Skip to content

Commit 2970717

Browse files
Merge pull request #102928 from v-hagamp/MCASdocumentationUpdate2
Product Backlog Item 911431: MCAS documentation feedback update 2
2 parents 3069546 + 327d883 commit 2970717

11 files changed

+228
-264
lines changed

articles/active-directory/saas-apps/concur-tutorial.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/16/2020
16+
ms.date: 01/31/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -42,7 +42,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Concur supports **SP** initiated SSO
4444
* Concur supports **Just In Time** user provisioning
45-
* Once you configure the Concur you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45+
* Once you configure Concur you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4646

4747
## Adding Concur from the gallery
4848

@@ -154,6 +154,4 @@ When you click the Concur tile in the Access Panel, you should be automatically
154154

155155
- [Try Concur with Azure AD](https://aad.portal.azure.com)
156156

157-
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
158-
159-
- [How to protect Concur with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
157+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/cornerstone-ondemand-tutorial.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/16/2020
16+
ms.date: 01/31/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -42,7 +42,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Cornerstone OnDemand supports **SP** initiated SSO
4444
* Cornerstone OnDemand supports [Automated user provisioning](cornerstone-ondemand-provisioning-tutorial.md)
45-
* Once you configure the Cornerstone OnDemand you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45+
* Once you configure Cornerstone OnDemand you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4646

4747
## Adding Cornerstone OnDemand from the gallery
4848

@@ -158,6 +158,4 @@ When you click the Cornerstone OnDemand tile in the Access Panel, you should be
158158

159159
- [Try Cornerstone OnDemand with Azure AD](https://aad.portal.azure.com)
160160

161-
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
162-
163-
- [How to protect Cornerstone OnDemand with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
161+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/docusign-tutorial.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/16/2020
16+
ms.date: 01/31/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -45,7 +45,7 @@ In this tutorial, you'll configure and test Azure AD SSO in a test environment t
4545
* DocuSign supports *just-in-time* user provisioning.
4646

4747
* DocuSign supports [automatic user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/docusign-provisioning-tutorial).
48-
* Once you configure the DocuSign you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
48+
* Once you configure DocuSign you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4949

5050
## Adding DocuSign from the gallery
5151

@@ -238,8 +238,6 @@ When you select the DocuSign tile in the Access Panel, you should be automatical
238238

239239
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
240240

241-
- [How to protect DocuSign with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
242-
243241
<!--Image references-->
244242

245243
[50]: ./media/docusign-tutorial/tutorial_docusign_18.png
@@ -254,4 +252,4 @@ When you select the DocuSign tile in the Access Panel, you should be automatical
254252
[59]: ./media/docusign-tutorial/tutorial_docusign_27.png
255253
[60]: ./media/docusign-tutorial/tutorial_docusign_28.png
256254
[61]: ./media/docusign-tutorial/tutorial_docusign_29.png
257-
[62]: ./media/docusign-tutorial/tutorial_docusign_30.png
255+
[62]: ./media/docusign-tutorial/tutorial_docusign_30.png

articles/active-directory/saas-apps/egnyte-tutorial.md

Lines changed: 66 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -12,59 +12,46 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 2/4/2019
16+
ms.date: 01/31/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
2120
---
22-
# Tutorial: Azure Active Directory integration with Egnyte
21+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Egnyte
2322

24-
In this tutorial, you learn how to integrate Egnyte with Azure Active Directory (Azure AD).
25-
Integrating Egnyte with Azure AD provides you with the following benefits:
23+
In this tutorial, you'll learn how to integrate Egnyte with Azure Active Directory (Azure AD). When you integrate Egnyte with Azure AD, you can:
2624

27-
* You can control in Azure AD who has access to Egnyte.
28-
* You can enable your users to be automatically signed-in to Egnyte (Single Sign-On) with their Azure AD accounts.
29-
* You can manage your accounts in one central location - the Azure portal.
25+
* Control in Azure AD who has access to Egnyte.
26+
* Enable your users to be automatically signed-in to Egnyte with their Azure AD accounts.
27+
* Manage your accounts in one central location - the Azure portal.
3028

