Skip to content

Commit 4d48e5d

Browse files
authored
Merge pull request #211844 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 9/20
2 parents 12b6d8d + 692f1c7 commit 4d48e5d

34 files changed

+280
-71
lines changed

articles/active-directory-b2c/identity-provider-local.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 09/02/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -34,6 +34,11 @@ To configure settings for social or enterprise identities, where the identity of
3434

3535
::: zone pivot="b2c-user-flow"
3636

37+
## Prerequisites
38+
39+
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
40+
41+
3742
## Configure local account identity provider settings
3843

3944

Lines changed: 142 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with RocketReach SSO'
3+
description: Learn how to configure single sign-on between Azure Active Directory and RocketReach SSO.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 09/06/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with RocketReach SSO
18+
19+
In this tutorial, you'll learn how to integrate RocketReach SSO with Azure Active Directory (Azure AD). When you integrate RocketReach SSO with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to RocketReach SSO.
22+
* Enable your users to be automatically signed-in to RocketReach SSO with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* RocketReach SSO single sign-on (SSO) enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
33+
34+
## Scenario description
35+
36+
In this tutorial, you configure and test Azure AD SSO in a test environment.
37+
38+
* RocketReach SSO supports **SP** and **IDP** initiated SSO.
39+
* RocketReach SSO supports **Just In Time** user provisioning.
40+
41+
## Add RocketReach SSO from the gallery
42+
43+
To configure the integration of RocketReach SSO into Azure AD, you need to add RocketReach SSO from the gallery to your list of managed SaaS apps.
44+
45+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
46+
1. On the left navigation pane, select the **Azure Active Directory** service.
47+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
48+
1. To add new application, select **New application**.
49+
1. In the **Add from the gallery** section, type **RocketReach SSO** in the search box.
50+
1. Select **RocketReach SSO** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
51+
52+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
53+
54+
## Configure and test Azure AD SSO for RocketReach SSO
55+
56+
Configure and test Azure AD SSO with RocketReach SSO using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user at RocketReach SSO.
57+
58+
To configure and test Azure AD SSO with RocketReach SSO, perform the following steps:
59+
60+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
61+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
63+
1. **[Configure RocketReach SSO](#configure-rocketreach-sso)** - to configure the single sign-on settings on application side.
64+
1. **[Create RocketReach SSO test user](#create-rocketreach-sso-test-user)** - to have a counterpart of B.Simon in RocketReach SSO that is linked to the Azure AD representation of user.
65+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
66+
67+
## Configure Azure AD SSO
68+
69+
Follow these steps to enable Azure AD SSO in the Azure portal.
70+
71+
1. In the Azure portal, on the **RocketReach SSO** application integration page, find the **Manage** section and select **single sign-on**.
72+
1. On the **Select a single sign-on method** page, select **SAML**.
73+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
74+
75+
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
76+
77+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
78+
79+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
80+
81+
In the **Sign-on URL** text box, type the URL:
82+
`https://rocketreach.co/login/sso`
83+
84+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
85+
86+
![Screenshot shows the Certificate download link.](common/certificatebase64.png "Certificate")
87+
88+
1. On the **Set up RocketReach SSO** section, copy the appropriate URL(s) based on your requirement.
89+
90+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
91+
92+
### Create an Azure AD test user
93+
94+
In this section, you'll create a test user in the Azure portal called B.Simon.
95+
96+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
97+
1. Select **New user** at the top of the screen.
98+
1. In the **User** properties, follow these steps:
99+
1. In the **Name** field, enter `B.Simon`.
100+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
101+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
102+
1. Click **Create**.
103+
104+
### Assign the Azure AD test user
105+
106+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to RocketReach SSO.
107+
108+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
109+
1. In the applications list, select **RocketReach SSO**.
110+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
111+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
112+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
113+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
114+
1. In the **Add Assignment** dialog, click the **Assign** button.
115+
116+
## Configure RocketReach SSO
117+
118+
To configure single sign-on on **RocketReach SSO** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [RocketReach SSO support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119+
120+
### Create RocketReach SSO test user
121+
122+
In this section, a user called B.Simon is created in RocketReach SSO. RocketReach SSO supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in RocketReach SSO, a new one is created after authentication.
123+
124+
## Test SSO
125+
126+
In this section, you test your Azure AD single sign-on configuration with following options.
127+
128+
#### SP initiated:
129+
130+
* Click on **Test this application** in Azure portal. This will redirect to RocketReach SSO Sign-on URL where you can initiate the login flow.
131+
132+
* Go to RocketReach SSO Sign-on URL directly and initiate the login flow from there.
133+
134+
#### IDP initiated:
135+
136+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the RocketReach SSO for which you set up the SSO.
137+
138+
You can also use Microsoft My Apps to test the application in any mode. When you click the RocketReach SSO tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the RocketReach SSO for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
139+
140+
## Next steps
141+
142+
Once you configure RocketReach SSO you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1933,6 +1933,8 @@
19331933
href: roadmunk-tutorial.md
19341934
- name: Robin
19351935
href: robin-tutorial.md
1936+
- name: RocketReach SSO
1937+
href: rocketreach-sso-tutorial.md
19361938
- name: RSA Archer Suite
19371939
href: rsa-archer-suite-tutorial.md
19381940
- name: RStudio Connect SAML Authentication

