Skip to content

Commit 0caae39

Browse files
authored
Merge pull request #215070 from MicrosoftDocs/main
10/19 AM Publish
2 parents 49854f4 + 44c27ba commit 0caae39

File tree

151 files changed

+3475
-1045
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+3475
-1045
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 08/17/2022
11+
ms.date: 10/17/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -1308,7 +1308,7 @@ Applications that support the SCIM profile described in this article can be conn
13081308

13091309
**To connect an application that supports SCIM:**
13101310

1311-
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/office/dev-program)
1311+
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
13121312
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
13131313
1. Select **+ New application** > **+ Create your own application**.
13141314
1. Enter a name for your application, choose the option "*integrate any other application you don't find in the gallery*" and select **Add** to create an app object. The new app is added to the list of enterprise applications and opens to its app management screen.
Lines changed: 42 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Fuse | Microsoft Docs'
2+
title: Azure Active Directory integration with Fuse
33
description: Learn how to configure single sign-on between Azure Active Directory and Fuse.
44
services: active-directory
55
author: jeevansd
@@ -8,128 +8,93 @@ ms.reviewer: celested
88
ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
11-
ms.topic: tutorial
12-
ms.date: 06/03/2021
11+
ms.topic: how-to
12+
ms.date: 10/19/2022
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with Fuse
15+
# Azure Active Directory integration with Fuse
1616

17-
In this tutorial, you'll learn how to integrate Fuse with Azure Active Directory (Azure AD). When you integrate Fuse with Azure AD, you can:
17+
In this article, you'll learn how to integrate Fuse with Azure Active Directory (Azure AD). Fuse is a learning platform that enables learners within an organization to access the necessary knowledge and expertise they need to improve their skills at work. When you integrate Fuse with Azure AD, you can:
1818

19-
* Control in Azure AD who has access to Fuse.
20-
* Enable your users to be automatically signed-in to Fuse with their Azure AD accounts.
21-
* Manage your accounts in one central location - the Azure portal.
19+
- Control in Azure AD who has access to Fuse.
20+
- Enable your users to be automatically signed-in to Fuse with their Azure AD accounts.
21+
- Manage your accounts in one central location - the Azure portal.
2222

23-
## Prerequisites
24-
25-
To get started, you need the following items:
23+
You'll configure and test Azure AD single sign-on for Fuse in a test environment. Fuse supports **SP** initiated single sign-on.
2624

27-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28-
* Fuse single sign-on (SSO) enabled subscription.
29-
30-
## Scenario description
25+
> [!NOTE]
26+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
3127
32-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
3328

34-
* Fuse supports **SP** initiated SSO.
29+
## Prerequisites
3530

36-
> [!NOTE]
37-
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
31+
To integrate Azure Active Directory with Fuse, you need:
3832

39-
## Add Fuse from the gallery
33+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
35+
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
36+
- Fuse single sign-on (SSO) enabled subscription.
4037

41-
To configure the integration of Fuse into Azure AD, you need to add Fuse from the gallery to your list of managed SaaS apps.
38+
## Add application and assign a test user
4239

43-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
44-
1. On the left navigation pane, select the **Azure Active Directory** service.
45-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
46-
1. To add new application, select **New application**.
47-
1. In the **Add from the gallery** section, type **Fuse** in the search box.
48-
1. Select **Fuse** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
40+
Before you begin the process of configuring single sign-on, you need to add the Fuse application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
4941

50-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
42+
### Add Fuse from the Azure AD gallery
5143

52-
## Configure and test Azure AD SSO for Fuse
44+
Add Fuse from the Azure AD application gallery to configure single sign-on with Fuse. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
5345

54-
Configure and test Azure AD SSO with Fuse using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Fuse.
46+
### Create and assign Azure AD test user
5547

56-
To configure and test Azure AD SSO with Fuse, perform the following steps:
48+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
5749

58-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
59-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61-
1. **[Configure Fuse SSO](#configure-fuse-sso)** - to configure the single sign-on settings on application side.
62-
1. **[Create Fuse test user](#create-fuse-test-user)** - to have a counterpart of B.Simon in Fuse that is linked to the Azure AD representation of user.
63-
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
50+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
6451

65-
## Configure Azure AD SSO
52+
## Configure Azure AD single sign-on
6653

67-
Follow these steps to enable Azure AD SSO in the Azure portal.
54+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
6855

6956
1. In the Azure portal, on the **Fuse** application integration page, find the **Manage** section and select **single sign-on**.
7057
1. On the **Select a single sign-on method** page, select **SAML**.
71-
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
58+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
7259

7360
![Edit Basic SAML Configuration](common/edit-urls.png)
7461

75-
4. On the **Basic SAML Configuration** section, perform the following step:
76-
77-
In the **Sign-on URL** text box, type a URL using the following pattern:
62+
1. On the **Basic SAML Configuration** section, in the **Sign-on URL** text box, the appropriate URL using the following pattern:
7863
`https://{tenantname}.fuseuniversal.com/`
7964

8065
> [!NOTE]
8166
> The value is not real. Update the value with the actual Sign-On URL. Contact [Fuse Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8267

83-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
68+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8469

8570
![The Certificate download link](common/certificatebase64.png)
8671

87-
6. On the **Set up Fuse** section, copy the appropriate URL(s) as per your requirement.
72+
1. On the **Set up Fuse** section, copy the appropriate URL(s) as per your requirement.
8873

