You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with cloudtamer.io | Microsoft Docs'
3
-
description: Learn how to configure single sign-on between Azure Active Directory and cloudtamer.io.
2
+
title: 'Tutorial: Azure AD SSO integration with Kion (formerly cloudtamer.io)'
3
+
description: Learn how to configure single sign-on between Azure Active Directory and Kion (formerly cloudtamer.io).
4
4
services: active-directory
5
5
author: jeevansd
6
6
manager: CelesteDG
@@ -9,63 +9,63 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 07/26/2021
12
+
ms.date: 11/11/2021
13
13
ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with cloudtamer.io
17
+
# Tutorial: Azure AD SSO integration with Kion (formerly cloudtamer.io)
18
18
19
-
In this tutorial, you'll learn how to integrate cloudtamer.io with Azure Active Directory (Azure AD). When you integrate cloudtamer.io with Azure AD, you can:
19
+
In this tutorial, you'll learn how to integrate Kion with Azure Active Directory (Azure AD). When you integrate Kion with Azure AD, you can:
20
20
21
-
* Control in Azure AD who has access to cloudtamer.io.
22
-
* Enable your users to be automatically signed-in to cloudtamer.io with their Azure AD accounts.
21
+
* Control in Azure AD who has access to Kion.
22
+
* Enable your users to be automatically signed-in to Kion with their Azure AD accounts.
23
23
* Manage your accounts in one central location - the Azure portal.
24
24
25
25
## Prerequisites
26
26
27
27
To get started, you need the following items:
28
28
29
29
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30
-
*cloudtamer.io single sign-on (SSO) enabled subscription.
30
+
*Kion single sign-on (SSO) enabled subscription.
31
31
32
32
## Scenario description
33
33
34
34
In this tutorial, you configure and test Azure AD SSO in a test environment.
35
35
36
-
*cloudtamer.io supports **SP and IDP** initiated SSO.
37
-
*cloudtamer.io supports **Just In Time** user provisioning.
36
+
*Kion supports **SP and IDP** initiated SSO.
37
+
*Kion supports **Just In Time** user provisioning.
38
38
39
39
40
-
## Adding cloudtamer.io from the gallery
40
+
## Adding Kion (formerly cloudtamer.io) from the gallery
41
41
42
-
To configure the integration of cloudtamer.io into Azure AD, you need to add cloudtamer.io from the gallery to your list of managed SaaS apps.
42
+
To configure the integration of Kion into Azure AD, you need to add Kion from the gallery to your list of managed SaaS apps.
43
43
44
44
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
45
45
1. On the left navigation pane, select the **Azure Active Directory** service.
46
46
1. Navigate to **Enterprise Applications** and then select **All Applications**.
47
47
1. To add new application, select **New application**.
48
-
1. In the **Add from the gallery** section, type **cloudtamer.io** in the search box.
49
-
1. Select **cloudtamer.io** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48
+
1. In the **Add from the gallery** section, type **Kion** in the search box.
49
+
1. Select **Kion** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
50
50
51
51
52
-
## Configure and test Azure AD SSO for cloudtamer.io
52
+
## Configure and test Azure AD SSO for Kion (formerly cloudtamer.io)
53
53
54
-
Configure and test Azure AD SSO with cloudtamer.io using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in cloudtamer.io.
54
+
Configure and test Azure AD SSO with Kion using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Kion.
55
55
56
-
To configure and test Azure AD SSO with cloudtamer.io, perform the following steps:
56
+
To configure and test Azure AD SSO with Kion, perform the following steps:
57
57
58
58
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
59
59
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60
60
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61
-
1.**[Configure cloudtamer.io SSO](#configure-cloudtamerio-sso)** - to configure the single sign-on settings on application side.
62
-
1.**[Create cloudtamer.io test user](#create-cloudtamerio-test-user)** - to have a counterpart of B.Simon in cloudtamer.io that is linked to the Azure AD representation of user.
61
+
1.**[Configure Kion SSO](#configure-kion-sso)** - to configure the single sign-on settings on application side.
