Skip to content

Commit 441c07e

Browse files
Merge pull request #223145 from bhavana-129/webce-update
Product Backlog Item 2275479: SaaS App Tutorial: Webce, Jfrog, CCH, Atlasssian Update
2 parents 95fc829 + 57b8d9b commit 441c07e

File tree

4 files changed

+38
-44
lines changed

4 files changed

+38
-44
lines changed

articles/active-directory/saas-apps/atlassian-cloud-tutorial.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Atlassian Cloud'
2+
title: 'Tutorial: Azure Active Directory SSO integration with Atlassian Cloud'
33
description: Learn how to configure single sign-on between Azure Active Directory and Atlassian Cloud.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/06/2023
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Integrate Atlassian Cloud with Azure Active Directory
15+
# Tutorial: Azure Active Directory SSO integration with Atlassian Cloud
1616

1717
In this tutorial, you'll learn how to integrate Atlassian Cloud with Azure Active Directory (Azure AD). When you integrate Atlassian Cloud with Azure AD, you can:
1818

@@ -49,8 +49,6 @@ To configure the integration of Atlassian Cloud into Azure AD, you need to add A
4949
1. In the **Add from the gallery** section, type **Atlassian Cloud** in the search box.
5050
1. Select **Atlassian Cloud** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5151

52-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
53-
5452
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
5553

5654
## Configure and test Azure AD SSO
@@ -228,15 +226,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
228226

229227
#### SP initiated:
230228

231-
* Click on **Test this application** in Azure portal. This will redirect to Atlassian Cloud Sign on URL where you can initiate the login flow.
229+
* Click on **Test this application** in Azure portal. This will redirect to Atlassian Cloud Sign-on URL where you can initiate the login flow.
232230

233231
* Go to Atlassian Cloud Sign-on URL directly and initiate the login flow from there.
234232

235233
#### IDP initiated:
236234

237235
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Atlassian Cloud for which you set up the SSO.
238236

239-
You can also use Microsoft My Apps to test the application in any mode. When you click the Atlassian Cloud tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Atlassian Cloud for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
237+
You can also use Microsoft My Apps to test the application in any mode. When you click the Atlassian Cloud tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Atlassian Cloud for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
240238

241239
## Next steps
242240

articles/active-directory/saas-apps/cch-tagetik-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with CCH Tagetik | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory SSO integration with CCH Tagetik'
33
description: Learn how to configure single sign-on between Azure Active Directory and CCH Tagetik.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/06/2023
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with CCH Tagetik
16+
# Tutorial: Azure Active Directory SSO integration with CCH Tagetik
1717

1818
In this tutorial, you'll learn how to integrate CCH Tagetik with Azure Active Directory (Azure AD). When you integrate CCH Tagetik with Azure AD, you can:
1919

@@ -69,31 +69,31 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6969
1. On the **Select a single sign-on method** page, select **SAML**.
7070
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7171

72-
![Edit Basic SAML Configuration](common/edit-urls.png)
72+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
7373

74-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode,perform the following steps:
74+
1. On the **Basic SAML Configuration** section, perform the following steps:
7575

7676
a. In the **Identifier** text box, type a URL using the following pattern:
7777
`https://<CUSTOMER_NAME>.saastagetik.com/prod/5/`
7878

7979
b. In the **Reply URL** text box, type a URL using the following pattern:
8080
`https://<CUSTOMER_NAME>.saastagetik.com/prod/5/`
8181

82-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
82+
1. Perform the following step if you wish to configure the application in **SP** initiated mode:
8383

8484
In the **Sign-on URL** text box, type a URL using the following pattern:
85-
`https://<CUSTOMER_NAME>.saastagetik.com/prod/5/`
85+
`https://<CUSTOMER_NAME>.saastagetik.com/prod/`
8686

8787
> [!NOTE]
8888
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [CCH Tagetik Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8989

9090
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9191

92-
![The Certificate download link](common/metadataxml.png)
92+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
9393

9494
1. On the **Set up CCH Tagetik** section, copy the appropriate URL(s) based on your requirement.
9595

96-
![Copy configuration URLs](common/copy-configuration-urls.png)
96+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
9797

