Skip to content

Commit 21acdb9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-custom-roles-management-group-scope-ga-update
2 parents b2b49ec + 2083d22 commit 21acdb9

File tree

84 files changed

+528
-685
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+528
-685
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 2 additions & 244 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/fcm-hub-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with FCM HUB'
2+
title: 'Tutorial: Azure Active Directory SSO integration with FCM HUB'
33
description: Learn how to configure single sign-on between Azure Active Directory and FCM HUB.
44
services: active-directory
55
author: jeevansd
@@ -9,13 +9,13 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with FCM HUB
16+
# Tutorial: Azure Active Directory SSO integration with FCM HUB
1717

18-
In this tutorial, you'll learn how to integrate FCM HUB with Azure Active Directory (Azure AD). When you integrate FCM HUB with Azure AD, you can:
18+
In this tutorial, you learn how to integrate FCM HUB with Azure Active Directory (Azure AD). When you integrate FCM HUB with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to FCM HUB.
2121
* Enable your users to be automatically signed-in to FCM HUB with their Azure AD accounts.
@@ -91,7 +91,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9191
- **Source Attribute**: PortalID, value provided by FCM
9292

9393
1. In the **SAML Signing Certificate** section, use the edit option to select or enter the following settings, and then select **Save**:
94-
- **Signing Option**: Sign SAML response
94+
- **Signing Option**: Sign SAML response and Assertion
9595
- **Signing Algorithm**: SHA-256
9696

9797
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.

articles/active-directory/saas-apps/hashicorp-cloud-platform-hcp-tutorial.md

Lines changed: 7 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/06/2023
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414

1515
---
1616

1717
# Azure Active Directory SSO integration with HashiCorp Cloud Platform (HCP)
1818

19-
In this article, you learn how to integrate HashiCorp Cloud Platform (HCP) with Azure Active Directory (Azure AD). HashiCorp Cloud platform hosting managed services of the developer tools created by HashiCorp, such Terraform, Vault, Boundary, and Consul. When you integrate HashiCorp Cloud Platform (HCP) with Azure AD, you can:
19+
In this article, you learn how to integrate HashiCorp Cloud Platform (HCP) with Azure Active Directory (Azure AD). HashiCorp Cloud Platform hosting managed services of the developer tools created by HashiCorp, such Terraform, Vault, Boundary, and Consul. When you integrate HashiCorp Cloud Platform (HCP) with Azure AD, you can:
2020

2121
* Control in Azure AD who has access to HashiCorp Cloud Platform (HCP).
2222
* Enable your users to be automatically signed-in to HashiCorp Cloud Platform (HCP) with their Azure AD accounts.
@@ -31,7 +31,7 @@ To integrate Azure Active Directory with HashiCorp Cloud Platform (HCP), you nee
3131
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3232
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3333
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34-
* HashiCorp Cloud Platform (HCP) single sign-on (SSO) enabled subscription.
34+
* HashiCorp Cloud Platform (HCP) single sign-on (SSO) enabled organization.
3535

3636
## Add application and assign a test user
3737

@@ -69,7 +69,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6969
`https://portal.cloud.hashicorp.com/sign-in?conn-id=HCP-SSO-<HCP_ORG_ID>-samlp`
7070

7171
> [!NOTE]
72-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
72+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. These values are also pregenerated for you on the "Setup SAML SSO" page within your Organization settings in HashiCorp Cloud Platform (HCP). For more information SAML documentation is provided on [HashiCorp's Developer site](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad). Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) for any questions about this process. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
7373
7474
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
7575

@@ -81,26 +81,17 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
8181

8282
## Configure HashiCorp Cloud Platform (HCP) SSO
8383

84-
To configure single sign-on on **HashiCorp Cloud Platform (HCP)** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [HashiCorp Cloud Platform (HCP) support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
85-
86-
### Create HashiCorp Cloud Platform (HCP) test user
87-
88-
In this section, you create a user called Britta Simon at HashiCorp Cloud Platform (HCP). Work with [HashiCorp Cloud Platform (HCP) support team](mailto:[email protected]) to add the users in the HashiCorp Cloud Platform (HCP) platform. Users must be created and activated before you use single sign-on.
84+
To configure single sign-on on the **HashiCorp Cloud Platform (HCP)** side, you need to add a verification record TXT to your domain host, add the downloaded **Certificate (Base64)** and **Login URL** copied from Azure portal to your HashiCorp Cloud Platform (HCP) Organization "Setup SAML SSO" page. Please refer to the SAML documentation that is provided on [HashiCorp's Developer site](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad). Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) for any questions about this process.
8985

9086
## Test SSO
9187

92-
In this section, you test your Azure AD single sign-on configuration with following options.
93-
94-
* Click on **Test this application** in Azure portal. This will redirect to HashiCorp Cloud Platform (HCP) Sign-on URL where you can initiate the login flow.
95-
96-
* Go to HashiCorp Cloud Platform (HCP) Sign-on URL directly and initiate the login flow from there.
97-
98-
* You can use Microsoft My Apps. When you select the HashiCorp Cloud Platform (HCP) tile in the My Apps, this will redirect to HashiCorp Cloud Platform (HCP) Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
88+
In the previous [Create and assign Azure AD test user](#create-and-assign-azure-ad-test-user) section, you created a user called B.Simon and assigned it to the HashiCorp Cloud Platform (HCP) app within the Azure Portal. This can now be used for testing the SSO connection. You may also use any account that is already associated with the HashiCorp Cloud Platform (HCP) app in the Azure Portal.
9989

