You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/manage-users-overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,13 @@ Sign into the OT sensors to [define sensor users](manage-users-sensor.md), and s
27
27
28
28
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
29
29
30
-
### Entra ID support on sensors and on-premises management consoles
30
+
### Microsoft Entra ID support on sensors and on-premises management consoles
31
31
32
-
You might want to configure an integration between your sensor and Entra ID to allow Entra ID users to sign in to your sensor, or to use Entra ID groups, with collective permissions assigned to all users in the group.
32
+
You might want to configure an integration between your sensor and Microsoft Entra ID to allow Microsoft Entra ID users to sign in to your sensor, or to use Microsoft Entra ID groups, with collective permissions assigned to all users in the group.
33
33
34
-
For example, use Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
34
+
For example, use Microsoft Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
35
35
36
-
Defender for IoT's integration with Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
36
+
Defender for IoT's integration with Microsoft Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
37
37
38
38
-**Full authentication**: User details are retrieved from the LDAP server. Examples are the first name, last name, email, and user permissions.
39
39
@@ -46,7 +46,7 @@ For more information, see:
46
46
47
47
### Single sign-on for login to the sensor console
48
48
49
-
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
49
+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/set-up-sso.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
8
8
9
9
# Set up single sign-on for the sensor console
10
10
11
-
In this article, you learn how to set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites.
11
+
In this article, you learn how to set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites.
12
12
13
-
Using Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
13
+
Using Microsoft Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
14
14
15
15
> [!NOTE]
16
16
> Signing in via SSO is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -19,21 +19,21 @@ Using Entra ID simplifies the onboarding and offboarding processes, reduces admi
19
19
## Prerequisites
20
20
21
21
Before you begin:
22
-
-[Synchronize on-premises active directory with Entra ID](/azure/architecture/reference-architectures/identity/azure-ad).
22
+
-[Synchronize on-premises active directory with Microsoft Entra ID](/azure/architecture/reference-architectures/identity/azure-ad).
23
23
- Add outbound allow rules to your firewall, proxy server, and so on. You can access the list of required endpoints from the [Sites and sensors page](how-to-manage-sensors-on-the-cloud.md#endpoint).
24
-
- If you don't have existing Entra ID user groups to use for SSO authorization, work with your organization's identity manager to create relevant user groups.
24
+
- If you don't have existing Microsoft Entra ID user groups to use for SSO authorization, work with your organization's identity manager to create relevant user groups.
25
25
- Verify that you have the following permissions:
26
-
- A Member user on Entra ID.
26
+
- A Member user on Microsoft Entra ID.
27
27
- Admin, Contributor, or Security Admin permissions on the Defender for IoT subscription.
28
28
- Ensure that each user has a **First name**, **Last name**, and **User principal name**.
29
29
- If needed, set up [Multifactor authentication (MFA)](/entra/identity/authentication/tutorial-enable-azure-mfa).
30
30
31
-
## Create application ID on Entra ID
31
+
## Create application ID on Microsoft Entra ID
32
32
33
33
1. In the Azure portal, open Microsoft Entra ID.
34
34
1. Select **Add > App registration**.
35
35
36
-
:::image type="content" source="media/set-up-sso/create-application-id.png" alt-text="Screenshot of adding a new app registration on the Entra ID Overview page." lightbox="media/set-up-sso/create-application-id.png":::
36
+
:::image type="content" source="media/set-up-sso/create-application-id.png" alt-text="Screenshot of adding a new app registration on the Microsoft Entra ID Overview page." lightbox="media/set-up-sso/create-application-id.png":::
37
37
38
38
1. In the **Register an application** page:
39
39
- Under **Name**, type a name for your application.
@@ -43,10 +43,10 @@ Before you begin:
43
43
> [!NOTE]
44
44
> Adding the URI at this stage is required for SSO to work.