9898
### Create an Azure AD test user
9999

@@ -133,15 +133,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
133133

134134
#### SP initiated:
135135

136-
* Click on **Test this application** in Azure portal. This will redirect to CCH Tagetik Sign on URL where you can initiate the login flow.
136+
* Click on **Test this application** in Azure portal. This will redirect to CCH Tagetik Sign-on URL where you can initiate the login flow.
137137

138138
* Go to CCH Tagetik Sign-on URL directly and initiate the login flow from there.
139139

140140
#### IDP initiated:
141141

142142
* Click on **Test this application** in Azure portal and you should be automatically signed in to the CCH Tagetik for which you set up the SSO.
143143

144-
You can also use Microsoft My Apps to test the application in any mode. When you click the CCH Tagetik tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the CCH Tagetik for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
144+
You can also use Microsoft My Apps to test the application in any mode. When you click the CCH Tagetik tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the CCH Tagetik for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
145145

146146
## Next steps
147147

articles/active-directory/saas-apps/jfrog-artifactory-tutorial.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with JFrog Artifactory | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory SSO integration with JFrog Artifactory'
33
description: Learn how to configure single sign-on between Azure Active Directory and JFrog Artifactory.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/06/2023
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Integrate JFrog Artifactory with Azure Active Directory
16+
# Tutorial: Azure Active Directory SSO integration with JFrog Artifactory
1717

1818
In this tutorial, you'll learn how to integrate JFrog Artifactory with Azure Active Directory (Azure AD). When you integrate JFrog Artifactory with Azure AD, you can:
1919

@@ -69,21 +69,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6969
1. On the **Select a Single sign-on method** page, select **SAML**.
7070
1. On the **Set up Single Sign-On with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7171

72-
![Edit Basic SAML Configuration](common/edit-urls.png)
72+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
7373

7474
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
7575

7676
a. In the **Identifier** text box, enter a URL that reflects the Artifactory URL.
7777

7878
b. In the **Reply URL** text box, type a URL using the following pattern:
7979

80-
- For Artifactory Self-hosted: `https://<servername>.jfrog.io/artifactory/webapp/saml/loginResponse`
80+
- For Artifactory Self-hosted: `https://<FQDN>/artifactory/webapp/saml/loginResponse`
8181
- For Artifactory SaaS: `https://<servername>.jfrog.io/artifactory/webapp/saml/loginResponse`
8282

83-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
83+
1. Perform the following step if you wish to configure the application in **SP** initiated mode:
8484

8585
In the **Sign-on URL** text box, type a URL using the following pattern:
86-
- For Artifactory Self-hosted: `https://<servername>.jfrog.io/<servername>/webapp/`
86+
- For Artifactory Self-hosted: `https://<FQDN>/<servername>/webapp/`
8787
- For Artifactory SaaS: `https://<servername>.jfrog.io/ui/login`
8888

8989
> [!NOTE]
@@ -105,16 +105,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
105105

106106
c. Click **Save**.
107107

108-
4. In the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, locate the **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
108+
1. In the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, locate the **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
109109

110-
![The Certificate download link](./media/jfrog-artifactory-tutorial/certificate-base.png)
110+
![Screenshot shows the Certificate download link.](./media/jfrog-artifactory-tutorial/certificate-base.png "Certificate")
111111

112-
6. Configure the Artifactory (SAML Service Provider Name) with the 'Identifier' field (see step 4). In the **Set up JFrog Artifactory** section, copy the appropriate URL(s) based on your requirement.
112+
1. Configure the Artifactory (SAML Service Provider Name) with the 'Identifier' field (see step 4). In the **Set up JFrog Artifactory** section, copy the appropriate URL(s) based on your requirement.
113113

114-
- For Artifactory Self-hosted: `https://<servername>.jfrog.io/artifactory/webapp/saml/loginResponse`
114+
- For Artifactory Self-hosted: `https://<FQDN>/artifactory/webapp/saml/loginResponse`
115115
- For Artifactory SaaS: `https://<servername>.jfrog.io/<servername>/webapp/saml/loginResponse`
116116

