Skip to content

Commit 3704d8a

Browse files
authored
Merge pull request #209924 from MicrosoftDocs/main
9/01 AM Publish
2 parents 9150a98 + ceaa0d0 commit 3704d8a

File tree

96 files changed

+1651
-690
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+1651
-690
lines changed

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Under the project root folder, create a *config.json* file, and then add to it t
443443
```json
444444
{
445445
"credentials": {
446-
"tenantName": "<your-tenant-name>",
446+
"tenantName": "<your-tenant-name>.onmicrosoft.com",
447447
"clientID": "<your-webapi-application-ID>",
448448
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
449449
},
@@ -470,7 +470,7 @@ In the *config.json* file, update the following properties:
470470

471471
|Section |Key |Value |
472472
|---------|---------|---------|
473-
| credentials | tenantName | The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso`).|
473+
| credentials | tenantName | Your Azure AD B2C [tenant name/domain name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
474474
| credentials |clientID | The web API application ID. In the [preceding diagram](#app-registration-overview), it's the application with *App ID: 2*. To learn how to get your web API application registration ID, see [Prerequisites](#prerequisites). |
475475
| credentials | issuer| The token issuer `iss` claim value. By default, Azure AD B2C returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
476476
| policies | policyName | The user flows, or custom policy. To learn how to get your user flow or policy, see [Prerequisites](#prerequisites).|

articles/active-directory/fundamentals/whats-new.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,22 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
3434

3535
## August 2022
3636

37+
### General Availability - Ability to force reauthentication on Intune enrollment, risky sign-ins, and risky users
38+
39+
40+
41+
**Type:** New feature
42+
**Service category:** Conditional Access
43+
**Product capability:** Identity Security & Protection
44+
45+
46+
47+
Customers can now require a fresh authentication each time a user performs a certain action. Forced reauthentication supports requiring a user to reauthenticate during Intune device enrollment, password change for risky users, and risky sign-ins.
48+
49+
For more information, see: [Configure authentication session management with Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md#require-reauthentication-every-time)
50+
51+
---
52+
3753
### General Availability - Multi-Stage Access Reviews
3854

3955
**Type:** Changed feature

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Required permissions | For permissions required to apply an update, see [Azure A
3636
## Retiring Azure AD Connect 1.x versions
3737
> [!IMPORTANT]
3838
> *As of August 31, 2022, all 1.x versions of Azure AD Connect are retired because they include SQL Server 2012 components that will no longer be supported.* Upgrade to the most recent version of Azure AD Connect (2.x version) by that date or [evaluate and switch to Azure AD cloud sync](../cloud-sync/what-is-cloud-sync.md).
39-
> AADConnect V1.x will stop working on December 31st, due to the decommisioning of the ADAL library service on that date.
39+
> AADConnect V1.x will stop working on December 31st, due to the decommissioning of the ADAL library service on that date.
4040
4141
## Retiring Azure AD Connect 2.x versions
4242
> [!IMPORTANT]

articles/active-directory/hybrid/whatis-azure-ad-connect-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Until one of the components that are being retired are actually deprecated, you
9494

9595
We expect TLS 1.0/1.1 to be deprecated in 2022, and you need to make sure you aren't using these protocols by that date as your service may stop working unexpectedly. You can manually configure your server for TLS 1.2 though, and that doesn't require an update of Azure AD Connect to V2
9696

97-
Azure AD Connect Health will stop working after December 20222. We will auto upgrade all Health agents to a new version before the end of 2022, but we cannot auto upgrade if you are running AADConnect V1 due to compatibility issues with V versions.
97+
Azure AD Connect Health will stop working after December 2022. We will auto upgrade all Health agents to a new version before the end of 2022, but we cannot auto upgrade if you are running AADConnect V1 due to compatibility issues with V versions.
9898

9999
After December 2022, ADAL is planned to go out of support. When ADAL goes out of support, authentication may stop working unexpectedly, and this will block the Azure AD Connect server from working properly. We strongly advise you to upgrade to Azure AD Connect V2 before December 2022. You can't upgrade to a supported authentication library with your current Azure AD Connect version.
100100

Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Syniverse Customer Portal'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Syniverse Customer Portal.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 08/23/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Syniverse Customer Portal
18+
19+
In this tutorial, you'll learn how to integrate Syniverse Customer Portal with Azure Active Directory (Azure AD). When you integrate Syniverse Customer Portal with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Syniverse Customer Portal.
22+
* Enable your users to be automatically signed-in to Syniverse Customer Portal with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Syniverse Customer Portal single sign-on (SSO) enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
33+
34+
## Scenario description
35+
36+
In this tutorial, you configure and test Azure AD SSO in a test environment.
37+
38+
