Skip to content

Commit 364f788

Browse files
authored
Merge pull request #224747 from v-edmckillop/patch-92
Update datawiza-with-azure-ad.md
2 parents fa2e31c + 978f105 commit 364f788

File tree

1 file changed

+54
-64
lines changed

1 file changed

+54
-64
lines changed
Lines changed: 54 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,77 @@
11
---
2-
title: Secure hybrid access with Datawiza
3-
description: Learn how to integrate Datawiza with Azure AD. See how to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
2+
title: Tutorial to configure Secure Hybrid Access with Azure Active Directory and Datawiza
3+
description: Learn to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
44
services: active-directory
55
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 05/19/2022
11+
ms.date: 01/23/2023
1212
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
ms.custom: kr2b-contr-experiment
1515
---
1616

1717
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Datawiza
1818

19-
Datawiza's [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable single sign-on (SSO) and provide granular access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP. By using this solution, enterprises can quickly transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This approach enables enterprises to implement their Zero Trust strategy while saving engineering time and reducing costs.
19+
In this tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md). [Datawiza Access Proxy (DAP)](https://www.datawiza.com) extends Azure AD to enable single sign-on (SSO) and provide access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP. With this solution, enterprises can transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can use Datawiza as a no-code, or low-code, solution to integrate new applications to Azure AD. This approach enables enterprises to implement their Zero Trust strategy while saving engineering time and reducing costs.
2020

21-
In this tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md).
21+
Learn more: [Zero Trust security](../../security/fundamentals/zero-trust.md)
2222

2323
## Datawiza with Azure AD Authentication Architecture
2424

2525
Datawiza integration includes the following components:
2626

27-
- [Azure AD](../fundamentals/active-directory-whatis.md) - A cloud-based identity and access management service from Microsoft. Azure AD helps users sign in and access external and internal resources.
27+
* **[Azure AD](../fundamentals/active-directory-whatis.md)** - Identity and access management service that helps users sign in and access external and internal resources
28+
* **Datawiza Access Proxy (DAP)** - This service transparently passes identity information to applications through HTTP headers
29+
* **Datawiza Cloud Management Console (DCMC)** - UI and RESTful APIs for administrators to manage the DAP configuration and access control policies
2830

29-
- Datawiza Access Broker (DAB) - The service that users sign on to. DAB transparently passes identity information to applications through HTTP headers.
31+
The following diagram illustrates the authentication architecture with Datawiza in a hybrid environment.
3032

31-
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the DAB configuration and access control policies.
33+
![Architecture diagram of the authentication process for user access to an on-premises application.](./media/datawiza-with-azure-active-directory/datawiza-architecture-diagram.png)
3234

33-
The following diagram describes the authentication architecture orchestrated by Datawiza in a hybrid environment.
34-
35-
![Architecture diagram that shows the authentication process that gives a user access to an on-premises application.](./media/datawiza-with-azure-active-directory/datawiza-architecture-diagram.png)
36-
37-
|Step| Description|
38-
|:----------|:-----------|
39-
| 1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
40-
| 2. | DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, it sends the user to Azure AD for authentication.|
41-
| 3. | Azure AD sends the user request to the endpoint specified during the DAB application's registration in the Azure AD tenant.|
42-
| 4. | DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, DAB may call out to the identity provider to retrieve the information needed to set the header values correctly. DAB sets the header values and sends the request to the application. |
43-
| 5. | The user is authenticated and has access to the application.|
35+
1. The user requests access to the on-premises or cloud-hosted application. DAP proxies the request to the application.
36+
2. DAP checks user authentication state. If there's no session token, or the session token is invalid, DAP sends the user request to Azure AD for authentication.
37+
3. Azure AD sends the user request to the endpoint specified during DAP registration in the Azure AD tenant.
38+
4. DAP evaluates policies and attribute values to be included in HTTP headers forwarded to the application. DAP might call out to the identity provider to retrieve the information to set the header values correctly. DAP sets the header values and sends the request to the application.
39+
5. The user is authenticated and is granted access.
4440

4541
## Prerequisites
4642

4743
To get started, you need:
4844

49-
- An Azure subscription. If you don\'t have a subscription, you can get a [trial account](https://azure.microsoft.com/free/).
50-
51-
- An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md)
52-
that's linked to your Azure subscription.
53-
54-
- [Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/), which are required to run DAB. Your applications can run on any platform, such as a virtual machine and bare metal.
55-
56-
- An on-premises or cloud-hosted application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server as the application. The application runs on localhost: 3001, and DAB proxies traffic to the application via localhost: 9772. The traffic to the application reaches DAB first and is then proxied to the application.
45+
* An Azure subscription
46+
* If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
47+
* An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md) linked to the Azure subscription
48+
* [Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/) are required to run DAP
49+
* Your applications can run on platforms, such as a virtual machine (VM) or bare metal
50+
* An on-premises or cloud-hosted application to transition from a legacy identity system to Azure AD
51+
* In this example, DAP is deployed on the same server as the application
52+
* The application runs on localhost: 3001. DAP proxies traffic to the application via localhost: 9772
53+
* The traffic to the application reaches DAP, and is proxied to the application
5754

5855
## Configure Datawiza Cloud Management Console
5956

6057
1. Sign in to [Datawiza Cloud Management Console](https://console.datawiza.com/) (DCMC).
58+
2. Create an application on DCMC and generate a key pair for the app: `PROVISIONING_KEY` and `PROVISIONING_SECRET`.
59+
3. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
60+
4. Register your application in Azure AD with [One Click Integration With Azure AD](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html).
6161

