You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this tutorial, you'll learn how to integrate Maxient Conduct Manager Software with Azure Active Directory (Azure AD). When you integrate Maxient Conduct Manager Software with Azure AD, you can:
26
26
27
-
*Control in Azure AD who has access to Maxient Conduct Manager Software.
27
+
*Utilize Azure AD to authenticate your users for the Maxient Conduct Manager Software
28
28
* Enable your users to be automatically signed-in to Maxient Conduct Manager Software with their Azure AD accounts.
29
-
* Manage your accounts in one central location - the Azure portal.
29
+
30
30
31
31
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32
32
@@ -39,8 +39,7 @@ To get started, you need the following items:
39
39
40
40
## Scenario description
41
41
42
-
In this tutorial, you configure and test Azure AD SSO in a test environment.
43
-
42
+
In this tutorial, you will configure your Azure AD for use with Maxient Conduct Manager Software.
@@ -62,16 +61,13 @@ To configure the integration of Maxient Conduct Manager Software into Azure AD,
62
61
63
62
## Configure and test Azure AD single sign-on for Maxient Conduct Manager Software
64
63
65
-
Configure and test Azure AD SSO with Maxient Conduct Manager Software using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Maxient Conduct Manager Software.
64
+
Configure and test Azure AD SSO with Maxient Conduct Manager Software. For SSO to work, you need to establish a connection between Azure AD and the Maxient Conduct Manager Software.
66
65
67
66
To configure and test Azure AD SSO with Maxient Conduct Manager Software, complete the following building blocks:
68
67
69
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
70
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
71
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
72
-
1.**[Configure Maxient Conduct Manager Software SSO](#configure-maxient-conduct-manager-software-sso)** - to configure the single sign-on settings on application side.
73
-
1.**[Create Maxient Conduct Manager Software test user](#create-maxient-conduct-manager-software-test-user)** - to have a counterpart of B.Simon in Maxient Conduct Manager Software that is linked to the Azure AD representation of user.
74
-
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
68
+
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to authenticate for use with the Maxient Conduct Manager Software
69
+
1.**[Assign all users to use Maxient](#assign-all-users-to-be-able-to-authenticate-for-the-Maxient-Conduct-Manager-Software)** - to allow everyone at your institution to be able to authenticate.
70
+
1.**[Test Azure AD Setup With Maxient](#test-with-maxient)** - to verify whether the configuration works, and the correct attributes are being released
75
71
76
72
## Configure Azure AD SSO
77
73
@@ -91,27 +87,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
91
87
`https://cm.maxient.com/<SCHOOLCODE>`
92
88
93
89
> [!NOTE]
94
-
> The value is not real. Update the value with the actual Sign-on URL. Contact [Maxient Conduct Manager Software Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90
+
> The value is not real. Update the value with the actual Sign-on URL. Work with your Maxient Implementation/Support representative to get the value.
95
91
96
-
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
92
+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer. You will need to provide your Maxient Implementation/Support representative with this URL.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
110
-
1. Click **Create**.
111
-
112
-
### Assign the Azure AD test user
113
-
114
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Maxient Conduct Manager Software.
98
+
In this section, you will grant access for all accounts to authenticate using the Azure system for the Maxient Conduct Manager Software. It is important to note that this step is **REQUIRED** for Maxient to function properly. Maxient leverages your Azure AD system to *authenticate* users. The *authorization* of users is performed within the Maxient system for the particular function they’re trying to perform. Maxient does not use attributes from your directory to make those decisions.
115
99
116
100
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
117
101
1. In the applications list, select **Maxient Conduct Manager Software**.
@@ -123,24 +107,12 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
123
107
124
108

125
109
126
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
127
-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
128
-
1. In the **Add Assignment** dialog, click the **Assign** button.
129
-
130
-
## Configure Maxient Conduct Manager Software SSO
131
-
132
-
To configure single sign-on on **Maxient Conduct Manager Software** side, you need to send the **App Federation Metadata Url** to [Maxient Conduct Manager Software support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
133
-
134
-
### Create Maxient Conduct Manager Software test user
135
-
136
-
In this section, you create a user called Britta Simon in Maxient Conduct Manager Software. Work with [Maxient Conduct Manager Software support team](mailto:[email protected]) to add the users in the Maxient Conduct Manager Software platform. Users must be created and activated before you use single sign-on.
137
-
138
-
## Test SSO
139
-
140
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
110
+
1. In the **Users and groups** dialog, select all users (or the appropriate groups) and **assign** them to be able to authenticate with Maxient.
141
111
142
-
When you click the Maxient Conduct Manager Software tile in the Access Panel, you should be automatically signed in to the Maxient Conduct Manager Software for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
112
+
## Test with Maxient
143
113
114
+
If a support ticket has not already been opened with a Maxient Implementation/Support representative, send an email to [[email protected]](mailto:[email protected]) with the subject "Campus Based Authentication/Azure Setup - \<\<School Name\>\>". In the body of the email, provide the **App Federation Metadata Url**. Maxient staff will respond with a test link to verify the proper attributes are being released.
115
+
144
116
## Additional resources
145
117
146
118
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/slack-tutorial.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,6 +104,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
104
104
| emailaddress | user.userprincipalname |
105
105
|||
106
106
107
+
> [!NOTE]
108
+
> In order to set up the service provider (SP) configuration, you must click on **Expand** next to **Advanced Options** in the SAML configuration page. In the **Service Provider Issuer** box, enter the workspace URL. The default is slack.com.
