Skip to content

Commit 30fd9e2

Browse files
authored
Merge pull request #234252 from MicrosoftDocs/main
4/12/2023 AM Publish
2 parents fae77a1 + da6f8d8 commit 30fd9e2

File tree

61 files changed

+1059
-620
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1059
-620
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: "Quickstart: Add sign in to a React SPA"
3+
description: Learn how to run a sample React SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 04/12/2023
14+
---
15+
16+
# Portal quickstart for React SPA
17+
18+
> [!div renderon="portal" class="sxs-lookup"]
19+
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
20+
>
21+
> ## Prerequisites
22+
>
23+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
24+
> * [Node.js](https://nodejs.org/en/download/)
25+
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
26+
>
27+
> ## Download the code
28+
>
29+
> > [!div class="nextstepaction"]
30+
> > [Download the code sample](https://github.com/Azure-Samples/ms-identity-ciam-javascript-tutorial/archive/react-quickstart.zip)
31+
>
32+
> ## Run the sample
33+
>
34+
> 1. Unzip the downloaded file.
35+
>
36+
> 1. Locate the folder that contains the `package.json` file in your terminal, then run the following command:
37+
>
38+
> ```console
39+
> npm install && npm start
40+
> ```
41+
>
42+
> 1. Open your browser and visit `http://locahost:3000`.
43+
>
44+
> 1. Select the **Sign-in** link on the navigation bar.
45+
>

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ The following details relate to the `lastSignInDateTime` property.
5757

5858
- To read the property, you need to grant the app the following Microsoft Graph permissions:
5959
- AuditLog.Read.All
60-
- Directory.Read.All
6160
- User.Read.All
6261

6362
- Each interactive sign-in that was successful results in an update of the underlying data store. Typically, successful sign-ins show up in the related sign-in report within 10 minutes.

articles/active-directory/saas-apps/alinto-protect-provisioning-tutorial.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Configure Alinto Protect for automatic user provisioning with Azure Active Directory'
3-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Alinto Protect.
2+
title: 'Tutorial: Configure Cleanmail for automatic user provisioning with Azure Active Directory'
3+
description: Learn how to automatically provision and deprovision user accounts from Azure AD to Cleanmail.
44
services: active-directory
55
author: twimmers
66
writer: twimmers
@@ -14,61 +14,61 @@ ms.date: 11/21/2022
1414
ms.author: thwimmer
1515
---
1616

17-
# Tutorial: Configure Alinto Protect for automatic user provisioning
17+
# Tutorial: Configure Cleanmail for automatic user provisioning
1818

19-
This tutorial describes the steps you need to do in both Alinto Protect and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Alinto Protect](https://www.alinto.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19+
This tutorial describes the steps you need to do in both Cleanmail and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and deprovisions users and groups to [Cleanmail](https://www.alinto.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2020

2121

2222
## Capabilities supported
2323
> [!div class="checklist"]
24-
> * Create users in Alinto Protect
25-
> * Remove users in Alinto Protect when they do not require access anymore
26-
> * Keep user attributes synchronized between Azure AD and Alinto Protect
27-
> * [Single sign-on](../manage-apps/add-application-portal-setup-oidc-sso.md) to Alinto Protect (recommended).
24+
> * Create users in Cleanmail
25+
> * Remove users in Cleanmail when they do not require access anymore
26+
> * Keep user attributes synchronized between Azure AD and Cleanmail
27+
> * [Single sign-on](../manage-apps/add-application-portal-setup-oidc-sso.md) to Cleanmail (recommended).
2828
2929
## Prerequisites
3030

3131
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
3232

3333
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
3434
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35-
* A user account in Alinto Protect with Admin permission
35+
* A user account in Cleanmail with Admin permission
3636

3737
## Step 1. Plan your provisioning deployment
3838
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
3939
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40-
1. Determine what data to [map between Azure AD and Alinto Protect](../app-provisioning/customize-application-attributes.md).
40+
1. Determine what data to [map between Azure AD and Cleanmail](../app-provisioning/customize-application-attributes.md).
4141

42-
## Step 2. Configure Alinto Protect to support provisioning with Azure AD
42+
## Step 2. Configure Cleanmail to support provisioning with Azure AD
4343

44-
Contact [Alinto Protect Support](https://www.alinto.com/contact-email-provider/) to configure Alinto to support provisioning with Azure AD.
44+
Contact [Cleanmail Support](https://www.alinto.com/contact-email-provider/) to configure Alinto to support provisioning with Azure AD.
4545

46-
## Step 3. Add Alinto Protect from the Azure AD application gallery
46+
## Step 3. Add Cleanmail from the Azure AD application gallery
4747

48-
Add Alinto Protect from the Azure AD application gallery to start managing provisioning to Alinto Protect. If you have previously setup Alinto Protect for SSO, you can use the same application. However it's recommended you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
48+
Add Cleanmail from the Azure AD application gallery to start managing provisioning to Cleanmail. If you have previously setup Cleanmail for SSO, you can use the same application. However it's recommended you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
4949