* Syniverse Customer Portal supports **SP** and **IDP** initiated SSO.
39+
* Syniverse Customer Portal supports **Just In Time** user provisioning.
40+
41+
## Add Syniverse Customer Portal from the gallery
42+
43+
To configure the integration of Syniverse Customer Portal into Azure AD, you need to add Syniverse Customer Portal from the gallery to your list of managed SaaS apps.
44+
45+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
46+
1. On the left navigation pane, select the **Azure Active Directory** service.
47+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
48+
1. To add new application, select **New application**.
49+
1. In the **Add from the gallery** section, type **Syniverse Customer Portal** in the search box.
50+
1. Select **Syniverse Customer Portal** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
51+
52+
## Configure and test Azure AD SSO for Syniverse Customer Portal
53+
54+
Configure and test Azure AD SSO with Syniverse Customer Portal using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user at Syniverse Customer Portal.
55+
56+
To configure and test Azure AD SSO with Syniverse Customer Portal, perform the following steps:
57+
58+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
59+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61+
1. **[Configure Syniverse Customer Portal SSO](#configure-syniverse-customer-portal-sso)** - to configure the single sign-on settings on application side.
62+
1. **[Create Syniverse Customer Portal test user](#create-syniverse-customer-portal-test-user)** - to have a counterpart of B.Simon in Syniverse Customer Portal that is linked to the Azure AD representation of user.
63+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64+
65+
## Configure Azure AD SSO
66+
67+
Follow these steps to enable Azure AD SSO in the Azure portal.
68+
69+
1. In the Azure portal, on the **Syniverse Customer Portal** application integration page, find the **Manage** section and select **single sign-on**.
70+
1. On the **Select a single sign-on method** page, select **SAML**.
71+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
72+
73+
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
74+
75+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
76+
77+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
78+
79+
In the **Sign-on URL** text box, type one of the following URLs:
80+
81+
| **Sign-on URL**|
82+
|-------|
83+
| `https://symphony.dalab.syniverse.com/ups` |
84+
| `https://symphony.syniverse.com/ups` |
85+
| `https://symphony-test.dalab.syniverse.com/ups` |
86+
87+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (PEM)** and select **Download** to download the certificate and save it on your computer.
88+
89+
![Screenshot shows the Certificate download link.](common/certificate-base64-download.png "Certificate")
90+
91+
### Create an Azure AD test user
92+
93+
In this section, you'll create a test user in the Azure portal called B.Simon.
94+
95+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
96+
1. Select **New user** at the top of the screen.
97+
1. In the **User** properties, follow these steps:
98+
1. In the **Name** field, enter `B.Simon`.
99+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
100+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
101+
1. Click **Create**.
102+
103+
### Assign the Azure AD test user
104+
105+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Syniverse Customer Portal.
106+
107+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
108+
1. In the applications list, select **Syniverse Customer Portal**.
109+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
110+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
111+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
112+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113+
1. In the **Add Assignment** dialog, click the **Assign** button.
114+
115+
## Configure Syniverse Customer Portal SSO
116+
117+
To configure single sign-on on **Syniverse Customer Portal** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from Azure portal to [Syniverse Customer Portal support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
118+
119+
### Create Syniverse Customer Portal test user
120+
121+
In this section, a user called B.Simon is created in Syniverse Customer Portal. Syniverse Customer Portal supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Syniverse Customer Portal, a new one is created after authentication.
122+
123+
## Test SSO
124+
125+
In this section, you test your Azure AD single sign-on configuration with following options.
126+
127+
#### SP initiated:
128+
129+
* Click on **Test this application** in Azure portal. This will redirect to Syniverse Customer Portal Sign-on URL where you can initiate the login flow.
130+
131+
* Go to Syniverse Customer Portal Sign-on URL directly and initiate the login flow from there.
132+
133+
#### IDP initiated:
134+
135+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Syniverse Customer Portal for which you set up the SSO.
136+
137+
You can also use Microsoft My Apps to test the application in any mode. When you click the Syniverse Customer Portal tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Syniverse Customer Portal for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
138+
139+
## Next steps
140+
141+
Once you configure Syniverse Customer Portal you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2241,6 +2241,8 @@
22412241
href: synergi-tutorial.md
22422242
- name: Synerise AI Growth Operating System
22432243
href: synerise-ai-growth-ecosystem-tutorial.md
2244+
- name: Syniverse Customer Portal
2245+
href: syniverse-customer-portal-tutorial.md
22442246
- name: Sentry
22452247
href: sentry-tutorial.md
22462248
- name: Syxsense

0 commit comments

Comments
 (0)