31-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
29+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3330

3431
## Prerequisites
3532

36-
To configure Azure AD integration with Egnyte, you need the following items:
33+
To get started, you need the following items:
3734

38-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get one-month trial [here](https://azure.microsoft.com/pricing/free-trial/)
39-
* Egnyte single sign-on enabled subscription
35+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
36+
* Egnyte single sign-on (SSO) enabled subscription.
4037

4138
## Scenario description
4239

4340
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
4441

4542
* Egnyte supports **SP** initiated SSO
43+
* Once you configure Egnyte you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4644

4745
## Adding Egnyte from the gallery
4846

4947
To configure the integration of Egnyte into Azure AD, you need to add Egnyte from the gallery to your list of managed SaaS apps.
5048

51-
**To add Egnyte from the gallery, perform the following steps:**
52-
53-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
54-
55-
![The Azure Active Directory button](common/select-azuread.png)
56-
57-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
58-
59-
![The Enterprise applications blade](common/enterprise-applications.png)
60-
61-
3. To add new application, click **New application** button on the top of dialog.
62-
63-
![The New application button](common/add-new-app.png)
64-
65-
4. In the search box, type **Egnyte**, select **Egnyte** from result panel then click **Add** button to add the application.
66-
67-
![Egnyte in the results list](common/search-new-app.png)
49+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
50+
1. On the left navigation pane, select the **Azure Active Directory** service.
51+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
52+
1. To add new application, select **New application**.
53+
1. In the **Add from the gallery** section, type **Egnyte** in the search box.
54+
1. Select **Egnyte** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
6855

6956
## Configure and test Azure AD single sign-on
7057

@@ -73,14 +60,16 @@ For single sign-on to work, a link relationship between an Azure AD user and the
7360

7461
To configure and test Azure AD single sign-on with Egnyte, you need to complete the following building blocks:
7562

76-
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
77-
2. **[Configure Egnyte Single Sign-On](#configure-egnyte-single-sign-on)** - to configure the Single Sign-On settings on application side.
78-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
79-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
80-
5. **[Create Egnyte test user](#create-egnyte-test-user)** - to have a counterpart of Britta Simon in Egnyte that is linked to the Azure AD representation of user.
81-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
63+
To configure and test Azure AD SSO with Egnyte, complete the following building blocks:
8264

83-
### Configure Azure AD single sign-on
65+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
1. **[Configure Egnyte SSO](#configure-egnyte-sso)** - to configure the single sign-on settings on application side.
69+
1. **[Create Egnyte test user](#create-egnyte-test-user)** - to have a counterpart of B.Simon in Egnyte that is linked to the Azure AD representation of user.
70+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
71+
72+
### Configure Azure AD SSO
8473

8574
In this section, you enable Azure AD single sign-on in the Azure portal.
8675

@@ -122,42 +111,6 @@ To configure Azure AD single sign-on with Egnyte, perform the following steps:
122111

123112
c. Logout URL
124113

125-
### Configure Egnyte Single Sign-On
126-
127-
1. In a different web browser window, log in to your Egnyte company site as an administrator.
128-
129-
2. Click **Settings**.
130-
131-
![Settings](./media/egnyte-tutorial/ic787819.png "Settings")
132-
133-
3. In the menu, click **Settings**.
134-
135-
![Settings](./media/egnyte-tutorial/ic787820.png "Settings")
136-
137-
4. Click the **Configuration** tab, and then click **Security**.
138-
139-
![Security](./media/egnyte-tutorial/ic787821.png "Security")
140-
141-
5. In the **Single Sign-On Authentication** section, perform the following steps:
142-
143-
![Single Sign On Authentication](./media/egnyte-tutorial/ic787822.png "Single Sign On Authentication")
144-
145-
a. As **Single sign-on authentication**, select **SAML 2.0**.
146-
147-
b. As **Identity provider**, select **AzureAD**.
148-
149-
c. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
150-
151-
d. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
152-
153-
e. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
154-
155-
f. As **Default user mapping**, select **Email address**.
156-
157-
g. As **Use domain-specific issuer value**, select **disabled**.
158-
159-
h. Click **Save**.
160-
161114
### Create an Azure AD test user
162115

