Skip to content

Commit 4835b0c

Browse files
author
duongau
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into erapi
2 parents 1612475 + 553b18d commit 4835b0c

File tree

83 files changed

+882
-767
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+882
-767
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46532,6 +46532,11 @@
4653246532
"source_path_from_root": "/articles/azure-monitor/app/how-do-i.md",
4653346533
"redirect_url": "/azure/azure-monitor/faq",
4653446534
"redirect_document_id": false
46535+
},
46536+
{
46537+
"source_path_from_root": "/articles/app-service/web-sites-integrate-with-vnet.md",
46538+
"redirect_url": "/azure/app-service/overview-vnet-integration",
46539+
"redirect_document_id": false
4653546540
}
4653646541
]
4653746542
}

articles/active-directory-domain-services/tutorial-create-forest-trust.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/26/2021
12+
ms.date: 10/19/2021
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to create a one-way outbound forest from an Azure Active Directory Domain Services resource forest to an on-premises Active Directory Domain Services forest to provide authentication and resource access between forests.
@@ -72,9 +72,20 @@ Before you configure a forest trust in Azure AD DS, make sure your networking be
7272
To correctly resolve the managed domain from the on-premises environment, you may need to add forwarders to the existing DNS servers. If you haven't configured the on-premises environment to communicate with the managed domain, complete the following steps from a management workstation for the on-premises AD DS domain:
7373

7474
1. Select **Start** > **Administrative Tools** > **DNS**.
75-
1. Right-select DNS server, such as *myAD01*, then select **Properties**.
76-
1. Choose **Forwarders**, then **Edit** to add additional forwarders.
77-
1. Add the IP addresses of the managed domain, such as *10.0.2.4* and *10.0.2.5*.
75+
1. Select your DNS zone, such as *aaddscontoso.com*.
76+
1. Select **Conditional Forwarders**, then right-select and choose **New Conditional Forwarder...**
77+
1. Enter your other **DNS Domain**, such as *contoso.com*, then enter the IP addresses of the DNS servers for that namespace, as shown in the following example:
78+
79+
![Screenshot of how to add and configure a conditional forwarder for the DNS server.](./media/manage-dns/create-conditional-forwarder.png)
80+
81+
1. Check the box for **Store this conditional forwarder in Active Directory, and replicate it as follows**, then select the option for *All DNS servers in this domain*, as shown in the following example:
82+
83+
![Screenshot of how to select All DNS servers in this domain.](./media/manage-dns/store-in-domain.png)
84+
85+
> [!IMPORTANT]
86+
> If the conditional forwarder is stored in the *forest* instead of the *domain*, the conditional forwarder fails.
87+
88+
1. To create the conditional forwarder, select **OK**.
7889

7990
## Create inbound forest trust in the on-premises domain
8091

articles/active-directory/saas-apps/cbre-serviceinsight-tutorial.md

Lines changed: 22 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with CBRE ServiceInsight | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with CBRE ServiceInsight'
33
description: Learn how to configure single sign-on between Azure Active Directory and CBRE ServiceInsight.
44
services: active-directory
55
author: jeevansd
@@ -9,20 +9,18 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/29/2019
12+
ms.date: 10/13/2021
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with CBRE ServiceInsight
16+
# Tutorial: Azure AD SSO integration with CBRE ServiceInsight
1717

1818
In this tutorial, you'll learn how to integrate CBRE ServiceInsight with Azure Active Directory (Azure AD). When you integrate CBRE ServiceInsight with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to CBRE ServiceInsight.
2121
* Enable your users to be automatically signed-in to CBRE ServiceInsight with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25-
2624
## Prerequisites
2725

2826
To get started, you need the following items:
@@ -34,25 +32,28 @@ To get started, you need the following items:
3432

