Skip to content

Commit 20bf9d1

Browse files
authored
Merge pull request #199310 from MicrosoftDocs/main
5/25 AM Publish
2 parents 394bfe2 + 7fac7a1 commit 20bf9d1

File tree

127 files changed

+2089
-1325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+2089
-1325
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,26 @@
8484
"source_path_from_root": "/articles/azure-monitor/alerts/itsmc-connections-scsm.md" ,
8585
"redirect_url": "/azure/azure-monitor/alerts/itsmc-connections.md",
8686
"redirect_document_id": false
87+
},
88+
{
89+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-overview.md" ,
90+
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md#metric-alerts",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
95+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-unified-log.md" ,
100+
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md#log-alerts",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path_from_root": "/articles/azure-monitor/alerts/activity-log-alerts.md" ,
105+
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md#activity-log-alerts",
106+
"redirect_document_id": false
87107
}
88108
]
89109
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@
1515
"redirect_url": "/azure/defender-for-cloud/policy-reference",
1616
"redirect_document_id": false
1717
},
18+
{
19+
"source_path_from_root": "/articles/security-center/security-center-identity-access.md",
20+
"redirect_url": "/articles/defender-for-cloud/multi-factor-authentication-enforcement",
21+
"redirect_document_id": false
22+
},
1823
{
1924
"source_path_from_root": "/articles/security-center/security-center-policy-definitions.md",
2025
"redirect_url": "/azure/defender-for-cloud/policy-reference",

articles/active-directory/develop/scenario-spa-acquire-token.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -154,6 +154,8 @@ For success and failure of the silent token acquisition, MSAL Angular provides e
154154
import { MsalBroadcastService } from '@azure/msal-angular';
155155
import { EventMessage, EventType } from '@azure/msal-browser';
156156

157+
import { filter, Subject, takeUntil } from 'rxjs';
158+
157159
// In app.component.ts
158160
export class AppComponent implements OnInit {
159161
private readonly _destroying$ = new Subject<void>();
@@ -226,7 +228,7 @@ For success and failure of the silent token acquisition, MSAL Angular provides c
226228
```javascript
227229
// In app.component.ts
228230
ngOnInit() {
229-
this.subscription= this.broadcastService.subscribe("msal:acquireTokenFailure", (payload) => {
231+
this.subscription = this.broadcastService.subscribe("msal:acquireTokenFailure", (payload) => {
230232
});
231233
}
232234
ngOnDestroy() {
@@ -394,15 +396,18 @@ You can use optional claims for the following purposes:
394396
To request optional claims in `IdToken`, you can send a stringified claims object to the `claimsRequest` field of the `AuthenticationParameters.ts` class.
395397

396398
```javascript
397-
"optionalClaims":
398-
{
399-
"idToken": [
400-
{
401-
"name": "auth_time",
402-
"essential": true
403-
}
404-
],
405-
399+
var claims = {
400+
optionalClaims:
401+
{
402+
idToken: [
403+
{
404+
name: "auth_time",
405+
essential: true
406+
}
407+
],
408+
}
409+
};
410+
406411
var request = {
407412
scopes: ["user.read"],
408413
claimsRequest: JSON.stringify(claims)

articles/active-directory/external-identities/cross-cloud-settings.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,16 @@ After each organization has completed these steps, Azure AD B2B collaboration be
4444

4545
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
4646

47+
> [!NOTE]
48+
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
49+
>
50+
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
51+
>
52+
>Microsoft Azure China - https://aka.ms/cloudsettingschina
53+
4754
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
4855
1. Select **External Identities**, and then select **Cross-tenant access settings (Preview)**.
49-
1. Select **Cross cloud settings**.
56+
1. Select **Microsoft cloud settings (Preview)**.
5057
1. Select the checkboxes next to the external Microsoft Azure clouds you want to enable.
5158

5259
![Screenshot showing Microsoft cloud settings.](media/cross-cloud-settings/cross-cloud-settings.png)

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,13 @@ To set up B2B collaboration, both organizations configure their Microsoft cloud
7171

7272
For configuration steps, see [Configure Microsoft cloud settings for B2B collaboration (Preview)](cross-cloud-settings.md).
7373

74+
> [!NOTE]
75+
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
76+
>
77+
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
78+
>
79+
>Microsoft Azure China - https://aka.ms/cloudsettingschina
80+
7481
### Default settings in cross-cloud scenarios
7582

7683
To collaborate with a partner tenant in a different Microsoft Azure cloud, both organizations need to mutually enable B2B collaboration with each other. The first step is to enable the partner's cloud in your cross-tenant settings. When you first enable another cloud, B2B collaboration is blocked for all tenants in that cloud. You need to add the tenant you want to collaborate with to your Organizational settings, and at that point your default settings go into effect for that tenant only. You can allow the default settings to remain in effect, or you can modify the organizational settings for the tenant.

