You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn how to integrate Datawiza with Azure AD. See how to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
2
+
title: Tutorial to configure Secure Hybrid Access with Azure Active Directory and Datawiza
3
+
description: Learn to use Datawiza and Azure AD to authenticate users and give them access to on-premises and cloud apps.
4
4
services: active-directory
5
5
author: gargi-sinha
6
6
manager: martinco
7
7
ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 05/19/2022
11
+
ms.date: 01/23/2023
12
12
ms.author: gasinh
13
13
ms.collection: M365-identity-device-management
14
14
ms.custom: kr2b-contr-experiment
15
15
---
16
16
17
17
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Datawiza
18
18
19
-
Datawiza's [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker) extends Azure AD to enable single sign-on (SSO) and provide granular access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP. By using this solution, enterprises can quickly transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can also use Datawiza as a no-code or low-code solution to integrate new applications to Azure AD. This approach enables enterprises to implement their Zero Trust strategy while saving engineering time and reducing costs.
19
+
In this tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md). [Datawiza Access Proxy (DAP)](https://www.datawiza.com) extends Azure AD to enable single sign-on (SSO) and provide access controls to protect on-premises and cloud-hosted applications, such as Oracle E-Business Suite, Microsoft IIS, and SAP. With this solution, enterprises can transition from legacy web access managers (WAMs), such as Symantec SiteMinder, NetIQ, Oracle, and IBM, to Azure AD without rewriting applications. Enterprises can use Datawiza as a no-code, or low-code, solution to integrate new applications to Azure AD. This approach enables enterprises to implement their Zero Trust strategy while saving engineering time and reducing costs.
20
20
21
-
In this tutorial, learn how to integrate Azure Active Directory (Azure AD) with [Datawiza](https://www.datawiza.com/) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md).
## Datawiza with Azure AD Authentication Architecture
24
24
25
25
Datawiza integration includes the following components:
26
26
27
-
-[Azure AD](../fundamentals/active-directory-whatis.md) - A cloud-based identity and access management service from Microsoft. Azure AD helps users sign in and access external and internal resources.
27
+
***[Azure AD](../fundamentals/active-directory-whatis.md)** - Identity and access management service that helps users sign in and access external and internal resources
28
+
***Datawiza Access Proxy (DAP)** - This service transparently passes identity information to applications through HTTP headers
29
+
***Datawiza Cloud Management Console (DCMC)** - UI and RESTful APIs for administrators to manage the DAP configuration and access control policies
28
30
29
-
- Datawiza Access Broker (DAB) - The service that users sign on to. DAB transparently passes identity information to applications through HTTP headers.
31
+
The following diagram illustrates the authentication architecture with Datawiza in a hybrid environment.
30
32
31
-
- Datawiza Cloud Management Console (DCMC) - A centralized management console that manages DAB. DCMC provides UI and RESTful APIs for administrators to manage the DAB configuration and access control policies.
33
+

32
34
33
-
The following diagram describes the authentication architecture orchestrated by Datawiza in a hybrid environment.
34
-
35
-

36
-
37
-
|Step| Description|
38
-
|:----------|:-----------|
39
-
| 1. | The user makes a request to access the on-premises or cloud-hosted application. DAB proxies the request made by the user to the application.|
40
-
| 2. | DAB checks the user's authentication state. If it doesn't receive a session token, or the supplied session token is invalid, it sends the user to Azure AD for authentication.|
41
-
| 3. | Azure AD sends the user request to the endpoint specified during the DAB application's registration in the Azure AD tenant.|
42
-
| 4. | DAB evaluates access policies and calculates attribute values to be included in HTTP headers forwarded to the application. During this step, DAB may call out to the identity provider to retrieve the information needed to set the header values correctly. DAB sets the header values and sends the request to the application. |
43
-
| 5. | The user is authenticated and has access to the application.|
35
+
1. The user requests access to the on-premises or cloud-hosted application. DAP proxies the request to the application.
36
+
2. DAP checks user authentication state. If there's no session token, or the session token is invalid, DAP sends the user request to Azure AD for authentication.
37
+
3. Azure AD sends the user request to the endpoint specified during DAP registration in the Azure AD tenant.
38
+
4. DAP evaluates policies and attribute values to be included in HTTP headers forwarded to the application. DAP might call out to the identity provider to retrieve the information to set the header values correctly. DAP sets the header values and sends the request to the application.
39
+
5. The user is authenticated and is granted access.
44
40
45
41
## Prerequisites
46
42
47
43
To get started, you need:
48
44
49
-
- An Azure subscription. If you don\'t have a subscription, you can get a [trial account](https://azure.microsoft.com/free/).
50
-
51
-
- An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md)
52
-
that's linked to your Azure subscription.
53
-
54
-
-[Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/), which are required to run DAB. Your applications can run on any platform, such as a virtual machine and bare metal.
55
-
56
-
- An on-premises or cloud-hosted application that you'll transition from a legacy identity system to Azure AD. In this example, DAB is deployed on the same server as the application. The application runs on localhost: 3001, and DAB proxies traffic to the application via localhost: 9772. The traffic to the application reaches DAB first and is then proxied to the application.
45
+
* An Azure subscription
46
+
* If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
47
+
* An [Azure AD tenant](../fundamentals/active-directory-access-create-new-tenant.md) linked to the Azure subscription
48
+
*[Docker](https://docs.docker.com/get-docker/) and [docker-compose](https://docs.docker.com/compose/install/) are required to run DAP
49
+
* Your applications can run on platforms, such as a virtual machine (VM) or bare metal
50
+
* An on-premises or cloud-hosted application to transition from a legacy identity system to Azure AD
51
+
* In this example, DAP is deployed on the same server as the application
52
+
* The application runs on localhost: 3001. DAP proxies traffic to the application via localhost: 9772
53
+
* The traffic to the application reaches DAP, and is proxied to the application
57
54
58
55
## Configure Datawiza Cloud Management Console
59
56
60
57
1. Sign in to [Datawiza Cloud Management Console](https://console.datawiza.com/) (DCMC).
58
+
2. Create an application on DCMC and generate a key pair for the app: `PROVISIONING_KEY` and `PROVISIONING_SECRET`.
59
+
3. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
60
+
4. Register your application in Azure AD with [One Click Integration With Azure AD](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html).
61
61
62
-
2. Create an application on DCMC and generate a key pair for the app. The key pair consists of a `PROVISIONING_KEY` and `PROVISIONING_SECRET`. To create the app and generate the key pair, follow the instructions in [Datawiza Cloud Management Console](https://docs.datawiza.com/step-by-step/step2.html).
62
+