8974
![Copy configuration URLs](common/copy-configuration-urls.png)
9075

91-
### Create an Azure AD test user
92-
93-
In this section, you'll create a test user in the Azure portal called B.Simon.
94-
95-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
96-
1. Select **New user** at the top of the screen.
97-
1. In the **User** properties, follow these steps:
98-
1. In the **Name** field, enter `B.Simon`.
99-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
100-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
101-
1. Click **Create**.
102-
103-
### Assign the Azure AD test user
104-
105-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Fuse.
106-
107-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
108-
1. In the applications list, select **Fuse**.
109-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
110-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
111-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
112-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113-
1. In the **Add Assignment** dialog, click the **Assign** button.
114-
115-
## Configure Fuse SSO
76+
## Configure Fuse single sign-on
11677

117-
To configure single sign-on on **Fuse** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Fuse support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
78+
To configure single sign-on on **Fuse** side, send the downloaded **Certificate (Base64)** and the copied URLs from Azure portal to [Fuse support team](mailto:[email protected]). The support team will use the copied URLs to configure the single sign-on on the application.
11879

11980
### Create Fuse test user
12081

121-
In this section, you create a user called Britta Simon in Fuse. Work with [Fuse support team](mailto:[email protected]) to add the users in the Fuse platform. Users must be created and activated before you use single sign-on.
82+
To be able to test and use single sign-on, you have to create and activate users in the fuse application.
12283

123-
## Test SSO
84+
In this section, you create a user called Britta Simon in Fuse that corresponds with the Azure AD user you already created in the previous section. Work with [Fuse support team](mailto:[email protected]) to add the user in the Fuse platform.
12485

125-
In this section, you test your Azure AD single sign-on configuration with following options.
86+
## Test single sign-on
12687

127-
* Click on **Test this application** in Azure portal. This will redirect to Fuse Sign-on URL where you can initiate the login flow.
88+
In this section, you test your Azure AD single sign-on configuration with the following options.
12889

129-
* Go to Fuse Sign-on URL directly and initiate the login flow from there.
90+
- In the **Test single sign-on with Fuse** section on the **SAML-based Sign-on** pane, select **Test this application** in Azure portal. You'll be redirected to Fuse Sign-on URL where you can initiate the sign-in flow.
91+
- Go to Fuse Sign-on URL directly and initiate the sign-in flow from application's side.
92+
- You can use Microsoft My Apps. When you select the Fuse tile in the My Apps, you'll be redirected to Fuse Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
13093

131-
* You can use Microsoft My Apps. When you click the Fuse tile in the My Apps, this will redirect to Fuse Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
94+
## Additional resources
13295

96+
- [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
97+
- [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md)
13398
## Next steps
13499

135100
Once you configure Fuse you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/optimizely-tutorial.md

Lines changed: 6 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Optimizely | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Optimizely'
33
description: Learn how to configure single sign-on between Azure Active Directory and Optimizely.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 05/24/2021
12+
ms.date: 10/19/2022
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with Optimizely
15+
# Tutorial: Azure AD SSO integration with Optimizely
1616

1717
In this tutorial, you'll learn how to integrate Optimizely with Azure Active Directory (Azure AD). When you integrate Optimizely with Azure AD, you can:
1818

@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878
`urn:auth0:optimizely:contoso`
7979

8080
> [!NOTE]
81-
> These values are not the real. You will update the value with the actual Sign-on URL and Identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81+
> These values are not real. You will update these values with the actual Sign-on URL and Identifier which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8282

8383
5. Your Optimizely application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
8484

@@ -142,41 +142,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
142142

143143
## Configure Optimizely SSO
144144

145-
1. To configure single sign-on on **Optimizely** side, contact your Optimizely Account Manager and provide the downloaded **Certificate (Base64)** and appropriate copied URLs.
146-
147-
2. In response to your email, Optimizely provides you with the Sign On URL (SP-initiated SSO) and the Identifier (Service Provider Entity ID) values.
148-
149-
a. Copy the **SP-initiated SSO URL** provided by Optimizely, and paste into the **Sign On URL** textbox in **Basic SAML Configuration** section on Azure portal.
150-
151-
b. Copy the **Service Provider Entity ID** provided by Optimizely, and paste into the **Identifier** textbox in **Basic SAML Configuration** section on Azure portal.
152-
153-
3. In a different browser window, sign-on to your Optimizely application.
154-
155-
4. Click you account name in the top right corner and then **Account Settings**.
156-
157-
![Screenshot that shows the account name selected in the top-right corner, with "Account Settings" selected from the menu.](./media/optimizely-tutorial/settings.png)
158-
159-
5. In the Account tab, check the box **Enable SSO** under Single Sign On in the **Overview** section.
160-
161-
![Azure AD Single Sign-On](./media/optimizely-tutorial/account.png)
162-
163-
6. Click **Save**.
145+
To configure single sign-on on the Optimizely side, contact your Optimizely Customer Success Manager or [file an online ticket for Optimizely Experimentation Support](https://support.optimizely.com/hc/articles/4410284179469-File-online-tickets-for-support) directly.
164146

165147
### Create Optimizely test user
166148

167-
In this section, you create a user called Britta Simon in Optimizely.
168-
169-
1. On the home page, select **Collaborators** tab.
170-
171-
2. To add new collaborator to the project, click **New Collaborator**.
172-
173-
![Screenshot that shows the Optimizely home page with the "Collaborators" tab and "New Collaborator" button selected.](./media/optimizely-tutorial/collaborator.png)
174-
175-
3. Fill in the email address and assign them a role. Click **Invite**.
176-
177-
![Creating an Azure AD test user](./media/optimizely-tutorial/invite-collaborator.png)
178-
179-
4. They receive an email invite. Using the email address, they have to log in to Optimizely.
149+
Contact your Optimizely Customer Success Manager or [file an online ticket for Optimizely Experimentation Support](https://support.optimizely.com/hc/articles/4410284179469-File-online-tickets-for-support) directly to add the users in the Optimizely platform. Users must be created and activated before you use single sign-on.
180150

181151
## Test SSO
182152

0 commit comments

Comments
 (0)