You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -42,7 +42,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
43
* Concur supports **SP** initiated SSO
44
44
* Concur supports **Just In Time** user provisioning
45
-
* Once you configure the Concur you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45
+
* Once you configure Concur you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46
46
47
47
## Adding Concur from the gallery
48
48
@@ -154,6 +154,4 @@ When you click the Concur tile in the Access Panel, you should be automatically
154
154
155
155
-[Try Concur with Azure AD](https://aad.portal.azure.com)
156
156
157
-
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
158
-
159
-
-[How to protect Concur with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
157
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
* Cornerstone OnDemand supports [Automated user provisioning](cornerstone-ondemand-provisioning-tutorial.md)
45
-
* Once you configure the Cornerstone OnDemand you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45
+
* Once you configure Cornerstone OnDemand you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46
46
47
47
## Adding Cornerstone OnDemand from the gallery
48
48
@@ -158,6 +158,4 @@ When you click the Cornerstone OnDemand tile in the Access Panel, you should be
158
158
159
159
-[Try Cornerstone OnDemand with Azure AD](https://aad.portal.azure.com)
160
160
161
-
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
162
-
163
-
-[How to protect Cornerstone OnDemand with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
161
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
@@ -45,7 +45,7 @@ In this tutorial, you'll configure and test Azure AD SSO in a test environment t
45
45
* DocuSign supports *just-in-time* user provisioning.
46
46
47
47
* DocuSign supports [automatic user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/docusign-provisioning-tutorial).
48
-
* Once you configure the DocuSign you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
48
+
* Once you configure DocuSign you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
49
49
50
50
## Adding DocuSign from the gallery
51
51
@@ -238,8 +238,6 @@ When you select the DocuSign tile in the Access Panel, you should be automatical
238
238
239
239
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
240
240
241
-
-[How to protect DocuSign with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/egnyte-tutorial.md
+66-76Lines changed: 66 additions & 76 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,59 +12,46 @@ ms.service: active-directory
12
12
ms.subservice: saas-app-tutorial
13
13
ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
-
ms.devlang: na
16
15
ms.topic: tutorial
17
-
ms.date: 2/4/2019
16
+
ms.date: 01/31/2020
18
17
ms.author: jeedes
19
18
20
19
ms.collection: M365-identity-device-management
21
20
---
22
-
# Tutorial: Azure Active Directory integration with Egnyte
21
+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Egnyte
23
22
24
-
In this tutorial, you learn how to integrate Egnyte with Azure Active Directory (Azure AD).
25
-
Integrating Egnyte with Azure AD provides you with the following benefits:
23
+
In this tutorial, you'll learn how to integrate Egnyte with Azure Active Directory (Azure AD). When you integrate Egnyte with Azure AD, you can:
26
24
27
-
*You can control in Azure AD who has access to Egnyte.
28
-
*You can enable your users to be automatically signed-in to Egnyte (Single Sign-On) with their Azure AD accounts.
29
-
*You can manage your accounts in one central location - the Azure portal.
25
+
*Control in Azure AD who has access to Egnyte.
26
+
*Enable your users to be automatically signed-in to Egnyte with their Azure AD accounts.
27
+
*Manage your accounts in one central location - the Azure portal.
30
28
31
-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32
-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
29
+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
33
30
34
31
## Prerequisites
35
32
36
-
To configure Azure AD integration with Egnyte, you need the following items:
33
+
To get started, you need the following items:
37
34
38
-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get one-month trial [here](https://azure.microsoft.com/pricing/free-trial/)
39
-
* Egnyte single sign-on enabled subscription
35
+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
36
+
* Egnyte single sign-on (SSO) enabled subscription.
40
37
41
38
## Scenario description
42
39
43
40
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
44
41
45
42
* Egnyte supports **SP** initiated SSO
43
+
* Once you configure Egnyte you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46
44
47
45
## Adding Egnyte from the gallery
48
46
49
47
To configure the integration of Egnyte into Azure AD, you need to add Egnyte from the gallery to your list of managed SaaS apps.
50
48
51
-
**To add Egnyte from the gallery, perform the following steps:**
52
-
53
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
54
-
55
-

56
-
57
-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
3. To add new application, click **New application** button on the top of dialog.
62
-
63
-

64
-
65
-
4. In the search box, type **Egnyte**, select **Egnyte** from result panel then click **Add** button to add the application.
66
-
67
-

