Skip to content

Commit 24d577f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-faq
2 parents 0c213a4 + 029b274 commit 24d577f

16 files changed

+212
-119
lines changed
Lines changed: 43 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with cloudtamer.io | Microsoft Docs'
3-
description: Learn how to configure single sign-on between Azure Active Directory and cloudtamer.io.
2+
title: 'Tutorial: Azure AD SSO integration with Kion (formerly cloudtamer.io)'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Kion (formerly cloudtamer.io).
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -9,63 +9,63 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/26/2021
12+
ms.date: 11/11/2021
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with cloudtamer.io
17+
# Tutorial: Azure AD SSO integration with Kion (formerly cloudtamer.io)
1818

19-
In this tutorial, you'll learn how to integrate cloudtamer.io with Azure Active Directory (Azure AD). When you integrate cloudtamer.io with Azure AD, you can:
19+
In this tutorial, you'll learn how to integrate Kion with Azure Active Directory (Azure AD). When you integrate Kion with Azure AD, you can:
2020

21-
* Control in Azure AD who has access to cloudtamer.io.
22-
* Enable your users to be automatically signed-in to cloudtamer.io with their Azure AD accounts.
21+
* Control in Azure AD who has access to Kion.
22+
* Enable your users to be automatically signed-in to Kion with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

2525
## Prerequisites
2626

2727
To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30-
* cloudtamer.io single sign-on (SSO) enabled subscription.
30+
* Kion single sign-on (SSO) enabled subscription.
3131

3232
## Scenario description
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* cloudtamer.io supports **SP and IDP** initiated SSO.
37-
* cloudtamer.io supports **Just In Time** user provisioning.
36+
* Kion supports **SP and IDP** initiated SSO.
37+
* Kion supports **Just In Time** user provisioning.
3838

3939

40-
## Adding cloudtamer.io from the gallery
40+
## Adding Kion (formerly cloudtamer.io) from the gallery
4141

42-
To configure the integration of cloudtamer.io into Azure AD, you need to add cloudtamer.io from the gallery to your list of managed SaaS apps.
42+
To configure the integration of Kion into Azure AD, you need to add Kion from the gallery to your list of managed SaaS apps.
4343

4444
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4545
1. On the left navigation pane, select the **Azure Active Directory** service.
4646
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4747
1. To add new application, select **New application**.
48-
1. In the **Add from the gallery** section, type **cloudtamer.io** in the search box.
49-
1. Select **cloudtamer.io** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48+
1. In the **Add from the gallery** section, type **Kion** in the search box.
49+
1. Select **Kion** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5050

5151

52-
## Configure and test Azure AD SSO for cloudtamer.io
52+
## Configure and test Azure AD SSO for Kion (formerly cloudtamer.io)
5353

54-
Configure and test Azure AD SSO with cloudtamer.io using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in cloudtamer.io.
54+
Configure and test Azure AD SSO with Kion using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Kion.
5555

56-
To configure and test Azure AD SSO with cloudtamer.io, perform the following steps:
56+
To configure and test Azure AD SSO with Kion, perform the following steps:
5757

5858
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5959
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6060
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61-
1. **[Configure cloudtamer.io SSO](#configure-cloudtamerio-sso)** - to configure the single sign-on settings on application side.
62-
1. **[Create cloudtamer.io test user](#create-cloudtamerio-test-user)** - to have a counterpart of B.Simon in cloudtamer.io that is linked to the Azure AD representation of user.
61+
1. **[Configure Kion SSO](#configure-kion-sso)** - to configure the single sign-on settings on application side.
62+
1. **[Create Kion test user](#create-kion-test-user)** - to have a counterpart of B.Simon in Kion that is linked to the Azure AD representation of user.
6363
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64-
1. **[Group assertions](#group-assertions)** - to set group assertions for Azure AD and cloudtamer.io.
64+
1. **[Group assertions](#group-assertions)** - to set group assertions for Azure AD and Kion.
6565

66-
### Begin cloudtamer.io SSO Configuration
66+
### Begin Kion SSO Configuration
6767

