Skip to content

Commit 4f9d57e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-protected-actions-policy-not-satisfied
2 parents 2e3c5ff + 02fe9ea commit 4f9d57e

File tree

11 files changed

+26
-37
lines changed

11 files changed

+26
-37
lines changed

articles/active-directory/saas-apps/hornbill-tutorial.md

Lines changed: 15 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Hornbill
@@ -116,37 +116,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
1. In a different web browser window, log in to Hornbill as a Security Administrator.
118118

119-
2. On the Home page, click **System**.
119+
2. On the Home page, click the **Configuration** settings icon at the bottom left of the page.
120120

121-
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/system.png "Hornbill system")
121+
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/settings.png "Hornbill system")
122122

123-
3. Navigate to **Security**.
123+
3. Navigate to **Platform Configuration**.
124124

125-
![Screenshot shows the Hornbill security.](./media/hornbill-tutorial/security.png "Hornbill security")
125+
![Screenshot shows the Hornbill platform configuration.](./media/hornbill-tutorial/platform-configuration.png "Hornbill security")
126126

127-
4. Click **SSO Profiles**.
127+
4. Click **SSO Profiles** under Security.
128128

129-
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profile.png "Hornbill single")
129+
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profiles.png "Hornbill single")
130130

131-
5. On the right side of the page, click on **Add logo**.
131+
5. On the right side of the page, click on **+ Create New Profile**.
132132

133-
![Screenshot shows to add the logo.](./media/hornbill-tutorial/add-logo.png "Hornbill add")
133+
![Screenshot shows to add the logo.](./media/hornbill-tutorial/create-new-profile.png "Hornbill create")
134134

135-
6. On the **Profile Details** bar, click on **Import SAML Meta logo**.
135+
6. On the **Profile Details** bar, click on the **Import IDP Meta Data** button.
136136

137-
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/logo.png "Hornbill logo")
137+
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/import-metadata.png "Hornbill logo")
138138

139-
7. On the Pop-up page in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
139+
7. On the pop-up, in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
140140

141-
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/process.png "Hornbill process")
141+
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/metadata-url.png "Hornbill process")
142142

143143
8. After clicking process the values get auto populated automatically under **Profile Details** section.
144144

145-
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/page.png "Hornbill profile")
146-
147-
![Screenshot shows Hornbill details.](./media/hornbill-tutorial/services.png "Hornbill details")
148-
149-
![Screenshot shows Hornbill certificate.](./media/hornbill-tutorial/details.png "Hornbill certificate")
145+
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/profile-details.png "Hornbill profile")
150146

151147
9. Click **Save Changes**.
152148

@@ -155,7 +151,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
155151
In this section, a user called Britta Simon is created in Hornbill. Hornbill supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Hornbill, a new one is created after authentication.
156152

157153
> [!Note]
158-
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
154+
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
159155
160156
## Test SSO
161157

60.5 KB
Loading
11.8 KB
Loading
20.1 KB
Loading
59.6 KB
Loading
71.5 KB
Loading
56.1 KB
Loading
349 KB
Loading

articles/governance/management-groups/overview.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Organize your resources with management groups - Azure Governance
33
description: Learn about the management groups, how their permissions work, and how to use them.
4-
ms.date: 01/24/2023
4+
ms.date: 04/20/2023
55
ms.topic: overview
66
author: tfitzmac
77
ms.author: tomfitz
@@ -139,11 +139,10 @@ details on moving items within the hierarchy.
139139

140140
## Azure custom role definition and assignment
141141

142-
Azure custom role support for management groups is currently in preview with some
143-
[limitations](#limitations). You can define the management group scope in the Role Definition's
144-
assignable scope. That Azure custom role will then be available for assignment on that management
145-
group and any management group, subscription, resource group, or resource under it. This custom role
146-
will inherit down the hierarchy like any built-in role.
142+
You can define a management group as an assignable scope in an Azure custom role definition.
143+
The Azure custom role will then be available for assignment on that management
144+
group and any management group, subscription, resource group, or resource under it. The custom role
145+
will inherit down the hierarchy like any built-in role. For information about the limitations with custom roles and management groups, see [Limitations](#limitations).
147146

148147
### Example definition
149148

@@ -232,13 +231,6 @@ There are limitations that exist when using custom roles on management groups.
232231
definition's assignable scope. If there's a typo or an incorrect management group ID listed, the
233232
role definition is still created.
234233

235-
> [!IMPORTANT]
236-
> Adding a management group to `AssignableScopes` is currently in preview. This preview version is
237-
> provided without a service-level agreement, and it's not recommended for production workloads.
238-
> Certain features might not be supported or might have constrained capabilities. For more
239-
> information, see
240-
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
241-
242234
## Moving management groups and subscriptions
243235

244236
To move a management group or subscription to be a child of another management group, three rules

articles/role-based-access-control/custom-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 04/05/2023
10+
ms.date: 04/20/2023
1111
ms.author: rolyon
1212
---
1313

1414
# Azure custom roles
1515

16-
If the [Azure built-in roles](built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group (in preview only), subscription, and resource group scopes.
16+
If the [Azure built-in roles](built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
1717

1818
Custom roles can be shared between subscriptions that trust the same Azure AD tenant. There is a limit of **5,000** custom roles per tenant. (For Azure China 21Vianet, the limit is 2,000 custom roles.) Custom roles can be created using the Azure portal, Azure PowerShell, Azure CLI, or the REST API.
1919

0 commit comments

Comments
 (0)