Skip to content

Commit 4cb89f9

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram-1014
2 parents fe2e9fd + de39838 commit 4cb89f9

29 files changed

+470
-3941
lines changed

.openpublishing.redirection.json

Lines changed: 51 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34624,11 +34624,6 @@
3462434624
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-output-json-v2",
3462534625
"redirect_document_id": true
3462634626
},
34627-
{
34628-
"source_path": "articles/security/azure-security-disk-encryption.md",
34629-
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
34630-
"redirect_document_id": true
34631-
},
3463234627
{
3463334628
"source_path": "articles/active-directory/device-management-hybrid-azuread-joined-devices-setup.md",
3463434629
"redirect_url": "/azure/active-directory/devices/hybrid-azuread-join-manual-steps",
@@ -34923,6 +34918,56 @@
3492334918
"redirect_url": "/azure/aks/ssh",
3492434919
"redirect_document_id": true
3492534920
},
34921+
{
34922+
"source_path": "articles/security/azure-security-disk-encryption-appendix.md",
34923+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34924+
"redirect_document_id": false
34925+
},
34926+
{
34927+
"source_path": "articles/security/azure-security-disk-encryption-faq.md",
34928+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34929+
"redirect_document_id": false
34930+
},
34931+
{
34932+
"source_path": "articles/security/azure-security-disk-encryption-linux.md",
34933+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview",
34934+
"redirect_document_id": false
34935+
},
34936+
{
34937+
"source_path": "articles/security/azure-security-disk-encryption-linux-aad.md",
34938+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview-aad",
34939+
"redirect_document_id": false
34940+
},
34941+
{
34942+
"source_path": "articles/security/azure-security-disk-encryption-overview.md",
34943+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34944+
"redirect_document_id": false
34945+
},
34946+
{
34947+
"source_path": "articles/security/azure-security-disk-encryption-prerequisites.md",
34948+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34949+
"redirect_document_id": false
34950+
},
34951+
{
34952+
"source_path": "articles/security/azure-security-disk-encryption-prerequisites-aad.md",
34953+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34954+
"redirect_document_id": false
34955+
},
34956+
{
34957+
"source_path": "articles/security/azure-security-disk-encryption-tsg.md",
34958+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34959+
"redirect_document_id": false
34960+
},
34961+
{
34962+
"source_path": "articles/security/azure-security-disk-encryption-windows.md",
34963+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview",
34964+
"redirect_document_id": false
34965+
},
34966+
{
34967+
"source_path": "articles/security/azure-security-disk-encryption-windows-aad.md",
34968+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview-aad",
34969+
"redirect_document_id": false
34970+
},
3492634971
{
3492734972
"source_path": "articles/cognitive-services/luis/Home.md",
3492834973
"redirect_url": "/azure/cognitive-services/luis/what-is-luis",
@@ -34955,7 +35000,7 @@
3495535000
},
3495635001
{
3495735002
"source_path": "articles/security-center/security-center-disk-encryption.md",
34958-
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
35003+
"redirect_url": "/azure/security-center/security-center-apply-disk-encryption",
3495935004
"redirect_document_id": false
3496035005
},
3496135006
{

articles/active-directory/saas-apps/amplitude-tutorial.md

Lines changed: 86 additions & 127 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/cakehr-tutorial.md

Lines changed: 21 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 09/19/2019
17+
ms.date: 10/16/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -64,10 +64,10 @@ Configure and test Azure AD SSO with CakeHR using a test user called **B.Simon**
6464
To configure and test Azure AD SSO with CakeHR, complete the following building blocks:
6565

6666
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
67-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
6969
1. **[Configure CakeHR SSO](#configure-cakehr-sso)** - to configure the single sign-on settings on application side.
70-
1. **[Create CakeHR test user](#create-cakehr-test-user)** - to have a counterpart of B.Simon in CakeHR that is linked to the Azure AD representation of user.
70+
* **[Create CakeHR test user](#create-cakehr-test-user)** - to have a counterpart of B.Simon in CakeHR that is linked to the Azure AD representation of user.
7171
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
7272

