Skip to content

Commit 5237d69

Browse files
committed
Fixing PR review issues
1 parent 99c51d3 commit 5237d69

File tree

4 files changed

+22
-22
lines changed

4 files changed

+22
-22
lines changed

articles/defender-for-iot/organizations/manage-users-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ Sign into the OT sensors to [define sensor users](manage-users-sensor.md), and s
2727

2828
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
2929

30-
### Entra ID support on sensors and on-premises management consoles
30+
### Microsoft Entra ID support on sensors and on-premises management consoles
3131

32-
You might want to configure an integration between your sensor and Entra ID to allow Entra ID users to sign in to your sensor, or to use Entra ID groups, with collective permissions assigned to all users in the group.
32+
You might want to configure an integration between your sensor and Microsoft Entra ID to allow Microsoft Entra ID users to sign in to your sensor, or to use Microsoft Entra ID groups, with collective permissions assigned to all users in the group.
3333

34-
For example, use Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
34+
For example, use Microsoft Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
3535

36-
Defender for IoT's integration with Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
36+
Defender for IoT's integration with Microsoft Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
3737

3838
- **Full authentication**: User details are retrieved from the LDAP server. Examples are the first name, last name, email, and user permissions.
3939

@@ -46,7 +46,7 @@ For more information, see:
4646

4747
### Single sign-on for login to the sensor console
4848

49-
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
49+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
5050

5151
### On-premises global access groups
5252

articles/defender-for-iot/organizations/set-up-sso.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
88

99
# Set up single sign-on for the sensor console
1010

11-
In this article, you learn how to set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites.
11+
In this article, you learn how to set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites.
1212

13-
Using Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
13+
Using Microsoft Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
1414

1515
> [!NOTE]
1616
> Signing in via SSO is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -19,21 +19,21 @@ Using Entra ID simplifies the onboarding and offboarding processes, reduces admi
1919
## Prerequisites
2020

2121
Before you begin:
22-
- [Synchronize on-premises active directory with Entra ID](/azure/architecture/reference-architectures/identity/azure-ad).
22+
- [Synchronize on-premises active directory with Microsoft Entra ID](/azure/architecture/reference-architectures/identity/azure-ad).
2323
- Add outbound allow rules to your firewall, proxy server, and so on. You can access the list of required endpoints from the [Sites and sensors page](how-to-manage-sensors-on-the-cloud.md#endpoint).
24-
- If you don't have existing Entra ID user groups to use for SSO authorization, work with your organization's identity manager to create relevant user groups.
24+
- If you don't have existing Microsoft Entra ID user groups to use for SSO authorization, work with your organization's identity manager to create relevant user groups.
2525
- Verify that you have the following permissions:
26-
- A Member user on Entra ID.
26+
- A Member user on Microsoft Entra ID.
2727
- Admin, Contributor, or Security Admin permissions on the Defender for IoT subscription.
2828
- Ensure that each user has a **First name**, **Last name**, and **User principal name**.
2929
- If needed, set up [Multifactor authentication (MFA)](/entra/identity/authentication/tutorial-enable-azure-mfa).
3030

31-
## Create application ID on Entra ID
31+
## Create application ID on Microsoft Entra ID
3232
3333
1. In the Azure portal, open Microsoft Entra ID.
3434
1. Select **Add > App registration**.
3535

36-
:::image type="content" source="media/set-up-sso/create-application-id.png" alt-text="Screenshot of adding a new app registration on the Entra ID Overview page." lightbox="media/set-up-sso/create-application-id.png":::
36+
:::image type="content" source="media/set-up-sso/create-application-id.png" alt-text="Screenshot of adding a new app registration on the Microsoft Entra ID Overview page." lightbox="media/set-up-sso/create-application-id.png":::
3737

3838
1. In the **Register an application** page:
3939
- Under **Name**, type a name for your application.
@@ -43,10 +43,10 @@ Before you begin:
4343
> [!NOTE]
4444
> Adding the URI at this stage is required for SSO to work.
4545
46-
:::image type="content" source="media/set-up-sso/register-application.png" alt-text="Screenshot of registering an application on Entra ID." lightbox="media/set-up-sso/register-application.png":::
46+
:::image type="content" source="media/set-up-sso/register-application.png" alt-text="Screenshot of registering an application on Microsoft Entra ID." lightbox="media/set-up-sso/register-application.png":::
4747