62
+
1.**[Create Kion test user](#create-kion-test-user)** - to have a counterpart of B.Simon in Kion that is linked to the Azure AD representation of user.
63
63
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
64
-
1.**[Group assertions](#group-assertions)** - to set group assertions for Azure AD and cloudtamer.io.
64
+
1.**[Group assertions](#group-assertions)** - to set group assertions for Azure AD and Kion.
65
65
66
-
### Begin cloudtamer.io SSO Configuration
66
+
### Begin Kion SSO Configuration
67
67
68
-
1. Log in to cloudtamer.io website as an administrator.
68
+
1. Log in to Kion website as an administrator.
69
69
70
70
1. Click on **+** plus icon at the top right corner and select **IDMS**.
71
71
@@ -79,27 +79,27 @@ To configure and test Azure AD SSO with cloudtamer.io, perform the following ste
79
79
80
80
Follow these steps to enable Azure AD SSO in the Azure portal.
81
81
82
-
1. In the Azure portal, on the **cloudtamer.io** application integration page, find the **Manage** section and select **single sign-on**.
82
+
1. In the Azure portal, on the **Kion** application integration page, find the **Manage** section and select **single sign-on**.
83
83
1. On the **Select a single sign-on method** page, select **SAML**.
84
84
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
89
89
90
-
a. In the **Identifier** text box, paste the **SERVICE PROVIDER ISSUER (ENTITY ID)** from cloudtamer.io into this box.
90
+
a. In the **Identifier** text box, paste the **SERVICE PROVIDER ISSUER (ENTITY ID)** from Kion into this box.
91
91
92
-
b. In the **Reply URL** text box, paste the **SERVICE PROVIDER ACS URL** from cloudtamer.io into this box.
92
+
b. In the **Reply URL** text box, paste the **SERVICE PROVIDER ACS URL** from Kion into this box.
93
93
94
94
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
95
95
96
-
In the **Sign-on URL** text box, paste the **SERVICE PROVIDER ACS URL** from cloudtamer.io into this box.
96
+
In the **Sign-on URL** text box, paste the **SERVICE PROVIDER ACS URL** from Kion into this box.
97
97
98
98
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
@@ -117,17 +117,17 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
117
117
118
118
### Assign the Azure AD test user
119
119
120
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to cloudtamer.io.
120
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Kion.
121
121
122
122
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
123
-
1. In the applications list, select **cloudtamer.io**.
123
+
1. In the applications list, select **Kion**.
124
124
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
125
125
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
126
126
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
127
127
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
128
128
1. In the **Add Assignment** dialog, click the **Assign** button.
129
129
130
-
## Configure cloudtamer.io SSO
130
+
## Configure Kion SSO
131
131
132
132
1. Perform the following steps in the **Add IDMS** page:
133
133
@@ -156,61 +156,61 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
156
156
1. Click **Create IDMS**.
157
157
158
158
159
-
### Create cloudtamer.io test user
159
+
### Create Kion test user
160
160
161
-
In this section, a user called Britta Simon is created in cloudtamer.io. cloudtamer.io supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in cloudtamer.io, a new one is created after authentication.
161
+
In this section, a user called Britta Simon is created in Kion. Kion supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Kion, a new one is created after authentication.
162
162
163
163
## Test SSO
164
164
165
165
In this section, you test your Azure AD single sign-on configuration with following options.
166
166
167
167
#### SP initiated:
168
168
169
-
* Click on **Test this application** in Azure portal. This will redirect to cloudtamer.io Sign on URL where you can initiate the login flow.
169
+
* Click on **Test this application** in Azure portal. This will redirect to Kion Sign on URL where you can initiate the login flow.
170
170
171
-
* Go to cloudtamer.io Sign-on URL directly and initiate the login flow from there.
171
+
* Go to Kion Sign-on URL directly and initiate the login flow from there.