7373
## Configure Azure AD SSO
@@ -134,25 +134,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
134134

135135
## Configure CakeHR SSO
136136

137-
1. Open a new web browser window and sign into your CakeHR company site as an administrator.
137+
1. To automate the configuration within CakeHR, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
138138

139-
2. On the top-right corner of the page, click on **Profile** and then navigate to **Settings**.
139+
![My apps extension](common/install-myappssecure-extension.png)
140+
141+
1. After adding extension to the browser, click on **Set up CakeHR** will direct you to the CakeHR application. From there, provide the admin credentials to sign into CakeHR. The browser extension will automatically configure the application for you and automate steps 3-5.
142+
143+
![Setup configuration](common/setup-sso.png)
144+
145+
1. If you want to setup CakeHR manually, open a new web browser window and sign into your CakeHR company site as an administrator and perform the following steps:
146+
147+
1. On the top-right corner of the page, click on **Profile** and then navigate to **Settings**.
140148

141149
![CakeHR configuration](./media/cakehr-tutorial/config01.png)
142150

143-
3. From the left side of the menu bar, click on **INTEGRATIONS** > **SAML SSO** and perform the following steps:
151+
1. From the left side of the menu bar, click on **INTEGRATIONS** > **SAML SSO** and perform the following steps:
144152

145-
![CakeHR configuration](./media/cakehr-tutorial/config02.png)
153+
![CakeHR configuration](./media/cakehr-tutorial/config02.png)
146154

147-
a. In the **Entity ID** text box, type `cake.hr`.
155+
a. In the **Entity ID** text box, type `cake.hr`.
148156

149-
b. In the **Authentication URL** text box, paste the value of **Login URL**, which you have copied from Azure portal.
157+
b. In the **Authentication URL** text box, paste the value of **Login URL**, which you have copied from Azure portal.
150158

151-
c. In the **Key fingerprint (SHA1 format)** text box, paste the **THUMBPRINT** value, which you have copied from Azure portal.
159+
c. In the **Key fingerprint (SHA1 format)** text box, paste the **THUMBPRINT** value, which you have copied from Azure portal.
152160

153-
d. Check the **Enable Single Sign on** box.
161+
d. Check the **Enable Single Sign on** box.
154162

155-
e. Click **Save**.
163+
e. Click **Save**.
156164

157165
### Create CakeHR test user
158166

@@ -191,4 +199,3 @@ When you click the CakeHR tile in the Access Panel, you should be automatically
191199
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
192200

193201
- [Try CakeHR with Azure AD](https://aad.portal.azure.com/)
194-

articles/active-directory/saas-apps/scalex-enterprise-tutorial.md

Lines changed: 52 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 08/16/2019
17+
ms.date: 10/16/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -54,20 +54,21 @@ To configure the integration of ScaleX Enterprise into Azure AD, you need to add
5454
1. In the **Add from the gallery** section, type **ScaleX Enterprise** in the search box.
5555
1. Select **ScaleX Enterprise** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5656

57+
5758
## Configure and test Azure AD single sign-on for ScaleX Enterprise
5859

5960
Configure and test Azure AD SSO with ScaleX Enterprise using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ScaleX Enterprise.
6061

6162
To configure and test Azure AD SSO with ScaleX Enterprise, complete the following building blocks:
6263

6364
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
64-
2. **[Configure ScaleX Enterprise SSO](#configure-scalex-enterprise-sso)** - to configure the single sign-on settings on application side.
65-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67-
5. **[Create ScaleX Enterprise test user](#create-scalex-enterprise-test-user)** - to have a counterpart of B.Simon in ScaleX Enterprise that is linked to the Azure AD representation of user.
68-
6. **[Test SSO](#test-sso)** - to verify whether the configuration works.
65+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67+
1. **[Configure ScaleX Enterprise SSO](#configure-scalex-enterprise-sso)** - to configure the single sign-on settings on application side.
68+
* **[Create ScaleX Enterprise test user](#create-scalex-enterprise-test-user)** - to have a counterpart of B.Simon in ScaleX Enterprise that is linked to the Azure AD representation of user.
69+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6970