articles/active-directory/manage-apps/datawiza-with-azure-ad.md

Lines changed: 53 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,89 +1,95 @@
11
---
22
title: Secure hybrid access with Datawiza
33
titleSuffix: Azure AD
4-
description: In this tutorial, learn how to integrate Datawiza with Azure AD for secure hybrid access
4+
description: Learn how to integrate Datawiza with Azure AD. See how to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
55
services: active-directory
66
author: gargi-sinha
77
manager: martinco
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 8/27/2021
12+
ms.date: 05/19/2022
1313
ms.author: gasinh
1414
ms.collection: M365-identity-device-management
15+
ms.custom: kr2b-contr-experiment
1516
---
1617

1718
# Tutorial: Configure Datawiza with Azure Active Directory for secure hybrid access
1819

1920
In this sample tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for secure hybrid access.
2021

21-
Datawiza's [Datawiza Access Broker
22-
(DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable Single Sign-on (SSO) and granular access controls to protect on-premise and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP.
22+
Datawiza's [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable single sign-on (SSO) and provide granular access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP.
2323

24-
Using this solution enterprises can quickly transition from legacy Web Access Managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This saves engineering time, reduces cost significantly and delivers the project in a secured manner.
24+
By using this solution, enterprises can quickly transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This approach saves engineering time, reduces cost significantly, and delivers the project in a secured manner.
2525

2626
## Prerequisites
2727

28-
To get started, you'll need:
28+
To get started, you need:
2929

3030
- An Azure subscription. If you don\'t have a subscription, you can get a [trial account](https://azure.microsoft.com/free/).
3131

3232
- An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md)
3333
that's linked to your Azure subscription.
3434

35-
- [Docker](https://docs.docker.com/get-docker/) and
36-
[docker-compose](https://docs.docker.com/compose/install/)
37-
are required to run DAB. Your applications can run on any platform, such as the virtual machine and bare metal.
35+
- [Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/), which are required to run DAB. Your applications can run on any platform, such as a virtual machine and bare metal.
3836

39-
- An application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server where the application is. The application will run on localhost: 3001 and DAB proxies traffic to the application via localhost: 9772. The traffic to the application will reach DAB first and then be proxied to the application.
37+
- An application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server as the application. The application runs on localhost: 3001, and DAB proxies traffic to the application via localhost: 9772. The traffic to the application reaches DAB first and is then proxied to the application.
4038

4139
## Scenario description
4240

4341
Datawiza integration includes the following components:
4442

45-
- [Azure AD](../fundamentals/active-directory-whatis.md) - Microsoft's cloud-based identity and access management service, which helps users sign in and access external and internal resources.
43+
- [Azure AD](../fundamentals/active-directory-whatis.md) - A cloud-based identity and access management service from Microsoft. Azure AD helps users sign in and access external and internal resources.
4644

47-
- Datawiza Access Broker (DAB) - The service user sign on and transparently passes identity to applications through HTTP headers.
45+
- Datawiza Access Broker (DAB) - The service that users sign on to. DAB transparently passes identity information to applications through HTTP headers.
4846

49-
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the configurations of DAB and its access control policies.
47+
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the DAB configuration and access control policies.
5048

5149
The following architecture diagram shows the implementation.
5250

53-
![image shows architecture diagram](./media/datawiza-with-azure-active-directory/datawiza-architecture-diagram.png)
51+
![Architecture diagram that shows the authentication process that gives a user access to an on-premises application.](./media/datawiza-with-azure-active-directory/datawiza-architecture-diagram.png)
5452

55-
|Steps| Description|
53+
|Step| Description|
5654
|:----------|:-----------|
57-
| 1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
58-
| 2. |The DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, then it sends the user to Azure AD for authentication.|
55+
| 1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
56+
| 2. | DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, it sends the user to Azure AD for authentication.|
5957
| 3. | Azure AD sends the user request to the endpoint specified during the DAB application's registration in the Azure AD tenant.|
60-
| 4. | The DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, the DAB may call out to the Identity provider to retrieve the information needed to set the header values correctly. The DAB sets the header values and sends the request to the application. |
61-
| 5. | The user is now authenticated and has access to the application.|
58+
| 4. | DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, DAB may call out to the identity provider to retrieve the information needed to set the header values correctly. DAB sets the header values and sends the request to the application. |
59+
| 5. | The user is authenticated and has access to the application.|
6260

6361
## Onboard with Datawiza
6462

65-
To integrate your on-premises or cloud-hosted application with Azure AD, login to [Datawiza Cloud Management
63+
To integrate your on-premises or cloud-hosted application with Azure AD, sign in to [Datawiza Cloud Management
6664
Console](https://console.datawiza.com/) (DCMC).
6765

6866
## Create an application on DCMC
6967

70-
[Create an application](https://docs.datawiza.com/step-by-step/step2.html) and generate a key pair of `PROVISIONING_KEY` and `PROVISIONING_SECRET` for the application on the DCMC.
68+
In the next step, you create an application on DCMC and generate a key pair for the app. The key pair consists of a `PROVISIONING_KEY` and `PROVISIONING_SECRET`. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
7169

72-
For Azure AD, Datawiza offers a convenient [One click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html). This method to integrate Azure AD with DCMC can create an application registration on your behalf in your Azure AD tenant.
70+
For Azure AD, Datawiza offers a convenient [one-click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html). This method to integrate Azure AD with DCMC can create an application registration on your behalf in your Azure AD tenant.
7371