172
172
173
173
#### IDP initiated:
174
174
175
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the cloudtamer.io for which you set up the SSO
175
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Kion for which you set up the SSO
176
176
177
-
You can also use Microsoft My Apps to test the application in any mode. When you click the cloudtamer.io tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the cloudtamer.io for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
177
+
You can also use Microsoft My Apps to test the application in any mode. When you click the Kion tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Kion for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
178
178
179
179
## Group assertions
180
180
181
-
To easily manage cloudtamer.io user permissions by using existing Azure Active Directory groups, complete these steps:
181
+
To easily manage Kion user permissions by using existing Azure Active Directory groups, complete these steps:
182
182
183
183
### Azure AD configuration
184
184
185
185
1. In the Azure portal, go to **Azure Active Directory** > **Enterprise Applications**.
186
-
1. In the list, select the enterprise application for cloudtamer.io.
186
+
1. In the list, select the enterprise application for Kion.
187
187
1. On **Overview**, in the left menu, select **Single sign-on**.
188
188
1. On **Single Sign-On**, under **User Attributes & Claims**, select **Edit**.
189
189
1. Select **Add a group claim**.
190
190
> [!NOTE]
191
191
> You can have only one group claim. If this option is disabled, you might already have a group claim defined.
192
192
1. On **Group Claims**, select the groups that should be returned in the claim:
193
-
- If you will always have every group you intend to use in cloudtamer.io assigned to this enterprise application, select **Groups assigned to the application**.
193
+
- If you will always have every group you intend to use in Kion assigned to this enterprise application, select **Groups assigned to the application**.
194
194
- If you want all groups to appear (this selection can cause a large number of group assertions and might be subject to limits), select **Groups assigned to the application**.
195
195
1. For **Source attribute**, leave the default **Group ID**.
196
196
1. Select the **Customize the name of the group claim** checkbox.
197
197
1. For **Name**, enter **memberOf**.
198
198
1. Select **Save** to complete the configuration with Azure AD.
199
199
200
-
### cloudtamer.io configuration
200
+
### Kion configuration
201
201
202
-
1. In cloudtamer.io, go to **Users** > **Identity Management Systems**.
202
+
1. In Kion, go to **Users** > **Identity Management Systems**.
203
203
1. Select the IDMS that you've created for Azure AD.
204
204
1. On the overview page, select the **User Group Associations** tab.
205
205
1. For each user group mapping that you want, complete these steps:
206
206
1. Select **Add** > **Add New**.
207
207
1. In the dialog that appears:
208
208
1. For **Name**, enter **memberOf**.
209
209
1. For **Regex**, enter the object ID (from Azure AD) of the group you want to match.
210
-
1. For **User Group**, select the cloudtamer.io internal group you want to map to the group in **Regex**.
210
+
1. For **User Group**, select the Kion internal group you want to map to the group in **Regex**.
211
211
1. Select the **Update on Login** checkbox.
212
212
1. Select **Add** to add the group association.
213
213
214
214
## Next steps
215
215
216
-
Once you configure cloudtamer.io you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
216
+
Once you configure Kion you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-backup.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: sr-msft
5
5
ms.author: srranga
6
6
ms.service: postgresql
7
7
ms.topic: conceptual
8
-
ms.date: 05/29/2021
8
+
ms.date: 11/08/2021
9
9
---
10
10
11
11
# Backup and restore in Azure Database for PostgreSQL - Single Server
@@ -105,7 +105,8 @@ During geo-restore, the server configurations that can be changed include comput
105
105
106
106
After a restore from either recovery mechanism, you should perform the following tasks to get your users and applications back up and running:
107
107
108
-
- If the new server is meant to replace the original server, redirect clients and client applications to the new server. Also change the user name also to `username@new-restored-server-name`.
108
+
- To access the restored server, since it has a different name than the original server, please change the servername to the restored server name and the user name to `username@new-restored-server-name` in your connection string.
109
+
- If the new server is meant to replace the original server, redirect clients and client applications to the new server.
109
110
- Ensure appropriate server-level firewall and VNet rules are in place for users to connect. These rules are not copied over from the original server.
110
111
- Ensure appropriate logins and database level permissions are in place
0 commit comments