Create user, Update user, Reset user password, and so on.
21+
Learn more: [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
2522

26-
- Field level security to determine if a user can read/write a specific attribute of another user during user management operations. For example, help desk agent can only update phone number and all other attributes are read-only.
23+
Use the following instructions to set up access control delegated administration for Azure AD B2C users. Saviynt determines if a user is authorized to manage Azure AD B2C users with:
2724

28-
- Data level security to determine if a user can perform a certain operation on a specific user. For example, help desk administrator for UK region can manage UK users only.
25+
* Feature level security to determine if users can perform an operation
26+
* For example, create user, update user, reset user password, and so on
27+
* Field level security to determine if users can read/write user attributes during user management operations
28+
* For example, a Help Desk agent can update a phone number; other attributes are read-only
29+
* Data level security to determine if users can perform an operation on another user
30+
* For example, a Help Desk administrator for the United Kingdom region manages UK users
2931

3032
## Prerequisites
3133

32-
To get started, you'll need:
33-
34-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
35-
36-
- An [Azure AD B2C tenant](./tutorial-create-tenant.md). Tenant is linked to your Azure subscription.
34+
To get started, you need:
3735

38-
- A Saviynt [subscription](https://saviynt.com/contact-us/)
36+
* An Azure AD subscription
37+
* If you don't have on, get an [Azure free account](https://azure.microsoft.com/free/)
38+
* An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
39+
* Go to saviynt.com [Contact Us](https://saviynt.com/contact-us/) to request a demo
3940

4041
## Scenario description
4142

4243
The Saviynt integration includes the following components:
4344

44-
- [Azure AD B2C](https://azure.microsoft.com/services/active-directory/external-identities/b2c/) – The business-to-customer identity as a service that enables custom control of how your customers sign up, sign in, and manage their profiles.
45+
* **Azure AD B2C** – identity as a service for custom control of customer sign-up, sign-in, and profile management
46+
* See, [Azure AD B2C, Get started](https://azure.microsoft.com/services/active-directory/external-identities/b2c/)
47+
* **Saviynt for Azure AD B2C** – identity governance for delegated administration of user life-cycle management and access governance
48+
* See, [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
49+
* **Microsoft Graph API** – interface for Saviynt to manage Azure AD B2C users and their access
50+
* See, [Use the Microsoft Graph API](/graph/use-the-api)
51+
4552

46-
- [Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/)The identity governance platform that provides fine grained delegated administration for user life-cycle management and access governance of Azure AD B2C users.
53+
The following architecture diagram illustrates the implementation.
4754

48-
- [Microsoft Graph API](/graph/use-the-api) – This API provides the interfaces for Saviynt to manage the Azure AD B2C users and their access in Azure AD B2C.
55+
![Diagram of the Saviynt architecture.](./media/partner-saviynt/saviynt-architecture-diagram.png)
4956

50-
The following architecture diagram shows the implementation.
57+
1. A delegated administrator starts the Azure AD B2C user operation with Saviynt.
58+
2. Saviynt verifies the delegated administrator can perform the operation.
59+
3. Saviynt sends an authorization success or failure response.
60+
4. Saviynt allows the delegated administrator to perform the operation.
61+
5. Saviynt invokes Microsoft Graph API, with user attributes, to manage the user in Azure AD B2C.
62+
6. Microsoft Graph API creates, updates, or deletes the user in Azure AD B2C.
63+
7. Azure AD B2C sends a success or failure response.
64+
8. Microsoft Graph API returns the response to Saviynt.
5165

52-
![Image showing saviynt architecture diagram](./media/partner-saviynt/saviynt-architecture-diagram.png)
66+
## Create a Saviynt account and create delegated policies
5367

54-
|Step | Description |
55-
|:-----| :-----------|
56-
| 1. | A delegated administrator starts a manage Azure AD B2C user operation through Saviynt.
57-
| 2. | Saviynt verifies with its authorization engine if the delegated administrator can do the specific operation.
58-
| 3. | Saviynt’s authorization engine sends an authorization success/failure response.
59-
| 4. | Saviynt allows the delegated administrator to do the required operation.
60-
| 5. | Saviynt invokes Microsoft Graph API along with user attributes to manage the user in Azure AD B2C
61-
| 6. | Microsoft Graph API will in turn create/update/delete the user in Azure AD B2C.
62-
| 7. | Azure AD B2C will send a success/failure response.
63-
| 8. | Microsoft Graph API will then return the response to Saviynt.
64-
65-
## Onboard with Saviynt
66-
67-
1. To create a Saviynt account, contact [Saviynt](https://saviynt.com/contact-us/)
68-
69-
2. Create delegated administration policies and assign users as delegated administrators with various roles.
68+
1. Create a Saviynt account. To get started, go to saviynt.com [Contact Us](https://saviynt.com/contact-us/).
69+
2. Create delegated administration policies.
70+
3. Assign users the delegated administrator role.
7071