74-
![image shows configure idp](./media/datawiza-with-azure-active-directory/configure-idp.png)
72+
![Screenshot of the Datawiza Configure I D P page. Boxes for name, protocol, and other values are visible. An automatic generator option is turned on.](./media/datawiza-with-azure-active-directory/configure-idp.png)
7573

76-
Instead, if you want to use an existing web application in your Azure AD tenant, you can disable the option and populate the fields of the form. You'll need the tenant ID, client ID, and client secret. [Create a web application and get these values in your tenant](https://docs.datawiza.com/idp/azure.html).
74+
Instead, if you want to use an existing web application in your Azure AD tenant, you can disable the option and populate the fields of the form. You need the tenant ID, client ID, and client secret. For more information about creating a web application and getting these values, see [Microsoft Azure AD in the Datawiza documentation](https://docs.datawiza.com/idp/azure.html).
7775

78-
![image shows configure idp using form](./media/datawiza-with-azure-active-directory/use-form.png)
76+
![Screenshot of the Datawiza Configure I D P page. Boxes for name, protocol, and other values are visible. An automatic generator option is turned off.](./media/datawiza-with-azure-active-directory/use-form.png)
7977

8078
## Run DAB with a header-based application
8179

82-
1. You can use either Docker or Kubernetes to run DAB. The docker image is needed for users to create a sample header-based application. [Configure DAB and SSO
83-
integration](https://docs.datawiza.com/step-by-step/step3.html). [Deploy DAB with Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html). A sample docker image `docker-compose.yml` file is provided for you to download and use. [Log in to the container registry](https://docs.datawiza.com/step-by-step/step3.html#important-step) to download the images of DAB and the header-based application.
80+
You can use either Docker or Kubernetes to run DAB. The docker image is needed to create a sample header-based application.
8481

85-
```yaml
86-
services:
82+
To run DAB with a header-based application, follow these steps:
83+
84+
1. Use either Docker or Kubernetes to run DAB:
85+
86+
- For Docker-specific instructions, see [Deploy Datawiza Access Broker With Your App](https://docs.datawiza.com/step-by-step/step3.html).
87+
- For Kubernetes-specific instructions, see [Deploy Datawiza Access Broker with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html).
88+
89+
You can use the following sample docker image docker-compose.yml file:
90+
91+
```yaml
92+
services:
8793
datawiza-access-broker:
8894
image: registry.gitlab.com/datawiza/access-broker
8995
container_name: datawiza-access-broker
@@ -97,34 +103,37 @@ integration](https://docs.datawiza.com/step-by-step/step3.html). [Deploy DAB wit
97103
header-based-app:
98104
image: registry.gitlab.com/datawiza/header-based-app
99105
restart: always
100-
ports:
101-
- "3001:3001"
106+
ports:
107+
- "3001:3001"
102108
```
103109
104-
2. After executing `docker-compose -f docker-compose.yml up`, the
105-
header-based application should have SSO enabled with Azure AD. Open a browser and type in `http://localhost:9772/`.
110+
1. To sign in to the container registry and download the images of DAB and the header-based application, follow the instructions in [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
106111
107-
3. An Azure AD login page will show up.
112+
1. Run the following command:
108113
109-
## Pass user attributes to the header-based application
114+
`docker-compose -f docker-compose.yml up`
110115

111-
1. DAB gets user attributes from IdP and can pass the user attributes to the application via header or cookie. See the instructions on how to [pass user attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
116+
The header-based application should now have SSO enabled with Azure AD.
112117

113-
2. After successfully configuring the user attributes, you should see the green check sign for each of the user attributes.
118+
1. In a browser, go to `http://localhost:9772/`. An Azure AD sign-in page appears.
114119

115-
![image shows datawiza application home page](./media/datawiza-with-azure-active-directory/datawiza-application-home-page.png)
120+
## Pass user attributes to the header-based application
116121

117-
## Test the flow
122+
DAB gets user attributes from Azure AD and can pass these attributes to the application via a header or cookie.
123+
124+
To pass user attributes such as an email address, a first name, and a last name to the header-based application, follow the instructions in [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
118125

119-
1. Navigate to the application URL.
126+
After successfully configuring the user attributes, you should see a green check mark next to each attribute.
120127

121-
2. The DAB should redirect to the Azure AD login page.
128+
![Screenshot that shows the Datawiza application home page. Green check marks are visible next to the host, email, firstname, and lastname attributes.](./media/datawiza-with-azure-active-directory/datawiza-application-home-page.png)
129+
130+
## Test the flow
122131

123-
3. After successfully authenticating, you should be redirected to DAB.
132+
1. Go to the application URL. DAB should redirect you to the Azure AD sign-in page.
124133

125-
4. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
134+
1. After successfully authenticating, you should be redirected to DAB.
126135

127-
5. Your requested application should show up.
136+
DAB evaluates policies, calculates headers, and sends you to the upstream application. Your requested application should appear.
128137

129138
## Next steps
130139

0 commit comments

Comments
 (0)