45
45
46
-
:::image type="content" source="media/set-up-sso/register-application.png" alt-text="Screenshot of registering an application on Entra ID." lightbox="media/set-up-sso/register-application.png":::
46
+
:::image type="content" source="media/set-up-sso/register-application.png" alt-text="Screenshot of registering an application on Microsoft Entra ID." lightbox="media/set-up-sso/register-application.png":::
47
47
48
48
1. Select **Register**.
49
-
Entra ID displays your newly registered application.
49
+
Microsoft Entra ID displays your newly registered application.
50
50
51
51
## Add your sensor URIs
52
52
@@ -55,9 +55,9 @@ Before you begin:
55
55
1. Select **Add URI** to add another row, and type an IP or hostname.
56
56
1. Repeat this step for the rest of the connected sensors.
57
57
58
-
When Entra ID adds the URIs successfully, a "Your redirect URI is eligible for the Authorization Code Flow with PKCE" message is displayed.
58
+
When Microsoft Entra ID adds the URIs successfully, a "Your redirect URI is eligible for the Authorization Code Flow with PKCE" message is displayed.
59
59
60
-
:::image type="content" source="media/set-up-sso/authentication.png" alt-text="Screenshot of setting up URIs for your application on the Entra ID Authentication page." lightbox="media/set-up-sso/authentication.png":::
60
+
:::image type="content" source="media/set-up-sso/authentication.png" alt-text="Screenshot of setting up URIs for your application on the Microsoft Entra ID Authentication page." lightbox="media/set-up-sso/authentication.png":::
61
61
62
62
1. Select **Save**.
63
63
@@ -66,7 +66,7 @@ Before you begin:
66
66
1. In your new application, select **API permissions**.
67
67
1. Next to **Add a permission**, select **Grant admin consent for \<Directory name\>**.
68
68
69
-
:::image type="content" source="media/set-up-sso/api-permissions.png" alt-text="Screenshot of setting up API permissions in Entra ID." lightbox="media/set-up-sso/api-permissions.png":::
69
+
:::image type="content" source="media/set-up-sso/api-permissions.png" alt-text="Screenshot of setting up API permissions in Microsoft Entra ID." lightbox="media/set-up-sso/api-permissions.png":::
70
70
71
71
## Create SSO configuration
72
72
@@ -79,7 +79,7 @@ Before you begin:
79
79
:::image type="content" source="media/set-up-sso/sensor-setting-sso.png" alt-text="Screenshot of creating a new Single sign-on sensor setting in Defender for IoT.":::
80
80
81
81
1. In the **Settings** tab:
82
-
1. Next to **Application name**, select the ID of the [application you created in Entra ID](#create-application-id-on-entra-id).
82
+
1. Next to **Application name**, select the ID of the [application you created in Microsoft Entra ID](#create-application-id-on-entra-id).
83
83
1. Under **Permissions management**, assign the **Admin**, **Security analyst**, and **Read only** permissions to relevant user groups. You can select multiple user groups.
84
84
85
85
:::image type="content" source="media/set-up-sso/permissions-management.png" alt-text="Screenshot of setting up permissions in the Defender for IoT sensor settings.":::
@@ -103,7 +103,7 @@ To test signing in with SSO:
103
103
104
104
1. Open [Defender for IoT](https://portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/%7E/Getting_started) on the Azure portal, and select **SSO Sign-in**.
105
105
106
-
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO":::
106
+
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO.":::
107
107
108
108
1. For the first sign in, in the **Sign in** page, type your personal credentials (your work email and password).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,11 +24,11 @@ Features released earlier than nine months ago are described in the [What's new
24
24
25
25
#### Single sign-on for the sensor console
26
26
27
-
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. SSO allows simple sign in for your organization's users, allows your organization to meet regulation standards, and increases your security posture. With SSO, your users don't need multiple login credentials across different sensors and sites.
27
+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. SSO allows simple sign in for your organization's users, allows your organization to meet regulation standards, and increases your security posture. With SSO, your users don't need multiple login credentials across different sensors and sites.
28
28
29
-
Using Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
29
+
Using Microsoft Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
30
30
31
-
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO":::
31
+
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO.":::
32
32
33
33
For more information, see [Set up single sign-on on for the sensor console](set-up-sso.md).
0 commit comments