You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -394,15 +396,18 @@ You can use optional claims for the following purposes:
394
396
To request optional claims in `IdToken`, you can send a stringified claims object to the `claimsRequest` field of the `AuthenticationParameters.ts` class.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-cloud-settings.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,9 +44,16 @@ After each organization has completed these steps, Azure AD B2B collaboration be
44
44
45
45
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
46
46
47
+
> [!NOTE]
48
+
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
49
+
>
50
+
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
51
+
>
52
+
>Microsoft Azure China - https://aka.ms/cloudsettingschina
53
+
47
54
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
48
55
1. Select **External Identities**, and then select **Cross-tenant access settings (Preview)**.
49
-
1. Select **Cross cloud settings**.
56
+
1. Select **Microsoft cloud settings (Preview)**.
50
57
1. Select the checkboxes next to the external Microsoft Azure clouds you want to enable.
51
58
52
59

Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,6 +71,13 @@ To set up B2B collaboration, both organizations configure their Microsoft cloud
71
71
72
72
For configuration steps, see [Configure Microsoft cloud settings for B2B collaboration (Preview)](cross-cloud-settings.md).
73
73
74
+
> [!NOTE]
75
+
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
76
+
>
77
+
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
78
+
>
79
+
>Microsoft Azure China - https://aka.ms/cloudsettingschina
80
+
74
81
### Default settings in cross-cloud scenarios
75
82
76
83
To collaborate with a partner tenant in a different Microsoft Azure cloud, both organizations need to mutually enable B2B collaboration with each other. The first step is to enable the partner's cloud in your cross-tenant settings. When you first enable another cloud, B2B collaboration is blocked for all tenants in that cloud. You need to add the tenant you want to collaborate with to your Organizational settings, and at that point your default settings go into effect for that tenant only. You can allow the default settings to remain in effect, or you can modify the organizational settings for the tenant.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/datawiza-with-azure-ad.md
+53-44Lines changed: 53 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,89 +1,95 @@
1
1
---
2
2
title: Secure hybrid access with Datawiza
3
3
titleSuffix: Azure AD
4
-
description: In this tutorial, learn how to integrate Datawiza with Azure AD for secure hybrid access
4
+
description: Learn how to integrate Datawiza with Azure AD. See how to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
5
5
services: active-directory
6
6
author: gargi-sinha
7
7
manager: martinco
8
8
ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.topic: how-to
11
11
ms.workload: identity
12
-
ms.date: 8/27/2021
12
+
ms.date: 05/19/2022
13
13
ms.author: gasinh
14
14
ms.collection: M365-identity-device-management
15
+
ms.custom: kr2b-contr-experiment
15
16
---
16
17
17
18
# Tutorial: Configure Datawiza with Azure Active Directory for secure hybrid access
18
19
19
20
In this sample tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for secure hybrid access.
20
21
21
-
Datawiza's [Datawiza Access Broker
22
-
(DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable Single Sign-on (SSO) and granular access controls to protect on-premise and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP.
22
+
Datawiza's [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable single sign-on (SSO) and provide granular access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP.
23
23
24
-
Using this solution enterprises can quickly transition from legacy Web Access Managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This saves engineering time, reduces cost significantly and delivers the project in a secured manner.
24
+
By using this solution, enterprises can quickly transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This approach saves engineering time, reduces cost significantly, and delivers the project in a secured manner.
25
25
26
26
## Prerequisites
27
27
28
-
To get started, you'll need:
28
+
To get started, you need:
29
29
30
30
- An Azure subscription. If you don\'t have a subscription, you can get a [trial account](https://azure.microsoft.com/free/).
31
31
32
32
- An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md)
33
33
that's linked to your Azure subscription.
34
34
35
-
-[Docker](https://docs.docker.com/get-docker/) and
are required to run DAB. Your applications can run on any platform, such as the virtual machine and bare metal.
35
+
-[Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/), which are required to run DAB. Your applications can run on any platform, such as a virtual machine and bare metal.
38
36
39
-
- An application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server where the application is. The application will run on localhost: 3001 and DAB proxies traffic to the application via localhost: 9772. The traffic to the application will reach DAB first and then be proxied to the application.
37
+
- An application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server as the application. The application runs on localhost: 3001, and DAB proxies traffic to the application via localhost: 9772. The traffic to the application reaches DAB first and is then proxied to the application.
40
38
41
39
## Scenario description
42
40
43
41
Datawiza integration includes the following components:
44
42
45
-
-[Azure AD](../fundamentals/active-directory-whatis.md) - Microsoft's cloud-based identity and access management service, which helps users sign in and access external and internal resources.
43
+
-[Azure AD](../fundamentals/active-directory-whatis.md) - A cloud-based identity and access management service from Microsoft. Azure AD helps users sign in and access external and internal resources.
46
44
47
-
- Datawiza Access Broker (DAB) - The service user sign on and transparently passes identity to applications through HTTP headers.
45
+
- Datawiza Access Broker (DAB) - The service that users sign on to. DAB transparently passes identity information to applications through HTTP headers.
48
46
49
-
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the configurations of DAB and its access control policies.
47
+
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the DAB configuration and access control policies.
50
48
51
49
The following architecture diagram shows the implementation.