3533
In this tutorial, you configure and test Azure AD SSO in a test environment.
3634

37-
* CBRE ServiceInsight supports **SP** initiated SSO
38-
* CBRE ServiceInsight supports **Just In Time** user provisioning
35+
* CBRE ServiceInsight supports **SP** initiated SSO.
36+
* CBRE ServiceInsight supports **Just In Time** user provisioning.
37+
38+
> [!NOTE]
39+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
3940
40-
## Adding CBRE ServiceInsight from the gallery
41+
## Add CBRE ServiceInsight from the gallery
4142

4243
To configure the integration of CBRE ServiceInsight into Azure AD, you need to add CBRE ServiceInsight from the gallery to your list of managed SaaS apps.
4344

44-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
45+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4546
1. On the left navigation pane, select the **Azure Active Directory** service.
4647
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4748
1. To add new application, select **New application**.
4849
1. In the **Add from the gallery** section, type **CBRE ServiceInsight** in the search box.
4950
1. Select **CBRE ServiceInsight** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5051

51-
## Configure and test Azure AD single sign-on for CBRE ServiceInsight
52+
## Configure and test Azure AD SSO for CBRE ServiceInsight
5253

5354
Configure and test Azure AD SSO with CBRE ServiceInsight using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in CBRE ServiceInsight.
5455

55-
To configure and test Azure AD SSO with CBRE ServiceInsight, complete the following building blocks:
56+
To configure and test Azure AD SSO with CBRE ServiceInsight, perform the following steps:
5657

5758
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5859
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -65,15 +66,15 @@ To configure and test Azure AD SSO with CBRE ServiceInsight, complete the follow
6566

6667
Follow these steps to enable Azure AD SSO in the Azure portal.
6768

68-
1. In the [Azure portal](https://portal.azure.com/), on the **CBRE ServiceInsight** application integration page, find the **Manage** section and select **single sign-on**.
69+
1. In the Azure portal, on the **CBRE ServiceInsight** application integration page, find the **Manage** section and select **single sign-on**.
6970
1. On the **Select a single sign-on method** page, select **SAML**.
70-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
71+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7172

7273
![Edit Basic SAML Configuration](common/edit-urls.png)
7374

74-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
75+
1. On the **Basic SAML Configuration** section, perform the following step:
7576

76-
In the **Sign-on URL** text box, type a URL:
77+
In the **Sign-on URL** text box, type the URL:
7778
`https://adfs4.mainstreamsasp.com/adfs/ls/`
7879

7980
> [!NOTE]
@@ -102,13 +103,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
102103
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
103104
1. In the applications list, select **CBRE ServiceInsight**.
104105
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
105-
106-
![The "Users and groups" link](common/users-groups-blade.png)
107-
108106
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
109-
110-
![The Add User link](common/add-assign-user.png)
111-
112107
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
113108
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
114109
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -123,16 +118,14 @@ In this section, a user called Britta Simon is created in CBRE ServiceInsight. C
123118

124119
## Test SSO
125120

126-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
127-
128-
When you click the CBRE ServiceInsight tile in the Access Panel, you should be automatically signed in to the CBRE ServiceInsight for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
121+
In this section, you test your Azure AD single sign-on configuration with following options.
129122

130-
## Additional resources
123+
* Click on **Test this application** in Azure portal. This will redirect to CBRE ServiceInsight Sign-on URL where you can initiate the login flow.
131124

132-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
125+
* Go to CBRE ServiceInsight Sign-on URL directly and initiate the login flow from there.
133126

134-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
127+
* You can use Microsoft My Apps. When you click the CBRE ServiceInsight tile in the My Apps, this will redirect to CBRE ServiceInsight Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
135128

136-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
129+
## Next steps
137130

138-
- [Try CBRE ServiceInsight with Azure AD](https://aad.portal.azure.com/)
131+
Once you configure CBRE ServiceInsight you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
13.5 KB
Loading
6.71 KB
Loading
6.68 KB
Loading
5.96 KB
Loading
2.49 KB
Loading
26.2 KB
Loading
8.9 KB
Loading

0 commit comments

Comments
 (0)