163116
The objective of this section is to create a test user in the Azure portal called Britta Simon.
@@ -209,13 +162,49 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
209162

210163
7. In the **Add Assignment** dialog click the **Assign** button.
211164

165+
## Configure Egnyte SSO
166+
167+
1. In a different web browser window, sign in to your Egnyte company site as an administrator.
168+
169+
2. Click **Settings**.
170+
171+
![Settings](./media/egnyte-tutorial/ic787819.png "Settings")
172+
173+
3. In the menu, click **Settings**.
174+
175+
![Settings](./media/egnyte-tutorial/ic787820.png "Settings")
176+
177+
4. Click the **Configuration** tab, and then click **Security**.
178+
179+
![Security](./media/egnyte-tutorial/ic787821.png "Security")
180+
181+
5. In the **Single Sign-On Authentication** section, perform the following steps:
182+
183+
![Single Sign On Authentication](./media/egnyte-tutorial/ic787822.png "Single Sign On Authentication")
184+
185+
a. As **Single sign-on authentication**, select **SAML 2.0**.
186+
187+
b. As **Identity provider**, select **AzureAD**.
188+
189+
c. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
190+
191+
d. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
192+
193+
e. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
194+
195+
f. As **Default user mapping**, select **Email address**.
196+
197+
g. As **Use domain-specific issuer value**, select **disabled**.
198+
199+
h. Click **Save**.
200+
212201
### Create Egnyte test user
213202

214-
To enable Azure AD users to log in to Egnyte, they must be provisioned into Egnyte. In the case of Egnyte, provisioning is a manual task.
203+
To enable Azure AD users to sign in to Egnyte, they must be provisioned into Egnyte. In the case of Egnyte, provisioning is a manual task.
215204

216205
**To provision a user accounts, perform the following steps:**
217206

218-
1. Log in to your **Egnyte** company site as administrator.
207+
1. Sign in to your **Egnyte** company site as administrator.
219208

220209
2. Go to **Settings \> Users & Groups**.
221210

@@ -243,7 +232,7 @@ To enable Azure AD users to log in to Egnyte, they must be provisioned into Egny
243232
>You can use any other Egnyte user account creation tools or APIs provided by Egnyte to provision Azure AD user accounts.
244233
>
245234
246-
### Test single sign-on
235+
### Test SSO
247236

248237
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
249238

@@ -257,3 +246,4 @@ When you click the Egnyte tile in the Access Panel, you should be automatically
257246

258247
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
259248

249+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/github-tutorial.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/16/2020
16+
ms.date: 01/31/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -43,7 +43,7 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
4343
* GitHub supports **SP** initiated SSO
4444

4545
* GitHub supports [**Automated** user provisioning](github-provisioning-tutorial.md)
46-
* Once you configure the GitHub you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46+
* Once you configure GitHub you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4747

4848
## Adding GitHub from the gallery
4949

@@ -219,6 +219,4 @@ When you click the GitHub tile in the Access Panel, you should be automatically
219219

220220
- [Try GitHub with Azure AD](https://aad.portal.azure.com/)
221221

222-
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
223-
224-
- [How to protect GitHub with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
222+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/linkedinlearning-tutorial.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 08/29/2019
16+
ms.date: 01/31/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
@@ -43,6 +42,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4342

4443
* LinkedIn Learning supports **SP and IDP** initiated SSO
4544
* LinkedIn Learning supports **Just In Time** user provisioning
45+
* Once you configure LinkedIn Learning you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4646

4747
## Adding LinkedIn Learning from the gallery
4848

@@ -178,3 +178,4 @@ When you click the LinkedIn Learning tile in the Access Panel, you should be aut
178178

179179
- [Try LinkedIn Learning with Azure AD](https://aad.portal.azure.com/)
180180

181+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)