62-
2. Create an application on DCMC and generate a key pair for the app. The key pair consists of a `PROVISIONING_KEY` and `PROVISIONING_SECRET`. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
62+
![Screenshot of the Automatic Generator feature on the Configure IdP dialog.](./media/datawiza-with-azure-active-directory/configure-idp.png)
6363

64-
3. Register your application in Azure AD by using Datawiza's convenient [one-click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html).
64+
5. To use a web application, manually populate form fields: **Tenant ID**, **Client ID**, and **Client Secret**.
6565

66-
![Screenshot of the Datawiza Configure I D P page. Boxes for name, protocol, and other values are visible. An automatic generator option is turned on.](./media/datawiza-with-azure-active-directory/configure-idp.png)
66+
Learn more: To create a web application and obtain values, go to docs.datawiza.com for [Microsoft Azure AD](https://docs.datawiza.com/idp/azure.html) documentation.
6767

68-
To use an existing web application, you can manually populate the fields of the form. You'll need the tenant ID, client ID, and client secret. For more information about creating a web application and getting these values, see [Microsoft Azure AD in the Datawiza documentation](https://docs.datawiza.com/idp/azure.html).
68+
![Screenshot of the Configure IdP dialog with the Automatic Generator turned off.](./media/datawiza-with-azure-active-directory/use-form.png)
6969

70-
![Screenshot of the Datawiza Configure I D P page. Boxes for name, protocol, and other values are visible. An automatic generator option is turned off.](./media/datawiza-with-azure-active-directory/use-form.png)
70+
6. Run DAP using either Docker or Kubernetes. The docker image is needed to create a sample header-based application.
7171

72-
4. Run DAB using either Docker or Kubernetes. The docker image is needed to create a sample header-based application.
73-
74-
- For Docker-specific instructions, see [Deploy Datawiza Access Broker With Your App](https://docs.datawiza.com/step-by-step/step3.html).
75-
- For Kubernetes-specific instructions, see [Deploy Datawiza Access Broker with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html).
76-
77-
You can use the following sample docker image docker-compose.yml file:
72+
- For Kubernetes, see [Deploy Datawiza Access Proxy with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html)
73+
- For Docker, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
74+
- You can use the following sample docker image docker-compose.yml file:
7875

7976
```yaml
8077
services:
@@ -95,36 +92,29 @@ To use an existing web application, you can manually populate the fields of the
9592
- "3001:3001"
9693
```
9794
98-
5. Sign in to the container registry and download the images of DAB and the header-based application by following the instructions in this [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
99-
100-
6. Run the following command:
101-
102-
`docker-compose -f docker-compose.yml up`
95+
7. Sign in to the container registry.
96+
8. Download the DAP images and the header-based application in this [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
97+
9. Run the following command: `docker-compose -f docker-compose.yml up`.
98+
10. The header-based application has SSO enabled with Azure AD.
99+
11. In a browser, go to `http://localhost:9772/`.
100+
12. An Azure AD sign-in page appears.
101+
13. Pass user attributes to the header-based application. DAP gets user attributes from Azure AD and passes attributes to the application via a header or cookie.
102+
14. To pass user attributes such as email address, first name, and last name to the header-based application, see [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
103+
15. To confirm configured user attributes, observe a green check mark next to each attribute.
103104

104-
The header-based application should now have SSO enabled with Azure AD.
105-
106-
7. In a browser, go to `http://localhost:9772/`. An Azure AD sign-in page appears.
107-
108-
8. Pass user attributes to the header-based application. DAB gets user attributes from Azure AD and can pass these attributes to the application via a header or cookie. To pass user attributes such as an email address, a first name, and a last name to the header-based application, follow the instructions in [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
109-
110-
9. Confirm you have successfully configured user attributes by observing a green check mark next to each attribute.
111-
112-
![Screenshot that shows the Datawiza application home page. Green check marks are visible next to the host, email, firstname, and lastname attributes.](./media/datawiza-with-azure-active-directory/datawiza-application-home-page.png)
105+
![Screenshot of the home page with host, email, firstname, and lastname attributes.](./media/datawiza-with-azure-active-directory/datawiza-application-home-page.png)
113106

114107
## Test the flow
115108

116-
1. Go to the application URL. DAB should redirect you to the Azure AD sign-in page.
117-
118-
2. After successfully authenticating, you should be redirected to DAB.
119-
120-
DAB evaluates policies, calculates headers, and sends you to the upstream application. Your requested application should appear.
109+
1. Go to the application URL.
110+
2. DAP redirects you to the Azure AD sign-in page.
111+
3. After authentication, you're redirected to DAP.
112+
4. DAP evaluates policies, calculates headers, and sends you to the application.
113+
5. The requested application appears.
121114

122115
## Next steps
123116

124-
- [Configure Datawiza with Azure AD B2C](../../active-directory-b2c/partner-datawiza.md)
125-
126-
- [Configure Azure AD Multi-Factor Authentication and SSO for Oracle JDE applications using DAB](datawiza-azure-ad-sso-oracle-jde.md)
127-
128-
- [Configure Azure AD Multi-Factor Authentication and SSO for Oracle PeopleSoft applications using DAB](datawiza-azure-ad-sso-oracle-peoplesoft.md)
129-
130-
- [Datawiza documentation](https://docs.datawiza.com)
117+
* [Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access](../../active-directory-b2c/partner-datawiza.md)
118+
* [Tutorial: Configure Datawiza to enable Azure AD MFA and SSO to Oracle JD Edwards](datawiza-azure-ad-sso-oracle-jde.md)
119+
* [Tutorial: Configure Datawiza to enable Azure AD MFA and SSO to Oracle PeopleSoft](datawiza-azure-ad-sso-oracle-peoplesoft.md)
120+
* Go to docs.datawiza.com for Datawiza [User Guides](https://docs.datawiza.com)

0 commit comments

Comments
 (0)