117-
![Copy configuration URLs](common/copy-configuration-urls.png)
117+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
118118

119119
### Create an Azure AD test user
120120

@@ -142,7 +142,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
142142

143143
## Configure JFrog Artifactory SSO
144144

145-
To configure single sign-on on **JFrog Artifactory** side, you need to send the downloaded **Certificate (Raw)** and appropriate copied URLs from Azure portal to [JFrog Artifactory support team](https://support.jfrog.com). They set this setting to have the SAML SSO connection set properly on both sides.
145+
To configure single sign-on on **JFrog Artifactory** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [JFrog Artifactory support team](https://support.jfrog.com). They set this setting to have the SAML SSO connection set properly on both sides.
146146

147147
### Create JFrog Artifactory test user
148148

@@ -154,15 +154,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
154154

155155
#### SP initiated:
156156

157-
* Click on **Test this application** in Azure portal. This will redirect to JFrog Artifactory Sign on URL where you can initiate the login flow.
157+
* Click on **Test this application** in Azure portal. This will redirect to JFrog Artifactory Sign-on URL where you can initiate the login flow.
158158

159159
* Go to JFrog Artifactory Sign-on URL directly and initiate the login flow from there.
160160

161161
#### IDP initiated:
162162

163163
* Click on **Test this application** in Azure portal and you should be automatically signed in to the JFrog Artifactory for which you set up the SSO.
164164

165-
You can also use Microsoft My Apps to test the application in any mode. When you click the JFrog Artifactory tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the JFrog Artifactory for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
165+
You can also use Microsoft My Apps to test the application in any mode. When you click the JFrog Artifactory tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the JFrog Artifactory for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
166166

167167
## Next steps
168168

articles/active-directory/saas-apps/webce-tutorial.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: jeedes
1414

1515
---
1616

17-
# Azure Active Directory SSO integration with WebCE
17+
# Tutorial: Azure Active Directory SSO integration with WebCE
1818

1919
In this article, you'll learn how to integrate WebCE with Azure Active Directory (Azure AD). WebCE offers self-study online continuing education and pre-license training courses for a variety of professional licenses and designations. When you integrate WebCE with Azure AD, you can:
2020

@@ -59,18 +59,14 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
5959

6060
1. On the **Basic SAML Configuration** section, perform the following steps:
6161

62-
a. In the **Identifier** textbox, type a URL using one of the following patterns:
63-
64-
| **Identifier** |
65-
|---------------|
66-
| `https://www.webce.com/<RootPortalFolder>` |
67-
| `https://www.webce.com` |
62+
a. In the **Identifier** textbox, type a URL using the following pattern:
63+
`https://www.webce.com`
6864

6965
b. In the **Reply URL** textbox, type a URL using the following pattern:
7066
`https://www.webce.com/<RootPortalFolder>/login/saml20`
7167

7268
c. In the **Sign on URL** textbox, type a URL using the following pattern:
73-
`https://www.webce.com/<RootPortalFolder>/login/saml20`
69+
`https://www.webce.com/<RootPortalFolder>/login`
7470

7571
> [!Note]
7672
> These values are not the real. Update these values with the actual Identifer, Reply URL and Sign on URL. Contact [WebCE Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
@@ -95,11 +91,11 @@ In this section, a user called B.Simon is created in WebCE. WebCE supports just-
9591

9692
In this section, you test your Azure AD single sign-on configuration with following options.
9793

98-
* Click on **Test this application** in Azure portal. This will redirect to WebCE Sign on URL where you can initiate the login flow.
94+
* Click on **Test this application** in Azure portal. This will redirect to WebCE Sign-on URL where you can initiate the login flow.
9995

100-
* Go to WebCE Sign on URL directly and initiate the login flow from there.
96+
* Go to WebCE Sign-on URL directly and initiate the login flow from there.
10197

102-
* You can use Microsoft My Apps. When you click the WebCE tile in the My Apps, this will redirect to WebCE Sign on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
98+
* You can use Microsoft My Apps. When you click the WebCE tile in the My Apps, this will redirect to WebCE Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
10399

104100
## Additional resources
105101

0 commit comments

Comments
 (0)