70-
### Configure Azure AD SSO
71+
## Configure Azure AD SSO
7172

7273
Follow these steps to enable Azure AD SSO in the Azure portal.
7374

@@ -105,9 +106,47 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
105106

106107
![Copy configuration URLs](common/copy-configuration-urls.png)
107108

108-
### Configure ScaleX Enterprise SSO
109+
### Create an Azure AD test user
110+
111+
In this section, you'll create a test user in the Azure portal called B.Simon.
112+
113+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
114+
1. Select **New user** at the top of the screen.
115+
1. In the **User** properties, follow these steps:
116+
1. In the **Name** field, enter `B.Simon`.
117+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
118+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
119+
1. Click **Create**.
120+
121+
### Assign the Azure AD test user
122+
123+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ScaleX Enterprise.
124+
125+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
126+
1. In the applications list, select **ScaleX Enterprise**.
127+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
128+
129+
![The "Users and groups" link](common/users-groups-blade.png)
130+
131+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
132+
133+
![The Add User link](common/add-assign-user.png)
134+
135+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
136+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
137+
1. In the **Add Assignment** dialog, click the **Assign** button.
138+
139+
## Configure ScaleX Enterprise SSO
140+
141+
1. To automate the configuration within ScaleX Enterprise, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
142+
143+
![My apps extension](common/install-myappssecure-extension.png)
109144

110-
1. To configure single sign-on on **ScaleX Enterprise** side, sign in to the ScaleX Enterprise company website as an administrator.
145+
1. After adding extension to the browser, click on **Set up ScaleX Enterprise** will direct you to the ScaleX Enterprise application. From there, provide the admin credentials to sign into ScaleX Enterprise. The browser extension will automatically configure the application for you and automate steps 3-6.
146+
147+
![Setup configuration](common/setup-sso.png)
148+
149+
1. If you want to setup ScaleX Enterprise manually, open a new web browser window and sign into your ScaleX Enterprise company site as an administrator and perform the following steps:
111150

112151
1. Click the menu in the upper right and select **Contoso Administration**.
113152

@@ -140,41 +179,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
140179

141180
h. Click **Update SSO Settings** to save the settings.
142181

143-
### Create an Azure AD test user
144-
145-
In this section, you'll create a test user in the Azure portal called B.Simon.
146-
147-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
148-
1. Select **New user** at the top of the screen.
149-
1. In the **User** properties, follow these steps:
150-
1. In the **Name** field, enter `B.Simon`.
151-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
152-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
153-
1. Click **Create**.
154-
155-
### Assign the Azure AD test user
156-
157-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ScaleX Enterprise.
158-
159-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
160-
1. In the applications list, select **ScaleX Enterprise**.
161-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
162-
163-
![The "Users and groups" link](common/users-groups-blade.png)
164-
165-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
166-
167-
![The Add User link](common/add-assign-user.png)
168-
169-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
170-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
171-
1. In the **Add Assignment** dialog, click the **Assign** button.
172-
173182
### Create ScaleX Enterprise test user
174183

175184
To enable Azure AD users to sign in to ScaleX Enterprise, they must be provisioned in to ScaleX Enterprise. In the case of ScaleX Enterprise, provisioning is an automatic task and no manual steps are required. Any user who can successfully authenticate with SSO credentials will be automatically provisioned on the ScaleX side.
176185

177-
### Test SSO
186+
## Test SSO
178187

179188
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
180189

@@ -186,4 +195,6 @@ When you click the ScaleX Enterprise tile in the Access Panel, you should be aut
186195

187196
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
188197

189-
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
198+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
199+
200+
- [Try ScaleX Enterprise with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1376,6 +1376,8 @@
13761376
href: vibehcm-tutorial.md
13771377
- name: Vidyard
13781378
href: vidyard-tutorial.md
1379+
- name: Visit.org
1380+
href: visitorg-tutorial.md
13791381
- name: Visitly
13801382
href: visitly-tutorial.md
13811383
- name: Vocoli

0 commit comments

Comments
 (0)