articles/application-gateway/application-gateway-diagnostics.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -270,6 +270,8 @@ The access log is generated only if you've enabled it on each Application Gatewa
270270
}
271271
}
272272
```
273+
> [!Note]
274+
>Access logs with clientIP value 127.0.0.1 originate from an internal security process running on the application gateway instances. You can safely ignore these log entries.
273275
274276
### Performance log
275277

articles/automation/quickstarts/enable-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This Quickstart shows you how to enable managed identities for an Azure Automati
3131

3232
1. Set the system-assigned **Status** option to **On** and then press **Save**. When you're prompted to confirm, select **Yes**.
3333

34-
Your Automation account can now use the system-assigned identity, which is registered with Azure Active Directory (Azure AD) and is represented by an object ID.
34+
Your Automation account can now use the system-assigned identity, that is registered with Azure Active Directory (Azure AD) and is represented by an object ID.
3535

3636
:::image type="content" source="media/enable-managed-identity/system-assigned-object-id.png" alt-text="Managed identity object ID.":::
3737

articles/backup/transport-layer-security.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Transport Layer Security in Azure Backup
33
description: Learn how to enable Azure Backup to use the encryption protocol Transport Layer Security (TLS) to keep data secure when being transferred over a network.
44
ms.topic: conceptual
5-
ms.date: 11/01/2020
5+
ms.date: 09/20/2022
66
---
77

88
# Transport Layer Security in Azure Backup
@@ -52,6 +52,27 @@ The following registry keys configure .NET Framework to support strong cryptogra
5252
"SchUseStrongCrypto" = dword:00000001
5353
```
5454

55+
## Azure TLS certificate changes
56+
57+
Azure TLS/SSL endpoints now contain updated certificates chaining up to new root CAs. Ensure that the following changes include the updated root CAs. [Learn more](../security/fundamentals/tls-certificate-changes.md#what-changed) about the possible impacts on your applications.
58+
59+
Earlier, most of the TLS certificates, used by Azure services, chained up to the following Root CA:
60+
61+
Common name of CA | Thumbprint (SHA1)
62+
--- | ---
63+
[Baltimore CyberTrust Root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) | d4de20d05e66fc53fe1a50882c78db2852cae474
64+
65+
Now, TLS certificates, used by Azure services, helps to chain up to one of the following Root CAs:
66+
67+
Common name of CA | Thumbprint (SHA1)
68+
--- | ---
69+
[DigiCert Global Root G2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) | df3c24f9bfd666761b268073fe06d1cc8d4f82a4
70+
[DgiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) | a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436
71+
[Baltimore CyberTrust Root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt)| d4de20d05e66fc53fe1a50882c78db2852cae474
72+
[D-TRUST Root Class 3 CA 2 2009](https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_2009.crt) | 58e8abb0361533fb80f79b1b6d29d3ff8d5f00f0
73+
[Microsoft RSA Root Certificate Authority 2017](https://www.microsoft.com/pkiops/certs/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crt) | 73a5e64a3bff8316ff0edccc618a906e4eae4d74
74+
[Microsoft ECC Root Certificate Authority 2017](https://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crt) | 999a64c37ff47d9fab95f14769891460eec4c3c5
75+
5576
## Frequently asked questions
5677