49
+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
50
+
1. On the left navigation pane, select the **Azure Active Directory** service.
51
+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
52
+
1. To add new application, select **New application**.
53
+
1. In the **Add from the gallery** section, type **Egnyte** in the search box.
54
+
1. Select **Egnyte** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
68
55
69
56
## Configure and test Azure AD single sign-on
70
57
@@ -73,14 +60,16 @@ For single sign-on to work, a link relationship between an Azure AD user and the
73
60
74
61
To configure and test Azure AD single sign-on with Egnyte, you need to complete the following building blocks:
75
62
76
-
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
77
-
2.**[Configure Egnyte Single Sign-On](#configure-egnyte-single-sign-on)** - to configure the Single Sign-On settings on application side.
78
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
79
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
80
-
5.**[Create Egnyte test user](#create-egnyte-test-user)** - to have a counterpart of Britta Simon in Egnyte that is linked to the Azure AD representation of user.
81
-
6.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
63
+
To configure and test Azure AD SSO with Egnyte, complete the following building blocks:
82
64
83
-
### Configure Azure AD single sign-on
65
+
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68
+
1.**[Configure Egnyte SSO](#configure-egnyte-sso)** - to configure the single sign-on settings on application side.
69
+
1.**[Create Egnyte test user](#create-egnyte-test-user)** - to have a counterpart of B.Simon in Egnyte that is linked to the Azure AD representation of user.
70
+
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
71
+
72
+
### Configure Azure AD SSO
84
73
85
74
In this section, you enable Azure AD single sign-on in the Azure portal.
86
75
@@ -122,42 +111,6 @@ To configure Azure AD single sign-on with Egnyte, perform the following steps:
122
111
123
112
c. Logout URL
124
113
125
-
### Configure Egnyte Single Sign-On
126
-
127
-
1. In a different web browser window, log in to your Egnyte company site as an administrator.
5. In the **Single Sign-On Authentication** section, perform the following steps:
142
-
143
-

144
-
145
-
a. As **Single sign-on authentication**, select **SAML 2.0**.
146
-
147
-
b. As **Identity provider**, select **AzureAD**.
148
-
149
-
c. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
150
-
151
-
d. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
152
-
153
-
e. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
154
-
155
-
f. As **Default user mapping**, select **Email address**.
156
-
157
-
g. As **Use domain-specific issuer value**, select **disabled**.
158
-
159
-
h. Click **Save**.
160
-
161
114
### Create an Azure AD test user
162
115
163
116
The objective of this section is to create a test user in the Azure portal called Britta Simon.
@@ -209,13 +162,49 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
209
162
210
163
7. In the **Add Assignment** dialog click the **Assign** button.
211
164
165
+
## Configure Egnyte SSO
166
+
167
+
1. In a different web browser window, sign in to your Egnyte company site as an administrator.
5. In the **Single Sign-On Authentication** section, perform the following steps:
182
+
183
+

184
+
185
+
a. As **Single sign-on authentication**, select **SAML 2.0**.
186
+
187
+
b. As **Identity provider**, select **AzureAD**.
188
+
189
+
c. Paste **Login URL** copied from Azure portal into the **Identity provider login URL** textbox.
190
+
191
+
d. Paste **Azure AD Identifier** which you have copied from Azure portal into the **Identity provider entity ID** textbox.
192
+
193
+
e. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **Identity provider certificate** textbox.
194
+
195
+
f. As **Default user mapping**, select **Email address**.
196
+
197
+
g. As **Use domain-specific issuer value**, select **disabled**.
198
+
199
+
h. Click **Save**.
200
+
212
201
### Create Egnyte test user
213
202
214
-
To enable Azure AD users to log in to Egnyte, they must be provisioned into Egnyte. In the case of Egnyte, provisioning is a manual task.
203
+
To enable Azure AD users to sign in to Egnyte, they must be provisioned into Egnyte. In the case of Egnyte, provisioning is a manual task.
215
204
216
205
**To provision a user accounts, perform the following steps:**
217
206
218
-
1.Log in to your **Egnyte** company site as administrator.
207
+
1.Sign in to your **Egnyte** company site as administrator.
219
208
220
209
2. Go to **Settings \> Users & Groups**.
221
210
@@ -243,7 +232,7 @@ To enable Azure AD users to log in to Egnyte, they must be provisioned into Egny
243
232
>You can use any other Egnyte user account creation tools or APIs provided by Egnyte to provision Azure AD user accounts.
244
233
>
245
234
246
-
### Test single sign-on
235
+
### Test SSO
247
236
248
237
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
249
238
@@ -257,3 +246,4 @@ When you click the Egnyte tile in the Access Panel, you should be automatically
257
246
258
247
-[What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
259
248
249
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
@@ -43,7 +43,7 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
43
43
* GitHub supports **SP** initiated SSO
44
44
45
45
* GitHub supports [**Automated** user provisioning](github-provisioning-tutorial.md)
46
-
* Once you configure the GitHub you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46
+
* Once you configure GitHub you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
47
47
48
48
## Adding GitHub from the gallery
49
49
@@ -219,6 +219,4 @@ When you click the GitHub tile in the Access Panel, you should be automatically
219
219
220
220
-[Try GitHub with Azure AD](https://aad.portal.azure.com/)
221
221
222
-
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
223
-
224
-
-[How to protect GitHub with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
222
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/linkedinlearning-tutorial.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
12
12
ms.subservice: saas-app-tutorial
13
13
ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
-
ms.devlang: na
16
15
ms.topic: tutorial
17
-
ms.date: 08/29/2019
16
+
ms.date: 01/31/2020
18
17
ms.author: jeedes
19
18
20
19
ms.collection: M365-identity-device-management
@@ -43,6 +42,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
43
42
44
43
* LinkedIn Learning supports **SP and IDP** initiated SSO
45
44
* LinkedIn Learning supports **Just In Time** user provisioning
45
+
* Once you configure LinkedIn Learning you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
46
46
47
47
## Adding LinkedIn Learning from the gallery
48
48
@@ -178,3 +178,4 @@ When you click the LinkedIn Learning tile in the Access Panel, you should be aut
178
178
179
179
-[Try LinkedIn Learning with Azure AD](https://aad.portal.azure.com/)
180
180
181
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments