Skip to content

Commit 5074752

Browse files
authored
Merge pull request #210854 from MicrosoftDocs/main
9/12 AM Publish
2 parents d42e568 + 703b0a6 commit 5074752

File tree

72 files changed

+600
-240
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+600
-240
lines changed

articles/active-directory/enterprise-users/directory-overview-user-model.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,23 +21,23 @@ ms.collection: M365-identity-device-management
2121

2222
This article introduces and administrator for Azure Active Directory (Azure AD), part of Microsoft Entra, to the relationship between top [identity management](../fundamentals/active-directory-whatis.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) tasks for users in terms of their groups, licenses, deployed enterprise apps, and administrator roles. As your organization grows, you can use Azure AD groups and administrator roles to:
2323

24-
* Assign licenses to groups instead of to individually
25-
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles
26-
* Assign enterprise app access to groups
24+
* Assign licenses to groups instead of to individual users.
25+
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles.
26+
* Assign enterprise app access to groups.
2727

2828
## Assign users to groups
2929

3030
You can use groups in Azure AD to assign licenses to large numbers of users, or to assign user access to deployed enterprise apps. You can use groups to assign all administrator roles except for Global Administrator in Azure AD, or you can grant access to resources that are external, such as SaaS applications or SharePoint sites.
3131

32-
For additional flexibility and to reduce the work of managing group membership, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
32+
For additional flexibility and to reduce group membership management work, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
3333

3434
## Assign licenses to groups
3535

3636
Assigning or removing licenses from users individually can demand time and attention. If you [assign licenses to groups](../fundamentals/license-users-groups.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) instead, you can make your large-scale license management easier.
3737

38-
In Azure AD, when users join a licensed group, they're automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
38+
Azure AD users who join a licensed group are automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
3939

40-
If there are not enough available licenses, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
40+
If there aren't enough licenses available, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
4141

4242
## Delegate administrator roles
4343

articles/active-directory/saas-apps/clearcompany-tutorial.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/09/2021
12+
ms.date: 09/12/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with ClearCompany
@@ -70,11 +70,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7070

7171
![Edit Basic SAML Configuration](common/edit-urls.png)
7272

73-
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following step:
73+
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
7474

75-
In the **Identifier** text box, type the URL:
75+
a. In the **Identifier** text box, type the URL:
7676
`https://api.clearcompany.com`
7777

78+
b. In the **Reply URL** text box, type the URL:
79+
`https://api.clearcompany.com/v1/auth/sso/saml`
80+
7881
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
7982

8083
In the **Sign-on URL** text box, type a URL using the following pattern:
@@ -129,15 +132,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
129132

130133
#### SP initiated:
131134

132-
* Click on **Test this application** in Azure portal. This will redirect to ClearCompany Sign on URL where you can initiate the login flow.
135+
* Click on **Test this application** in Azure portal. This will redirect to ClearCompany Sign-on URL where you can initiate the login flow.
133136

134-
* Go to ClearCompany Sign-on URL directly and initiate the login flow from there.
137+
* Go to ClearCompany Sign on URL directly and initiate the login flow from there.
135138

136139
#### IDP initiated:
137140

138141
* Click on **Test this application** in Azure portal and you should be automatically signed in to the ClearCompany for which you set up the SSO.
139142

140-
You can also use Microsoft My Apps to test the application in any mode. When you click the ClearCompany tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the ClearCompany for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
143+
You can also use Microsoft My Apps to test the application in any mode. When you click the ClearCompany tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the ClearCompany for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
141144

142145
## Next steps
143146

articles/active-directory/saas-apps/infor-cloudsuite-provisioning-tutorial.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,14 @@ Before configuring and enabling automatic user provisioning, you should decide w
6868
5. To generate the bearer token, copy the **User Identifier** and **SCIM Password**. Paste them in notepad++ separated by a colon. Encode the string value by navigating to **Plugins > MIME Tools > Basic64 Encode**.
6969

7070
:::image type="content" source="media/infor-cloudsuite-provisioning-tutorial/token.png" alt-text="Screenshot of a Notepad++ document. In the Plugins menu, MIME tools is highlighted. In the MIME tools menu, Base64 encode is highlighted." border="false":::
71+
72+
To generate the bearer token using PowerShell instead of Notepad++, use the following commands:
73+
```powershell
74+
$Identifier = "<User Identifier>"
75+
$SCIMPassword = "<SCIM Password>"
76+
$bytes = [System.Text.Encoding]::UTF8.GetBytes($($Identifier):$($SCIMPassword))
77+
[Convert]::ToBase64String($bytes)
78+
```
7179

7280
3. Copy the bearer token. This value will be entered in the Secret Token field in the Provisioning tab of your Infor CloudSuite application in the Azure portal.
7381

0 commit comments

Comments
 (0)