5778
### Why enable TLS 1.2?
@@ -67,7 +88,7 @@ The highest protocol version supported by both the client and server is negotiat
6788
For improved security from protocol downgrade attacks, Azure Backup is beginning to disable TLS versions older than 1.2 in a phased manner. This is part of a long-term shift across services to disallow legacy protocol and cipher suite connections. Azure Backup services and components fully support TLS 1.2. However, Windows versions lacking required updates or certain customized configurations can still prevent TLS 1.2 protocols being offered. This can cause failures including but not limited to one or more of the following:
6889

6990
- Backup and restore operations may fail.
70-
- Backup components connections failures with error 10054 (An existing connection was forcibly closed by the remote host).
91+
- The backup components connections failures with error 10054 (An existing connection was forcibly closed by the remote host).
7192
- Services related to Azure Backup won't stop or start as usual.
7293

7394
## Additional resources

articles/batch/batch-pools-without-public-ip-addresses-classic-retirement-migration-guide.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,14 @@ In late 2021, we launched a simplified compute node communication model for Azur
1818
[Simplified Compute Node Communication Pools without Public IPs](./simplified-node-communication-pool-no-public-ip.md) requires using simplified compute node communication. It provides customers with enhanced security for their workload environments on network isolation and data exfiltration to Azure Batch accounts. Its key benefits include:
1919

2020
* Allow creating simplified node communication pool without public IP addresses.
21-
* Support Batch private pool using a new private endpoint (sub-resource nodeManagement) for Azure Batch account.
21+
* Support Batch private pool using a new private endpoint (sub-resource: **nodeManagement**) for Azure Batch account.
2222
* Simplified private link DNS zone for Batch account private endpoints: changed from **privatelink.\<region>.batch.azure.com** to **privatelink.batch.azure.com**.
2323
* Mutable public network access for Batch accounts.
2424
* Firewall support for Batch account public endpoints: configure IP address network rules to restrict public network access with Batch accounts.
2525

2626
## Migration steps
2727

28-
Batch pool without public IP addresses (classic) will retire on **31/2023 and will be updated to simplified compute node communication pools without public IPs. For existing pools that use the previous preview version of Batch pool without public IP addresses (classic), it's only possible to migrate pools created in a virtual network. To migrate the pool, follow the opt-in process for simplified compute node communication:
28+
Batch pool without public IP addresses (classic) will retire on **31 March 2023** and will be updated to simplified compute node communication pools without public IPs. For existing pools that use the previous preview version of Batch pool without public IP addresses (classic), it's only possible to migrate pools created in a virtual network. To migrate the pool, follow the opt-in process for simplified compute node communication:
2929

3030
1. Opt in to [use simplified compute node communication](./simplified-compute-node-communication.md#opt-your-batch-account-in-or-out-of-simplified-compute-node-communication).
3131

@@ -59,16 +59,16 @@ Batch pool without public IP addresses (classic) will retire on **31/2023 and wi
5959

6060
* How can I connect to my pool nodes for troubleshooting?
6161

62-
Similar to Batch pools without public IP addresses (classic). As there is no public IP address for the Batch pool, users will need to connect their pool nodes from within the virtual network. You can create a jump box VM in the virtual network or use other remote connectivity solutions like [Azure Bastion](../bastion/bastion-overview.md).
62+
Similar to Batch pools without public IP addresses (classic). As there's no public IP address for the Batch pool, users will need to connect their pool nodes from within the virtual network. You can create a jump box VM in the virtual network or use other remote connectivity solutions like [Azure Bastion](../bastion/bastion-overview.md).
6363

6464
* Will there be any change to how my workloads are downloaded from Azure Storage?
6565

6666
Similar to Batch pools without public IP addresses (classic), users will need to provide their own internet outbound connectivity if their workloads need access to other resources like Azure Storage.
6767

6868
* What if I don’t migrate to simplified compute node communication pools without public IPs?
6969

70-
After **31 March 2023**, we will stop supporting Batch pool without public IP addresses. The functionality of the existing pool in that configuration may break, such as scale out operations, or may be actively scaled down to zero at any point in time after that date.
70+
After **31 March 2023**, we'll stop supporting Batch pool without public IP addresses. The functionality of the existing pool in that configuration may break, such as scale-out operations, or may be actively scaled down to zero at any point in time after that date.
7171

7272
## Next steps
7373

74-
For more information, refer to [Simplified compute node communication](./simplified-compute-node-communication.md).
74+
For more information, see [Simplified compute node communication](./simplified-compute-node-communication.md).

0 commit comments

Comments
 (0)