Skip to content

Commit 3496dd7

Browse files
authored
Merge pull request #186606 from bhavana-129/gov-cloud-10
SaaS App Tutorial: Note for Gov Cloud Apps
2 parents 7474df0 + fd99fac commit 3496dd7

File tree

16 files changed

+74
-58
lines changed

16 files changed

+74
-58
lines changed

articles/active-directory/saas-apps/kronos-workforce-dimensions-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Kronos Workforce Dimensions | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Kronos Workforce Dimensions'
33
description: Learn how to configure single sign-on between Azure Active Directory and Kronos Workforce Dimensions.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/19/2021
12+
ms.date: 01/27/2021
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Kronos Workforce Dimensions
17+
# Tutorial: Azure AD SSO integration with Kronos Workforce Dimensions
1818

1919
In this tutorial, you'll learn how to integrate Kronos Workforce Dimensions with Azure Active Directory (Azure AD). When you integrate Kronos Workforce Dimensions with Azure AD, you can:
2020

@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Kronos Workforce Dimensions single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.
@@ -132,4 +135,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
132135

133136
## Next steps
134137

135-
Once you configure Kronos Workforce Dimensions you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
138+
Once you configure Kronos Workforce Dimensions you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/lucid-tutorial.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Lucid (All Products) | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Lucid (All Products)'
33
description: Learn how to configure single sign-on between Azure Active Directory and Lucid (All Products).
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/04/2020
12+
ms.date: 01/27/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Lucid (All Products)
17+
# Tutorial: Azure AD SSO integration with Lucid (All Products)
1818

1919
In this tutorial, you'll learn how to integrate Lucid (All Products) with Azure Active Directory (Azure AD). When you integrate Lucid (All Products) with Azure AD, you can:
2020

@@ -29,18 +29,20 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Lucid (All Products) single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.
3538

36-
* Lucid (All Products) supports **SP and IDP** initiated SSO
37-
* Lucid (All Products) supports **Just In Time** user provisioning
39+
* Lucid (All Products) supports **SP and IDP** initiated SSO.
40+
* Lucid (All Products) supports **Just In Time** user provisioning.
41+
3842
> [!NOTE]
3943
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
4044
41-
42-
43-
## Adding Lucid (All Products) from the gallery
45+
## Add Lucid (All Products) from the gallery
4446

4547
To configure the integration of Lucid (All Products) into Azure AD, you need to add Lucid (All Products) from the gallery to your list of managed SaaS apps.
4648

@@ -51,7 +53,6 @@ To configure the integration of Lucid (All Products) into Azure AD, you need to
5153
1. In the **Add from the gallery** section, type **Lucid (All Products)** in the search box.
5254
1. Select **Lucid (All Products)** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5355

54-
5556
## Configure and test Azure AD SSO for Lucid (All Products)
5657

5758
Configure and test Azure AD SSO with Lucid (All Products) using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Lucid (All Products).
@@ -71,11 +72,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7172

7273
1. In the Azure portal, on the **Lucid (All Products)** application integration page, find the **Manage** section and select **single sign-on**.
7374
1. On the **Select a single sign-on method** page, select **SAML**.
74-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
75+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7576

7677
![Edit Basic SAML Configuration](common/edit-urls.png)
7778

78-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
79+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
7980

8081
In the **Reply URL** text box, type a URL using the following pattern:
8182
`https://lucid.app/saml/sso/<TENANT_NAME>?idpHash=<HASH_ID>`
@@ -95,6 +96,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9596
1. On the **Set up Lucid (All Products)** section, copy the appropriate URL(s) based on your requirement.
9697

9798
![Copy configuration URLs](common/copy-configuration-urls.png)
99+
98100
### Create an Azure AD test user
99101

100102
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -133,17 +135,16 @@ In this section, you test your Azure AD single sign-on configuration with follow
133135

134136
#### SP initiated:
135137

136-
1. Click on **Test this application** in Azure portal. This will redirect to Lucid (All Products) Sign on URL where you can initiate the login flow.
138+
* Click on **Test this application** in Azure portal. This will redirect to the Lucid (All Products) sign-on URL where you can initiate the login flow.
137139

138-
1. Go to Lucid (All Products) Sign-on URL directly and initiate the login flow from there.
140+
* Go to Lucid (All Products) Sign-on URL directly and initiate the login flow from there.
139141

140142
#### IDP initiated:
141143

142-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Lucid (All Products) for which you set up the SSO
143-
144-
You can also use Microsoft Access Panel to test the application in any mode. When you click the Lucid (All Products) tile in the Access Panel, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Lucid (All Products) for which you set up the SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
144+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Lucid (All Products) for which you set up the SSO.
145145

146+
You can also use Microsoft My Apps to test the application in any mode. When you click the Lucid (All Products) tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Lucid (All Products) for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
146147

147148
## Next Steps
148149

149-
Once you configure Lucid (All Products) you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
150+
Once you configure Lucid (All Products) you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
12.9 KB
Loading
69.2 KB
Loading
42.1 KB
Loading
9.98 KB
Loading
14.3 KB
Loading
20.8 KB
Loading
22.7 KB
Loading
21 KB
Loading

0 commit comments

Comments
 (0)