63
63
64
-
3. Register your application in Azure AD by using Datawiza's convenient [one-click integration](https://docs.datawiza.com/tutorial/web-app-azure-one-click.html).
64
+
5. To use a web application, manually populate form fields: **Tenant ID**, **Client ID**, and **Client Secret**.
65
65
66
-

66
+
Learn more: To create a web application and obtain values, go to docs.datawiza.com for [Microsoft Azure AD](https://docs.datawiza.com/idp/azure.html) documentation.
67
67
68
-
To use an existing web application, you can manually populate the fields of the form. You'll need the tenant ID, client ID, and client secret. For more information about creating a web application and getting these values, see [Microsoft Azure AD in the Datawiza documentation](https://docs.datawiza.com/idp/azure.html).
68
+

69
69
70
-

70
+
6. Run DAP using either Docker or Kubernetes. The docker image is needed to create a sample header-based application.
71
71
72
-
4. Run DAB using either Docker or Kubernetes. The docker image is needed to create a sample header-based application.
73
-
74
-
- For Docker-specific instructions, see [Deploy Datawiza Access Broker With Your App](https://docs.datawiza.com/step-by-step/step3.html).
75
-
- For Kubernetes-specific instructions, see [Deploy Datawiza Access Broker with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html).
76
-
77
-
You can use the following sample docker image docker-compose.yml file:
72
+
- For Kubernetes, see [Deploy Datawiza Access Proxy with a Web App using Kubernetes](https://docs.datawiza.com/tutorial/web-app-AKS.html)
73
+
- For Docker, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
74
+
- You can use the following sample docker image docker-compose.yml file:
78
75
79
76
```yaml
80
77
services:
@@ -95,36 +92,29 @@ To use an existing web application, you can manually populate the fields of the
95
92
- "3001:3001"
96
93
```
97
94
98
-
5. Sign in to the container registry and download the images of DAB and the header-based application by following the instructions in this [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
99
-
100
-
6. Run the following command:
101
-
102
-
`docker-compose -f docker-compose.yml up`
95
+
7. Sign in to the container registry.
96
+
8. Download the DAP images and the header-based application in this [Important Step](https://docs.datawiza.com/step-by-step/step3.html#important-step).
97
+
9. Run the following command: `docker-compose -f docker-compose.yml up`.
98
+
10. The header-based application has SSO enabled with Azure AD.
99
+
11. In a browser, go to `http://localhost:9772/`.
100
+
12. An Azure AD sign-in page appears.
101
+
13. Pass user attributes to the header-based application. DAP gets user attributes from Azure AD and passes attributes to the application via a header or cookie.
102
+
14. To pass user attributes such as email address, first name, and last name to the header-based application, see [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
103
+
15. To confirm configured user attributes, observe a green check mark next to each attribute.
103
104
104
-
The header-based application should now have SSO enabled with Azure AD.
105
-
106
-
7. In a browser, go to `http://localhost:9772/`. An Azure AD sign-in page appears.
107
-
108
-
8. Pass user attributes to the header-based application. DAB gets user attributes from Azure AD and can pass these attributes to the application via a header or cookie. To pass user attributes such as an email address, a first name, and a last name to the header-based application, follow the instructions in [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html).
109
-
110
-
9. Confirm you have successfully configured user attributes by observing a green check mark next to each attribute.
111
-
112
-

105
+

113
106
114
107
## Test the flow
115
108
116
-
1. Go to the application URL. DAB should redirect you to the Azure AD sign-in page.
117
-
118
-
2. After successfully authenticating, you should be redirected to DAB.
119
-
120
-
DAB evaluates policies, calculates headers, and sends you to the upstream application. Your requested application should appear.
109
+
1. Go to the application URL.
110
+
2. DAP redirects you to the Azure AD sign-in page.
111
+
3. After authentication, you're redirected to DAP.
112
+
4. DAP evaluates policies, calculates headers, and sends you to the application.
113
+
5. The requested application appears.
121
114
122
115
## Next steps
123
116
124
-
- [Configure Datawiza with Azure AD B2C](../../active-directory-b2c/partner-datawiza.md)
125
-
126
-
- [Configure Azure AD Multi-Factor Authentication and SSO for Oracle JDE applications using DAB](datawiza-azure-ad-sso-oracle-jde.md)
127
-
128
-
- [Configure Azure AD Multi-Factor Authentication and SSO for Oracle PeopleSoft applications using DAB](datawiza-azure-ad-sso-oracle-peoplesoft.md)
0 commit comments