10090
## Additional resources
10191

10292
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
10393
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
94+
* [HashiCorp Cloud Platform (HCP) | Azure Active Directory SAML SSO Configuration](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad).
10495

10596
## Next steps
10697

articles/active-directory/saas-apps/predict360-sso-tutorial.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/06/2023
12+
ms.date: 04/20/2023
1313
ms.author: jeedes
1414

1515
---
@@ -69,25 +69,34 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6969

7070
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
7171

72-
d. If you wish to configure the application in **SP** initiated mode, then perform the following step:
72+
d. Enter the customer code/key provided by 360factors in **Relay State** textbox. Make sure the code is entered in lowercase. This is required for **IDP** initiated mode.
73+
74+
> [!Note]
75+
> You will get the **Service Provider metadata file** from the [Predict360 SSO support team](mailto:[email protected]). If the **Identifier** and **Reply URL** values do not get auto populated, then fill in the values manually according to your requirement.
76+
77+
e. If you wish to configure the application in **SP** initiated mode, then perform the following step:
7378

74-
In the **Sign on URL** textbox, type the URL:
75-
`https://paadt.360factors.com/predict360/login.do`.
79+
In the **Sign on URL** textbox, type your customer specific URL using the following pattern:
80+
`https://<customer-key>.360factors.com/predict360/login.do`
7681

7782
> [!Note]
78-
> You will get the **Service Provider metadata file** from the [Predict360 SSO support team](mailto:[email protected]). If the **Identifier** and **Reply URL** values do not get auto populated, then fill in the values manually according to your requirement.
83+
> This URL is shared by 360factors team. `<customer-key>` is replaced with your customer key, which is also provide by 360factors team.
7984

8085
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
8186

8287
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
8388

89+
1. Find **Certificate (Raw)** in the **SAML Signing Certificate** section, and select **Download** to download the certificate and save it on your computer.
90+
91+
![Screenshot shows the Certificate Raw download link.](common/certificateraw.png " Raw Certificate")
92+
8493
1. On the **Set up Predict360 SSO** section, copy the appropriate URL(s) based on your requirement.
8594

8695
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
8796

88-
## Configure Predict360 SSO SSO
97+
## Configure Predict360 SSO
8998

90-
To configure single sign-on on **Predict360 SSO** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Predict360 SSO support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
99+
To configure single sign-on on **Predict360 SSO** side, you need to send the downloaded **Federation Metadata XML**, **Certificate (Raw)** and appropriate copied URLs from Azure portal to [Predict360 SSO support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
91100

92101
### Create Predict360 SSO test user
93102

articles/api-management/TOC.yml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,13 @@
8585
href: /security/benchmark/azure/baselines/api-management-security-baseline?toc=/azure/api-management/&bc=/azure/api-management/breadcrumb/toc.json
8686
- name: Authentication and authorization options
8787
href: authentication-authorization-overview.md
88+
- name: API security
89+
items:
90+
- name: Defender for APIs (preview)
91+
href: protect-with-defender-for-apis.md
92+
- name: Mitigate OWASP API threats
93+
href: mitigate-owasp-api-threats.md
94+
displayName: OWASP top 10, vulnerability, vulnerabilities
8895
- name: API authorizations
8996
href: authorizations-overview.md
9097
displayName: OAuth
@@ -298,10 +305,7 @@
298305
href: api-management-howto-manage-protocols-ciphers.md
299306
- name: Defend against DDoS attacks
300307
href: protect-with-ddos-protection.md
301-
- name: Mitigate OWASP API threats
302-
href: mitigate-owasp-api-threats.md
303-
displayName: OWASP top 10, vulnerability, vulnerabilities
304-
- name: Configure API authorizations for OAuth 2.0 backends
308+
- name: Manage API authorizations
305309
items:
306310
- name: Configure common authorization providers
307311
href: authorizations-configure-common-providers.md

articles/api-management/api-management-gateways-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ The following table compares features available in the managed gateway versus th
7676
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ |
7777
| **HTTP/2** (Client-to-gateway) ||| ✔️ |
7878
| **HTTP/2** (Gateway-to-backend) ||| ✔️ |
79+
| API threat detection with [Defender for APIs](protect-with-defender-for-apis.md) | ✔️ |||
7980

8081
<sup>1</sup> Depends on how the gateway is deployed, but is the responsibility of the customer.<br/>
8182
<sup>2</sup> Connectivity to the self-hosted gateway v2 [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies) requires DNS resolution of the default endpoint hostname; custom domain name is currently not supported.<br/>
192 KB
Loading
233 KB
Loading
175 KB
Loading
170 KB
Loading

0 commit comments

Comments
 (0)