You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 08/17/2022
11
+
ms.date: 10/17/2022
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
@@ -1308,7 +1308,7 @@ Applications that support the SCIM profile described in this article can be conn
1308
1308
1309
1309
**ToconnectanapplicationthatsupportsSCIM:**
1310
1310
1311
-
1. Signintothe [AzureADportal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/office/dev-program)
1311
+
1. Signintothe [AzureADportal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1. Enteranameforyourapplication, choosetheoption"*integrate any other application you don't find in the gallery*"andselect**Add**tocreateanappobject. Thenewappisaddedtothelistofenterpriseapplicationsandopenstoitsappmanagementscreen.
title: 'Tutorial: Azure Active Directory integration with Fuse | Microsoft Docs'
2
+
title: Azure Active Directory integration with Fuse
3
3
description: Learn how to configure single sign-on between Azure Active Directory and Fuse.
4
4
services: active-directory
5
5
author: jeevansd
@@ -8,128 +8,93 @@ ms.reviewer: celested
8
8
ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
-
ms.topic: tutorial
12
-
ms.date: 06/03/2021
11
+
ms.topic: how-to
12
+
ms.date: 10/19/2022
13
13
ms.author: jeedes
14
14
---
15
-
# Tutorial: Azure Active Directory integration with Fuse
15
+
# Azure Active Directory integration with Fuse
16
16
17
-
In this tutorial, you'll learn how to integrate Fuse with Azure Active Directory (Azure AD). When you integrate Fuse with Azure AD, you can:
17
+
In this article, you'll learn how to integrate Fuse with Azure Active Directory (Azure AD). Fuse is a learning platform that enables learners within an organization to access the necessary knowledge and expertise they need to improve their skills at work. When you integrate Fuse with Azure AD, you can:
18
18
19
-
* Control in Azure AD who has access to Fuse.
20
-
* Enable your users to be automatically signed-in to Fuse with their Azure AD accounts.
21
-
* Manage your accounts in one central location - the Azure portal.
19
+
- Control in Azure AD who has access to Fuse.
20
+
- Enable your users to be automatically signed-in to Fuse with their Azure AD accounts.
21
+
- Manage your accounts in one central location - the Azure portal.
22
22
23
-
## Prerequisites
24
-
25
-
To get started, you need the following items:
23
+
You'll configure and test Azure AD single sign-on for Fuse in a test environment. Fuse supports **SP** initiated single sign-on.
26
24
27
-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28
-
* Fuse single sign-on (SSO) enabled subscription.
29
-
30
-
## Scenario description
25
+
> [!NOTE]
26
+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
31
27
32
-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
33
28
34
-
* Fuse supports **SP** initiated SSO.
29
+
## Prerequisites
35
30
36
-
> [!NOTE]
37
-
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
31
+
To integrate Azure Active Directory with Fuse, you need:
38
32
39
-
## Add Fuse from the gallery
33
+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34
+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
35
+
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
36
+
- Fuse single sign-on (SSO) enabled subscription.
40
37
41
-
To configure the integration of Fuse into Azure AD, you need to add Fuse from the gallery to your list of managed SaaS apps.
38
+
## Add application and assign a test user
42
39
43
-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
44
-
1. On the left navigation pane, select the **Azure Active Directory** service.
45
-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
46
-
1. To add new application, select **New application**.
47
-
1. In the **Add from the gallery** section, type **Fuse** in the search box.
48
-
1. Select **Fuse** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
40
+
Before you begin the process of configuring single sign-on, you need to add the Fuse application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
49
41
50
-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
42
+
### Add Fuse from the Azure AD gallery
51
43
52
-
## Configure and test Azure AD SSO for Fuse
44
+
Add Fuse from the Azure AD application gallery to configure single sign-on with Fuse. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
53
45
54
-
Configure and test Azure AD SSO with Fuse using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Fuse.
46
+
### Create and assign Azure AD test user
55
47
56
-
To configure and test Azure AD SSO with Fuse, perform the following steps:
48
+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
57
49
58
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
59
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61
-
1.**[Configure Fuse SSO](#configure-fuse-sso)** - to configure the single sign-on settings on application side.
62
-
1.**[Create Fuse test user](#create-fuse-test-user)** - to have a counterpart of B.Simon in Fuse that is linked to the Azure AD representation of user.
63
-
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
50
+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
64
51
65
-
## Configure Azure AD SSO
52
+
## Configure Azure AD single sign-on
66
53
67
-
Follow these steps to enable Azure AD SSO in the Azure portal.
54
+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
68
55
69
56
1. In the Azure portal, on the **Fuse** application integration page, find the **Manage** section and select **single sign-on**.
70
57
1. On the **Select a single sign-on method** page, select **SAML**.
71
-
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
58
+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
4. On the **Basic SAML Configuration** section, perform the following step:
76
-
77
-
In the **Sign-on URL** text box, type a URL using the following pattern:
62
+
1. On the **Basic SAML Configuration** section, in the **Sign-on URL** text box, the appropriate URL using the following pattern:
78
63
`https://{tenantname}.fuseuniversal.com/`
79
64
80
65
> [!NOTE]
81
66
> The value is not real. Update the value with the actual Sign-On URL. Contact [Fuse Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
82
67
83
-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click**Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
68
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select**Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
101
-
1. Click **Create**.
102
-
103
-
### Assign the Azure AD test user
104
-
105