5050
## Step 4. Define who will be in scope for provisioning
5151

5252
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user and group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
5353

5454
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
5555

56-
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
56+
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
5757

5858

59-
## Step 5. Configure automatic user provisioning to Alinto Protect
59+
## Step 5. Configure automatic user provisioning to Cleanmail
6060

61-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and groups in Alinto Protect based on user and group assignments in Azure AD.
61+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and groups in Cleanmail based on user and group assignments in Azure AD.
6262

63-
### To configure automatic user provisioning for Alinto Protect in Azure AD:
63+
### To configure automatic user provisioning for Cleanmail in Azure AD:
6464

6565
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
6666

6767
![Enterprise applications blade](common/enterprise-applications.png)
6868

69-
1. In the applications list, select **Alinto Protect**.
69+
1. In the applications list, select **Cleanmail**.
7070

71-
![The Alinto Protect link in the Applications list](common/all-applications.png)
71+
![The Cleanmail link in the Applications list](common/all-applications.png)
7272

7373
1. Select the **Provisioning** tab.
7474

@@ -78,7 +78,7 @@ This section guides you through the steps to configure the Azure AD provisioning
7878

7979
![Provisioning tab automatic](common/provisioning-automatic.png)
8080

81-
1. In the **Admin Credentials** section, input your Alinto Protect Tenant URL as `https://cloud.cleanmail.eu/api/v3/scim2` and corresponding Secret Token obtained from Step 2. Click **Test Connection** to ensure Azure AD can connect to Alinto Protect. If the connection fails, ensure your Alinto Protect account has Admin permissions and try again.
81+
1. In the **Admin Credentials** section, input your Cleanmail Tenant URL as `https://cloud.cleanmail.eu/api/v3/scim2` and corresponding Secret Token obtained from Step 2. Click **Test Connection** to ensure Azure AD can connect to Cleanmail. If the connection fails, ensure your Cleanmail account has Admin permissions and try again.
8282

8383
![Token](common/provisioning-testconnection-tenanturltoken.png)
8484

@@ -88,11 +88,11 @@ This section guides you through the steps to configure the Azure AD provisioning
8888

8989
1. Select **Save**.
9090

91-
1. In the **Mappings** section, select **Synchronize Azure Active Directory Users to Alinto Protect**.
91+
1. In the **Mappings** section, select **Synchronize Azure Active Directory Users to Cleanmail**.
9292

93-
1. Review the user attributes that are synchronized from Azure AD to Alinto Protect in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Alinto Protect for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the Alinto Protect API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
93+
1. Review the user attributes that are synchronized from Azure AD to Cleanmail in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Cleanmail for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you need to ensure that the Cleanmail API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9494

95-
|Attribute|Type|Supported for filtering|Required by Alinto Protect|
95+
|Attribute|Type|Supported for filtering|Required by Cleanmail|
9696
|---|---|---|---|
9797
|userName|String|✓|✓
9898
|active|Boolean||✓
@@ -102,11 +102,11 @@ This section guides you through the steps to configure the Azure AD provisioning
102102

103103
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
104104

105-
1. To enable the Azure AD provisioning service for Alinto Protect, change the **Provisioning Status** to **On** in the **Settings** section.
105+
1. To enable the Azure AD provisioning service for Cleanmail, change the **Provisioning Status** to **On** in the **Settings** section.
106106

107107
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
108108

109-
1. Define the users and groups that you would like to provision to Alinto Protect by choosing the desired values in **Scope** in the **Settings** section.
109+
1. Define the users and groups that you would like to provision to Cleanmail by choosing the desired values in **Scope** in the **Settings** section.
110110

111111
![Provisioning Scope](common/provisioning-scope.png)
112112

@@ -121,7 +121,7 @@ Once you've configured provisioning, use the following resources to monitor your
121121

122122
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
123123
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
124-
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
124+
* If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
125125

126126
## More resources
127127

articles/active-directory/saas-apps/cisco-anyconnect.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -72,14 +72,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
![Edit Basic SAML Configuration](common/edit-urls.png)
7474

75-
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields (note that the values are case-sensitive):
75+
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
7676

7777
1. In the **Identifier** text box, type a URL using the following pattern:
7878
`https://<SUBDOMAIN>.YourCiscoServer.com/saml/sp/metadata/<Tunnel_Group_Name>`
7979

8080
1. In the **Reply URL** text box, type a URL using the following pattern:
8181
`https://<YOUR_CISCO_ANYCONNECT_FQDN>/+CSCOE+/saml/sp/acs?tgname=<Tunnel_Group_Name>`
8282

83+
> [!NOTE]
84+
> `<Tunnel_Group_Name>` is a case-sensitive and the value must not contain dots "." and slashes "/".
85+
8386
> [!NOTE]
8487
> For clarification about these values, contact Cisco TAC support. Update these values with the actual Identifier and Reply URL provided by Cisco TAC. Contact the [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8588

0 commit comments

Comments
 (0)