Skip to content

Commit 4eb112b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 53b6f85 + dee45d1 commit 4eb112b

File tree

110 files changed

+1526
-857
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

110 files changed

+1526
-857
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5516,6 +5516,11 @@
55165516
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-prometheus-monitoring-addon.md",
55175517
"redirect_url": "/azure/azure-monitor/containers/container-insights-prometheus",
55185518
"redirect_document_id": false
5519+
},
5520+
{
5521+
"source_path_from_root": "/articles/azure-monitor/app/powershell-azure-diagnostics.md",
5522+
"redirect_url": "/azure/azure-monitor/agents/diagnostics-extension-to-application-insights",
5523+
"redirect_document_id": false
55195524
}
55205525
]
55215526
}

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/14/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -191,7 +191,7 @@ The MFA Server Migration utility targets a single Azure AD group for all migrati
191191

192192
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
193193

194-
To view user attribute data for a user, highlight the user, and select **View**:
194+
To view attribute data for a user, highlight the user, and select **View**:
195195

196196
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
197197

@@ -202,7 +202,10 @@ The settings option allows you to change the settings for the migration process:
202202
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
203203

204204
- Migrate – This setting allows you to specify which method(s) should be migrated for the selection of users
205-
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName
205+
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName:
206+
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
207+
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
208+
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
206209
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
207210

208211
The migration process can be an automatic process, or a manual process.
@@ -367,7 +370,7 @@ Content-Type: application/json
367370
}
368371
```
369372

370-
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
373+
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
371374

372375
>[!NOTE]
373376
>The update of the domain federation setting can take up to 24 hours to take effect.
@@ -443,7 +446,8 @@ If the upgrade had issues, follow these steps to roll back:
443446
}
444447
```
445448

446-
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
449+
450+
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
447451

448452

449453
## Next steps

articles/active-directory/develop/v2-overview.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,16 @@
22
title: Microsoft identity platform overview
33
description: Learn about the components of the Microsoft identity platform and how they can help you build identity and access management (IAM) support into your applications.
44
services: active-directory
5-
author: rwike77
5+
author: CelesteDG
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: overview
1111
ms.workload: identity
12-
ms.date: 10/18/2022
13-
ms.author: ryanwi
14-
ms.reviewer: agirling, saeeda, benv
15-
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
12+
ms.date: 11/16/2022
13+
ms.author: celested
14+
ms.reviewer: saeeda
1615
# Customer intent: As an application developer, I want a quick introduction to the Microsoft identity platform so I can decide if this platform meets my application development requirements.
1716
---
1817

@@ -72,8 +71,6 @@ Learn how core authentication and Azure AD concepts apply to the Microsoft ident
7271

7372
[Azure AD B2B](../external-identities/what-is-b2b.md) - Invite external users into your Azure AD tenant as "guest" users, and assign permissions for authorization while they use their existing credentials for authentication.
7473

75-
[Azure Active Directory for developers (v1.0)](../azuread-dev/v1-overview.md) - Exclusively for developers with existing apps that use the older v1.0 endpoint. **Do not** use v1.0 for new projects.
76-
7774
## Next steps
7875

7976
If you have an Azure account, then you have access to an Azure Active Directory tenant. However, most Microsoft identity platform developers need their own Azure AD tenant for use while developing applications, known as a *dev tenant*.

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,9 @@ You can use these cmdlets to retrieve the TLS 1.2 enablement status or set it as
434434
- We added the following new user properties to sync from on-premises Active Directory to Azure AD:
435435
- employeeType
436436
- employeeHireDate
437+
>[!NOTE]
438+
> There's no corresponding EmployeeHireDate or EmployeeLeaveDateTime attribute in Active Directory. If you're importing from on-premises AD, you'll need to identify an attribute in AD that can be used. This attribute must be a string. For more information see, [Synchronizing lifecycle workflow attributes](../governance/how-to-lifecycle-workflow-sync-attributes.md)
439+
437440
- This release requires PowerShell version 5.0 or newer to be installed on the Windows server. This version is part of Windows Server 2016 and newer.
438441
- We increased the group sync membership limits to 250,000 with the new V2 endpoint.
439442
- We updated the Generic LDAP Connector and the Generic SQL Connector to the latest versions. To learn more about these connectors, see the reference documentation for:
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Azure Active Directory SSO integration with Adstream'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Adstream.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 11/16/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with Adstream
18+
19+
In this article, you'll learn how to integrate Adstream with Azure Active Directory (Azure AD). Adstream provides the safest and easiest to use business solution for sending and receiving files. When you integrate Adstream with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Adstream.
22+
* Enable your users to be automatically signed-in to Adstream with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You'll configure and test Azure AD single sign-on for Adstream in a test environment. Adstream supports both **SP** initiated single sign-on.
26+
27+
> [!NOTE]
28+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
29+
30+
## Prerequisites
31+
32+
To integrate Azure Active Directory with Adstream, you need:
33+
34+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* Adstream single sign-on (SSO) enabled subscription.
38+
39+
## Add application and assign a test user
40+
41+
Before you begin the process of configuring single sign-on, you need to add the Adstream application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
42+
43+
### Add Adstream from the Azure AD gallery
44+
45+
Add Adstream from the Azure AD application gallery to configure single sign-on with Adstream. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
46+
47+
### Create and assign Azure AD test user
48+
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
50+
51+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
52+
53+
## Configure Azure AD SSO
54+
55+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
56+
57+
1. In the Azure portal, on the **Adstream** application integration page, find the **Manage** section and select **single sign-on**.
58+
1. On the **Select a single sign-on method** page, select **SAML**.
59+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
60+
61+
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
62+
63+
1. On the **Basic SAML Configuration** section, perform the following steps:
64+
65+
a. In the **Reply URL** textbox, type the URL:
66+
`https://msft.adstream.com/saml/assert`
67+
68+
b. In the **Sign on URL** textbox, type the URL:
69+
`https://msft.adstream.com`
70+
71+
c. In the **Relay State** textbox, type the URL:
72+
`https://a5.adstream.com/projects#/projects/projects`
73+
74+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
75+
76+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
77+
78+
1. On the **Set up Adstream** section, copy the appropriate URL(s) based on your requirement.
79+
80+
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Metadata")
81+
82+
## Configure Adstream SSO
83+
84+
To configure single sign-on on **Adstream** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Adstream support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
85+
86+
### Create Adstream test user
87+
88+
In this section, you create a user called Britta Simon in Seculio. Work with [Adstream support team](mailto:[email protected]) to add the users in the Seculio platform. Users must be created and activated before you use single sign-on.
89+
90+
## Test SSO
91+
92+
In this section, you test your Azure AD single sign-on configuration with following options.
93+
94+
* Click on **Test this application** in Azure portal. This will redirect to Adstream Sign-on URL where you can initiate the login flow.
95+
96+
* Go to Adstream Sign-on URL directly and initiate the login flow from there.
97+
98+
* You can use Microsoft My Apps. When you click the Adstream tile in the My Apps, this will redirect to Adstream Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
99+
100+
## Additional resources
101+
102+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
103+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
104+
105+
## Next steps
106+
107+
Once you configure Adstream you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@
8080
href: adglobalview-tutorial.md
8181
- name: Adra by Trintech
8282
href: adra-by-trintech-tutorial.md
83+
- name: Adstream
84+
href: adstream-tutorial.md
8385
- name: Agile Provisioning
8486
href: agile-provisioning-tutorial.md
8587
- name: Agiloft Contract Management Suite

0 commit comments

Comments
 (0)