109
+
107
110
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
Copy file name to clipboardExpand all lines: articles/active-directory/user-help/active-directory-passwords-update-your-own-password.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.author: curtand
16
16
17
17
# Reset your work or school password using security info
18
18
19
-
If you forgot your work or school password, never got a password from your organization, or have been locked out of your account, you can use your security info and your mobile device to reset your work or school password. Your administrator must turn on this feature for you to be able to set up your information and reset your own password.
19
+
If you forgot your work or school password, never got a password from your organization, or have been locked out of your account, you can use your security info and your mobile device to reset your work or school password. Your administrator must turn on this feature for you to be able to set up your information and [reset your own password](https://docs.microsoft.com/azure/active-directory/user-help/active-directory-passwords-reset-register).
20
20
21
21
If you know your password, but want to change it, see the [Change your password steps](https://docs.microsoft.com/azure/active-directory/user-help/active-directory-passwords-update-your-own-password#how-to-change-your-password) sections of this article.
Copy file name to clipboardExpand all lines: articles/automation/source-control-integration-legacy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,5 +126,5 @@ To disconnect from your GitHub account, open the Repository Synchronization page
126
126
127
127
## Next steps
128
128
129
-
*[Azure Automation: Source Control Integration in Azure Automation](https://azure.microsoft.com/blog/azure-automation-source-control-13/)
130
-
*[Azure Automation: Integrating Runbook Source Control using Azure DevOps](https://azure.microsoft.com/blog/azure-automation-integrating-runbook-source-control-using-visual-studio-online/)
129
+
*For integrating source control in Azure Automation, see [Azure Automation: Source Control Integration in Azure Automation](https://azure.microsoft.com/blog/azure-automation-source-control-13/).
130
+
*For integrating runbook source control with Visual Studio Online, see [Azure Automation: Integrating Runbook Source Control using Visual Studio Online](https://azure.microsoft.com/blog/azure-automation-integrating-runbook-source-control-using-visual-studio-online/).
Copy file name to clipboardExpand all lines: articles/automation/source-control-integration.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,7 +117,7 @@ The following table defines the minimum PAT permissions required for GitHub. For
117
117
118
118
##### Minimum PAT permissions for Azure Repos
119
119
120
-
The following list defines the minimum PAT permissions required for Azure Repos. For more information about creating a PAT in Azure Repos, see [Authenticate access with personal access tokens](/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate).
120
+
The following list defines the minimum PAT permissions required for Azure Repos. For more information about creating a PAT in Azure Repos, see [Authenticate access with personal access tokens](https://docs.microsoft.com/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=preview-page).
121
121
122
122
| Scope | Access Type |
123
123
|---------| ----------|
@@ -190,16 +190,16 @@ To disconnect from a source control repository:
190
190
191
191
## Handle encoding issues
192
192
193
-
If multiple people are editing runbooks in your source control repository using different editors, encoding issues can occur. To learn more about this situation, see [Common causes of encoding issues](/powershell/scripting/components/vscode/understanding-file-encoding#common-causes-of-encoding-issues).
193
+
If multiple people are editing runbooks in your source control repository using different editors, encoding issues can occur. To learn more about this situation, see [Common causes of encoding issues](https://docs.microsoft.com/powershell/scripting/components/vscode/understanding-file-encoding?view=powershell-7#common-causes-of-encoding-issues).
194
194
195
195
## Update the PAT
196
196
197
197
Currently, you can't use the Azure portal to update the PAT in source control. When your PAT is expired or revoked, you can update source control with a new access token in one of these ways:
198
198
199
199
* Use the [REST API](https://docs.microsoft.com/rest/api/automation/sourcecontrol/update).
200
-
* Use the [Update-AzAutomationSourceControl](/powershell/module/az.automation/update-azautomationsourcecontrol) cmdlet.
200
+
* Use the [Update-AzAutomationSourceControl](https://docs.microsoft.com//powershell/module/az.automation/update-azautomationsourcecontrol) cmdlet.
201
201
202
202
## Next steps
203
203
204
-
* [Azure Automation: Source Control Integration in Azure Automation](https://azure.microsoft.com/blog/azure-automation-source-control-13/)
205
-
* [Azure Automation: Integrating Runbook Source Control using Azure DevOps](https://azure.microsoft.com/blog/azure-automation-integrating-runbook-source-control-using-visual-studio-online/)
204
+
* For integrating source control in Azure Automation, see [Azure Automation: Source Control Integration in Azure Automation](https://azure.microsoft.com/blog/azure-automation-source-control-13/).
205
+
* For integrating runbook source control with Visual Studio Online, see [Azure Automation: Integrating Runbook Source Control using Visual Studio Online](https://azure.microsoft.com/blog/azure-automation-integrating-runbook-source-control-using-visual-studio-online/).
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/detach-disk.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,12 +101,10 @@ The disk stays in storage but is no longer attached to a virtual machine.
101
101
## Detach a data disk using the portal
102
102
103
103
1. In the left menu, select **Virtual Machines**.
104
-
2. Select the virtual machine that has the data disk you want to detach and click **Stop** to deallocate the VM.
105
-
3. In the virtual machine pane, select **Disks**.
106
-
4. At the top of the **Disks** pane, select **Edit**.
107
-
5. In the **Disks** pane, to the far right of the data disk that you would like to detach, click the  detach button.
108
-
5. After the disk has been removed, click Save on the top of the pane.
109
-
6. In the virtual machine pane, click **Overview** and then click the **Start** button at the top of the pane to restart the VM.
104
+
1. In the virtual machine blade, select **Disks**.
105
+
1. At the top of the **Disks** blade, select **Edit**.
106
+
1. In the **Disks** blade, to the far right of the data disk that you would like to detach, click the  detach button.
107
+
1. After the disk has been removed, click **Save** on the top of the blade.
110
108
111
109
The disk stays in storage but is no longer attached to a virtual machine.
0 commit comments