7172
## Configure Azure AD B2C with Saviynt
7273

73-
### Create an Azure AD Application for Saviynt
74-
75-
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
76-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
77-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
78-
1. In the Azure portal, search and select **Azure AD B2C**.
79-
1. Select **App registrations** > **New registration**.
80-
1. Enter a Name for the application. For example, Saviynt and select **Create**.
81-
1. Go to **API Permissions** and select **+ Add a permission.**
82-
1. The Request API permissions page appears. Select **Microsoft APIs** tab and select **Microsoft Graph** as commonly used Microsoft APIs.
83-
1. Go to the next page, and select **Application permissions**.
84-
1. Select **Directory**, and select **Directory.Read.All** and **Directory.ReadWrite.All** checkboxes.
85-
1. Select **Add Permissions**. Review the permissions added.
86-
1. Select **Grant admin consent for Default Directory** > **Save**.
87-
1. Go to **Certificates and Secrets** and select **+ Add Client Secret**. Enter the client secret description, select the expiry option, and select **Add**.
88-
1. The Secret key is generated and displayed in the Client secret section. You'll need to use it later.
89-
90-
1. Go to **Overview** and get the **Client ID** and **Tenant ID**.
91-
1. Tenant ID, client ID, and client secret will be needed to complete the setup in Saviynt.
92-
93-
### Enable Saviynt to Delete users
94-
95-
The below steps explain how to enable Saviynt to perform user delete operations in Azure AD B2C.
74+
Use the following instructions to create an application, delete users, and more.
9675

97-
>[!NOTE]
98-
>[Evaluate the risk before granting admin roles access to a service principal.](../active-directory/develop/app-objects-and-service-principals.md)
76+
### Create an Azure AD application for Saviynt
9977

100-
1. Install the latest version of MSOnline PowerShell Module on a Windows workstation/server.
78+
For the following instructions, use the directory with the Azure AD B2C tenant.
10179

102-
2. Connect to AzureAD PowerShell module and execute the following commands:
80+
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
81+
2. In the portal toolbar, select **Directories + subscriptions**.
82+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
83+
4. Select **Switch**.
84+
5. In the Azure portal, search and select **Azure AD B2C**.
85+
6. Select **App registrations** > **New registration**.
86+
7. Enter an application name. For example, Saviynt.
87+
8. Select **Create**.
88+
9. Go to **API Permissions**.
89+
10. Select **+ Add a permission.**
90+
11. The Request API permissions page appears.
91+
12. Select **Microsoft APIs** tab.
92+
13. Select **Microsoft Graph** as commonly used Microsoft APIs.
93+
14. Go to the next page.
94+
15. Select **Application permissions**.
95+
16. Select **Directory**.
96+
17. Select the **Directory.Read.All** and **Directory.ReadWrite.All** checkboxes.
97+
18. Select **Add Permissions**.
98+
19. Review the permissions.
99+
20. Select **Grant admin consent for Default Directory**.
100+
21. Select **Save**.
101+
22. Go to **Certificates and Secrets**.
102+
23. Select **+ Add Client Secret**.
103+
24. Enter the client secret description.
104+
25. Select the expiry option.
105+
26. Select **Add**.
106+
27. The Secret Key appears in the Client Secret section. Save the Client Secret to use later.
107+
108+
1. Go to **Overview**.
109+
2. Copy the **Client ID** and **Tenant ID**.
110+
111+
Save the Tenant ID, Client ID, and Client Secret to complete the setup.
112+
113+
### Enable Saviynt to delete users
114+
115+
Enable Saviynt to perform user delete operations in Azure AD B2C.
116+
117+
Learn more: [Application and service principal objects in Azure AD](../active-directory/develop/app-objects-and-service-principals.md)
118+
119+
1. Install the latest version of MSOnline PowerShell Module on a Windows workstation or server.
120+
121+
For more information, see [Azure Active Directory V2 PowerShell Module](https://www.powershellgallery.com/packages/AzureAD/2.0.2.140)
122+
123+
2. Connect to the AzureAD PowerShell module and execute the following commands:
103124

104125
```powershell
105126
Connect-msolservice #Enter Admin credentials of the Azure portal
@@ -109,14 +130,10 @@ Add-MsolRoleMember -RoleName "Company Administrator" -RoleMemberType ServicePrin
109130

110131
## Test the solution
111132

112-
Browse to your Saviynt application tenant and test user life-cycle management and access governance use case.
133+
Browse to your Saviynt application tenant and test user life-cycle management and access governance use cases.
113134

114135
## Next steps
115136

116-
For additional information, review the following articles:
117-
118-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
119-
120-
- [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
121-
122-
- [Create a web API application](./add-web-api-application.md)
137+
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)
138+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
139+
* [Add a web API application to your Azure Active Directory B2C tenant](./add-web-api-application.md)

articles/active-directory/cloud-infrastructure-entitlement-management/usage-analytics-active-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ The **Analytics** dashboard in Permissions Management collects detailed informat
1818

1919
- **Users**: Tracks assigned permissions and usage of various identities.
2020
- **Groups**: Tracks assigned permissions and usage of the group and the group members.
21-
- **Active Resources**: Tracks active resources (used in the last 90 days).
21+
- **Active Resources**: Tracks resources that identities have performed actions on (in the last 90 days).
2222
- **Active Tasks**: Tracks active tasks (performed in the last 90 days).
2323
- **Access Keys**: Tracks the permission usage of access keys for a given user.
2424
- **Serverless Functions**: Tracks assigned permissions and usage of the serverless functions.

0 commit comments

Comments
 (0)