68-
1. Log in to cloudtamer.io website as an administrator.
68+
1. Log in to Kion website as an administrator.
6969

7070
1. Click on **+** plus icon at the top right corner and select **IDMS**.
7171

@@ -79,27 +79,27 @@ To configure and test Azure AD SSO with cloudtamer.io, perform the following ste
7979

8080
Follow these steps to enable Azure AD SSO in the Azure portal.
8181

82-
1. In the Azure portal, on the **cloudtamer.io** application integration page, find the **Manage** section and select **single sign-on**.
82+
1. In the Azure portal, on the **Kion** application integration page, find the **Manage** section and select **single sign-on**.
8383
1. On the **Select a single sign-on method** page, select **SAML**.
8484
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
8585

8686
![Edit Basic SAML Configuration](common/edit-urls.png)
8787

8888
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8989

90-
a. In the **Identifier** text box, paste the **SERVICE PROVIDER ISSUER (ENTITY ID)** from cloudtamer.io into this box.
90+
a. In the **Identifier** text box, paste the **SERVICE PROVIDER ISSUER (ENTITY ID)** from Kion into this box.
9191

92-
b. In the **Reply URL** text box, paste the **SERVICE PROVIDER ACS URL** from cloudtamer.io into this box.
92+
b. In the **Reply URL** text box, paste the **SERVICE PROVIDER ACS URL** from Kion into this box.
9393

9494
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9595

96-
In the **Sign-on URL** text box, paste the **SERVICE PROVIDER ACS URL** from cloudtamer.io into this box.
96+
In the **Sign-on URL** text box, paste the **SERVICE PROVIDER ACS URL** from Kion into this box.
9797

9898
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9999

100100
![The Certificate download link](common/metadataxml.png)
101101

102-
1. On the **Set up cloudtamer.io** section, copy the appropriate URL(s) based on your requirement.
102+
1. On the **Set up Kion** section, copy the appropriate URL(s) based on your requirement.
103103

104104
![Copy configuration URLs](common/copy-configuration-urls.png)
105105

@@ -117,17 +117,17 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
117117

118118
### Assign the Azure AD test user
119119

120-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to cloudtamer.io.
120+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Kion.
121121

122122
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
123-
1. In the applications list, select **cloudtamer.io**.
123+
1. In the applications list, select **Kion**.
124124
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
125125
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
126126
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
127127
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
128128
1. In the **Add Assignment** dialog, click the **Assign** button.
129129

130-
## Configure cloudtamer.io SSO
130+
## Configure Kion SSO
131131

132132
1. Perform the following steps in the **Add IDMS** page:
133133

@@ -156,61 +156,61 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
156156
1. Click **Create IDMS**.
157157

158158

159-
### Create cloudtamer.io test user
159+
### Create Kion test user
160160

161-
In this section, a user called Britta Simon is created in cloudtamer.io. cloudtamer.io supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in cloudtamer.io, a new one is created after authentication.
161+
In this section, a user called Britta Simon is created in Kion. Kion supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Kion, a new one is created after authentication.
162162

163163
## Test SSO
164164

165165
In this section, you test your Azure AD single sign-on configuration with following options.
166166

167167
#### SP initiated:
168168

169-
* Click on **Test this application** in Azure portal. This will redirect to cloudtamer.io Sign on URL where you can initiate the login flow.
169+
* Click on **Test this application** in Azure portal. This will redirect to Kion Sign on URL where you can initiate the login flow.
170170

171-
* Go to cloudtamer.io Sign-on URL directly and initiate the login flow from there.
171+
* Go to Kion Sign-on URL directly and initiate the login flow from there.
172172

173173
#### IDP initiated:
174174

175-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the cloudtamer.io for which you set up the SSO
175+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Kion for which you set up the SSO
176176

177-
You can also use Microsoft My Apps to test the application in any mode. When you click the cloudtamer.io tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the cloudtamer.io for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
177+
You can also use Microsoft My Apps to test the application in any mode. When you click the Kion tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Kion for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
178178