54
52
55
-
|Steps| Description|
53
+
|Step| Description|
56
54
|:----------|:-----------|
57
-
|1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
58
-
| 2. |The DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, then it sends the user to Azure AD for authentication.|
55
+
| 1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
56
+
| 2. | DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, it sends the user to Azure AD for authentication.|
59
57
| 3. | Azure AD sends the user request to the endpoint specified during the DAB application's registration in the Azure AD tenant.|
60
-
| 4. |The DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, the DAB may call out to the Identity provider to retrieve the information needed to set the header values correctly. The DAB sets the header values and sends the request to the application. |
61
-
| 5. | The user is now authenticated and has access to the application.|
58
+
| 4. | DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, DAB may call out to the identity provider to retrieve the information needed to set the header values correctly. DAB sets the header values and sends the request to the application. |
59
+
| 5. | The user is authenticated and has access to the application.|
62
60
63
61
## Onboard with Datawiza
64
62
65
-
To integrate your on-premises or cloud-hosted application with Azure AD, login to [Datawiza Cloud Management
63
+
To integrate your on-premises or cloud-hosted application with Azure AD, sign in to [Datawiza Cloud Management
66
64
Console](https://console.datawiza.com/) (DCMC).
67
65
68
66
## Create an application on DCMC
69
67
70
-
[Create an application](https://docs.datawiza.com/step-by-step/step2.html)and generate a key pair of `PROVISIONING_KEY` and `PROVISIONING_SECRET` for the application on the DCMC.
68
+
In the next step, you create an application on DCMC and generate a key pair for the app. The key pair consists of a `PROVISIONING_KEY` and `PROVISIONING_SECRET`. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
71
69
72
-
For Azure AD, Datawiza offers a convenient [One click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html). This method to integrate Azure AD with DCMC can create an application registration on your behalf in your Azure AD tenant.
70
+
For Azure AD, Datawiza offers a convenient [one-click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html). This method to integrate Azure AD with DCMC can create an application registration on your behalf in your Azure AD tenant.

75
73
76
-
Instead, if you want to use an existing web application in your Azure AD tenant, you can disable the option and populate the fields of the form. You'll need the tenant ID, client ID, and client secret. [Create a web application and get these valuesin your tenant](https://docs.datawiza.com/idp/azure.html).
74
+
Instead, if you want to use an existing web application in your Azure AD tenant, you can disable the option and populate the fields of the form. You need the tenant ID, client ID, and client secret. For more information about creating a web application and getting these values, see [Microsoft Azure AD in the Datawiza documentation](https://docs.datawiza.com/idp/azure.html).
77
75
78
-

76
+

79
77
80
78
## Run DAB with a header-based application
81
79
82
-
1. You can use either Docker or Kubernetes to run DAB. The docker image is needed for users to create a sample header-based application. [Configure DAB and SSO
83
-
integration](https://docs.datawiza.com/step-by-step/step3.html). [Deploy DAB with Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html). A sample docker image `docker-compose.yml` file is provided for you to download and use. [Log in to the container registry](https://docs.datawiza.com/step-by-step/step3.html#important-step) to download the images of DAB and the header-based application.
80
+
You can use either Docker or Kubernetes to run DAB. The docker image is needed to create a sample header-based application.
84
81
85
-
```yaml
86
-
services:
82
+
To run DAB with a header-based application, follow these steps:
83
+
84
+
1. Use either Docker or Kubernetes to run DAB:
85
+
86
+
- For Docker-specific instructions, see [Deploy Datawiza Access Broker With Your App](https://docs.datawiza.com/step-by-step/step3.html).
87
+
- For Kubernetes-specific instructions, see [Deploy Datawiza Access Broker with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html).
88
+
89
+
You can use the following sample docker image docker-compose.yml file:
90
+
91
+
```yaml
92
+
services:
87
93
datawiza-access-broker:
88
94
image: registry.gitlab.com/datawiza/access-broker
89
95
container_name: datawiza-access-broker
@@ -97,34 +103,37 @@ integration](https://docs.datawiza.com/step-by-step/step3.html). [Deploy DAB wit
2. After executing `docker-compose -f docker-compose.yml up`, the
105
-
header-based application should have SSO enabled with Azure AD. Open a browser and type in `http://localhost:9772/`.
110
+
1. To sign in to the container registry and download the images of DAB and the header-based application, follow the instructions in [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
106
111
107
-
3. An Azure AD login page will show up.
112
+
1. Run the following command:
108
113
109
-
## Pass user attributes to the header-based application
114
+
`docker-compose -f docker-compose.yml up`
110
115
111
-
1. DAB gets user attributes from IdP and can pass the user attributes to the application via header or cookie. See the instructions on how to [pass user attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
116
+
The header-based application should now have SSO enabled with Azure AD.
112
117
113
-
2. After successfully configuring the user attributes, you should see the green check sign for each of the user attributes.
118
+
1. In a browser, go to `http://localhost:9772/`. An Azure AD sign-in page appears.
114
119
115
-

120
+
## Pass user attributes to the header-based application
116
121
117
-
## Test the flow
122
+
DAB gets user attributes from Azure AD and can pass these attributes to the application via a header or cookie.
123
+
124
+
To pass user attributes such as an email address, a first name, and a last name to the header-based application, follow the instructions in [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
118
125
119
-
1. Navigate to the application URL.
126
+
After successfully configuring the user attributes, you should see a green check mark next to each attribute.
120
127
121
-
2. The DAB should redirect to the Azure AD login page.
128
+

129
+
130
+
## Test the flow
122
131
123
-
3. After successfully authenticating, you should be redirected to DAB.
132
+
1. Go to the application URL. DAB should redirect you to the Azure AD sign-in page.
124
133
125
-
4. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
134
+
1. After successfully authenticating, you should be redirected to DAB.
126
135
127
-
5. Your requested application should show up.
136
+
DAB evaluates policies, calculates headers, and sends you to the upstream application. Your requested application should appear.
0 commit comments