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Fuse.
106
-
107
-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
108
-
1. In the applications list, select **Fuse**.
109
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
110
-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
111
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
112
-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113
-
1. In the **Add Assignment** dialog, click the **Assign** button.
114
-
115
-
## Configure Fuse SSO
76
+
## Configure Fuse single sign-on
116
77
117
-
To configure single sign-on on **Fuse** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Fuse support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
78
+
To configure single sign-on on **Fuse** side, send the downloaded **Certificate (Base64)** and the copied URLs from Azure portal to [Fuse support team](mailto:[email protected]). The support team will use the copied URLs to configure the single sign-on on the application.
118
79
119
80
### Create Fuse test user
120
81
121
-
In this section, you create a user called Britta Simon in Fuse. Work with [Fuse support team](mailto:[email protected])to add the users in the Fuse platform. Users must be created and activated before you use single sign-on.
82
+
To be able to test and use single sign-on, you have to create and activate users in the fuse application.
122
83
123
-
## Test SSO
84
+
In this section, you create a user called Britta Simon in Fuse that corresponds with the Azure AD user you already created in the previous section. Work with [Fuse support team](mailto:[email protected]) to add the user in the Fuse platform.
124
85
125
-
In this section, you test your Azure AD single sign-on configuration with following options.
86
+
## Test single sign-on
126
87
127
-
* Click on **Test this application** in Azure portal. This will redirect to Fuse Sign-on URL where you can initiate the login flow.
88
+
In this section, you test your Azure AD single sign-on configuration with the following options.
128
89
129
-
* Go to Fuse Sign-on URL directly and initiate the login flow from there.
90
+
- In the **Test single sign-on with Fuse** section on the **SAML-based Sign-on** pane, select **Test this application** in Azure portal. You'll be redirected to Fuse Sign-on URL where you can initiate the sign-in flow.
91
+
- Go to Fuse Sign-on URL directly and initiate the sign-in flow from application's side.
92
+
- You can use Microsoft My Apps. When you select the Fuse tile in the My Apps, you'll be redirected to Fuse Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
130
93
131
-
* You can use Microsoft My Apps. When you click the Fuse tile in the My Apps, this will redirect to Fuse Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
94
+
## Additional resources
132
95
96
+
-[What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
97
+
-[Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md)
133
98
## Next steps
134
99
135
100
Once you configure Fuse you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/optimizely-tutorial.md
+6-36Lines changed: 6 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory integration with Optimizely | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with Optimizely'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and Optimizely.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 05/24/2021
12
+
ms.date: 10/19/2022
13
13
ms.author: jeedes
14
14
---
15
-
# Tutorial: Azure Active Directory integration with Optimizely
15
+
# Tutorial: Azure AD SSO integration with Optimizely
16
16
17
17
In this tutorial, you'll learn how to integrate Optimizely with Azure Active Directory (Azure AD). When you integrate Optimizely with Azure AD, you can:
18
18
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
78
78
`urn:auth0:optimizely:contoso`
79
79
80
80
> [!NOTE]
81
-
> These values are not the real. You will update the value with the actual Sign-on URL and Identifier, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81
+
> These values are not real. You will update these values with the actual Sign-on URL and Identifier which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
82
82
83
83
5. Your Optimizely application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
84
84
@@ -142,41 +142,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
142
142
143
143
## Configure Optimizely SSO
144
144
145
-
1. To configure single sign-on on **Optimizely** side, contact your Optimizely Account Manager and provide the downloaded **Certificate (Base64)** and appropriate copied URLs.
146
-
147
-
2. In response to your email, Optimizely provides you with the Sign On URL (SP-initiated SSO) and the Identifier (Service Provider Entity ID) values.
148
-
149
-
a. Copy the **SP-initiated SSO URL** provided by Optimizely, and paste into the **Sign On URL** textbox in **Basic SAML Configuration** section on Azure portal.
150
-
151
-
b. Copy the **Service Provider Entity ID** provided by Optimizely, and paste into the **Identifier** textbox in **Basic SAML Configuration** section on Azure portal.
152
-
153
-
3. In a different browser window, sign-on to your Optimizely application.
154
-
155
-
4. Click you account name in the top right corner and then **Account Settings**.
156
-
157
-

158
-
159
-
5. In the Account tab, check the box **Enable SSO** under Single Sign On in the **Overview** section.
160
-
161
-

162
-
163
-
6. Click **Save**.
145
+
To configure single sign-on on the Optimizely side, contact your Optimizely Customer Success Manager or [file an online ticket for Optimizely Experimentation Support](https://support.optimizely.com/hc/articles/4410284179469-File-online-tickets-for-support) directly.
164
146
165
147
### Create Optimizely test user
166
148
167
-
In this section, you create a user called Britta Simon in Optimizely.
168
-
169
-
1. On the home page, select **Collaborators** tab.
170
-
171
-
2. To add new collaborator to the project, click **New Collaborator**.
172
-
173
-

174
-
175
-
3. Fill in the email address and assign them a role. Click **Invite**.
176
-
177
-

178
-
179
-
4. They receive an email invite. Using the email address, they have to log in to Optimizely.
149
+
Contact your Optimizely Customer Success Manager or [file an online ticket for Optimizely Experimentation Support](https://support.optimizely.com/hc/articles/4410284179469-File-online-tickets-for-support) directly to add the users in the Optimizely platform. Users must be created and activated before you use single sign-on.
0 commit comments