179179
## Group assertions
180180

181-
To easily manage cloudtamer.io user permissions by using existing Azure Active Directory groups, complete these steps:
181+
To easily manage Kion user permissions by using existing Azure Active Directory groups, complete these steps:
182182

183183
### Azure AD configuration
184184

185185
1. In the Azure portal, go to **Azure Active Directory** > **Enterprise Applications**.
186-
1. In the list, select the enterprise application for cloudtamer.io.
186+
1. In the list, select the enterprise application for Kion.
187187
1. On **Overview**, in the left menu, select **Single sign-on**.
188188
1. On **Single Sign-On**, under **User Attributes & Claims**, select **Edit**.
189189
1. Select **Add a group claim**.
190190
> [!NOTE]
191191
> You can have only one group claim. If this option is disabled, you might already have a group claim defined.
192192
1. On **Group Claims**, select the groups that should be returned in the claim:
193-
- If you will always have every group you intend to use in cloudtamer.io assigned to this enterprise application, select **Groups assigned to the application**.
193+
- If you will always have every group you intend to use in Kion assigned to this enterprise application, select **Groups assigned to the application**.
194194
- If you want all groups to appear (this selection can cause a large number of group assertions and might be subject to limits), select **Groups assigned to the application**.
195195
1. For **Source attribute**, leave the default **Group ID**.
196196
1. Select the **Customize the name of the group claim** checkbox.
197197
1. For **Name**, enter **memberOf**.
198198
1. Select **Save** to complete the configuration with Azure AD.
199199

200-
### cloudtamer.io configuration
200+
### Kion configuration
201201

202-
1. In cloudtamer.io, go to **Users** > **Identity Management Systems**.
202+
1. In Kion, go to **Users** > **Identity Management Systems**.
203203
1. Select the IDMS that you've created for Azure AD.
204204
1. On the overview page, select the **User Group Associations** tab.
205205
1. For each user group mapping that you want, complete these steps:
206206
1. Select **Add** > **Add New**.
207207
1. In the dialog that appears:
208208
1. For **Name**, enter **memberOf**.
209209
1. For **Regex**, enter the object ID (from Azure AD) of the group you want to match.
210-
1. For **User Group**, select the cloudtamer.io internal group you want to map to the group in **Regex**.
210+
1. For **User Group**, select the Kion internal group you want to map to the group in **Regex**.
211211
1. Select the **Update on Login** checkbox.
212212
1. Select **Add** to add the group association.
213213

214214
## Next steps
215215

216-
Once you configure cloudtamer.io you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
216+
Once you configure Kion you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@
443443
href: cloud-service-picco-tutorial.md
444444
- name: CloudSign
445445
href: cloudsign-tutorial.md
446-
- name: cloudtamer.io
446+
- name: Kion
447447
href: cloudtamer-io-tutorial.md
448448
- name: Cobalt
449449
href: cobalt-tutorial.md

articles/postgresql/concepts-backup.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: sr-msft
55
ms.author: srranga
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 05/29/2021
8+
ms.date: 11/08/2021
99
---
1010

1111
# Backup and restore in Azure Database for PostgreSQL - Single Server
@@ -105,7 +105,8 @@ During geo-restore, the server configurations that can be changed include comput
105105

106106
After a restore from either recovery mechanism, you should perform the following tasks to get your users and applications back up and running:
107107

108-
- If the new server is meant to replace the original server, redirect clients and client applications to the new server. Also change the user name also to `username@new-restored-server-name`.
108+
- To access the restored server, since it has a different name than the original server, please change the servername to the restored server name and the user name to `username@new-restored-server-name` in your connection string.
109+
- If the new server is meant to replace the original server, redirect clients and client applications to the new server.
109110
- Ensure appropriate server-level firewall and VNet rules are in place for users to connect. These rules are not copied over from the original server.
110111
- Ensure appropriate logins and database level permissions are in place
111112
- Configure alerts, as appropriate

0 commit comments

Comments
 (0)