4848
1. Select **Register**.
49-
Entra ID displays your newly registered application.
49+
Microsoft Entra ID displays your newly registered application.
5050

5151
## Add your sensor URIs
5252
@@ -55,9 +55,9 @@ Before you begin:
5555
1. Select **Add URI** to add another row, and type an IP or hostname.
5656
1. Repeat this step for the rest of the connected sensors.
5757

58-
When Entra ID adds the URIs successfully, a "Your redirect URI is eligible for the Authorization Code Flow with PKCE" message is displayed.
58+
When Microsoft Entra ID adds the URIs successfully, a "Your redirect URI is eligible for the Authorization Code Flow with PKCE" message is displayed.
5959

60-
:::image type="content" source="media/set-up-sso/authentication.png" alt-text="Screenshot of setting up URIs for your application on the Entra ID Authentication page." lightbox="media/set-up-sso/authentication.png":::
60+
:::image type="content" source="media/set-up-sso/authentication.png" alt-text="Screenshot of setting up URIs for your application on the Microsoft Entra ID Authentication page." lightbox="media/set-up-sso/authentication.png":::
6161

6262
1. Select **Save**.
6363

@@ -66,7 +66,7 @@ Before you begin:
6666
1. In your new application, select **API permissions​**.
6767
1. Next to **Add a permission**, select **Grant admin consent for \<Directory name\>**.
6868

69-
:::image type="content" source="media/set-up-sso/api-permissions.png" alt-text="Screenshot of setting up API permissions in Entra ID." lightbox="media/set-up-sso/api-permissions.png":::
69+
:::image type="content" source="media/set-up-sso/api-permissions.png" alt-text="Screenshot of setting up API permissions in Microsoft Entra ID." lightbox="media/set-up-sso/api-permissions.png":::
7070

7171
## Create SSO configuration​
7272

@@ -79,7 +79,7 @@ Before you begin:
7979
:::image type="content" source="media/set-up-sso/sensor-setting-sso.png" alt-text="Screenshot of creating a new Single sign-on sensor setting in Defender for IoT.":::
8080

8181
1. In the **Settings** tab:
82-
1. Next to **Application name**, select the ID of the [application you created in Entra ID](#create-application-id-on-entra-id).
82+
1. Next to **Application name**, select the ID of the [application you created in Microsoft Entra ID](#create-application-id-on-entra-id).
8383
1. Under **Permissions management**, assign the **Admin**, **Security analyst**, and **Read only​** permissions to relevant user groups. You can select multiple user groups​.
8484

8585
:::image type="content" source="media/set-up-sso/permissions-management.png" alt-text="Screenshot of setting up permissions in the Defender for IoT sensor settings.":::
@@ -103,7 +103,7 @@ To test signing in with SSO:
103103
104104
1. Open [Defender for IoT](https://portal.azure.com/#view/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/%7E/Getting_started) on the Azure portal, and select **SSO Sign-in**.
105105

106-
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO":::
106+
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO.":::
107107

108108
1. For the first sign in, in the **Sign in** page, type your personal credentials (your work email and password).
109109

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,11 @@ Features released earlier than nine months ago are described in the [What's new
2424

2525
#### Single sign-on for the sensor console
2626

27-
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Entra ID. SSO allows simple sign in for your organization's users, allows your organization to meet regulation standards, and increases your security posture. With SSO, your users don't need multiple login credentials across different sensors and sites.
27+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. SSO allows simple sign in for your organization's users, allows your organization to meet regulation standards, and increases your security posture. With SSO, your users don't need multiple login credentials across different sensors and sites.
2828

29-
Using Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
29+
Using Microsoft Entra ID simplifies the onboarding and offboarding processes, reduces administrative overhead, and ensures consistent access controls across the organization.
3030

31-
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO":::
31+
:::image type="content" source="media/set-up-sso/sso-sign-in.png" alt-text="Screenshot of the sensor console login screen with SSO.":::
3232

3333
For more information, see [Set up single sign-on on for the sensor console](set-up-sso.md).
3434

0 commit comments

Comments
 (0)