Skip to content

Commit 541f255

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into oct1719
2 parents d2c5f2d + 6d42d93 commit 541f255

File tree

66 files changed

+1015
-728
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1015
-728
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-spa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
167167
| response_type |Required |Must include `id_token` for OpenID Connect sign-in. It might also include the response type `token`. If you use `token` here, your app can immediately receive an access token from the authorize endpoint, without making a second request to the authorize endpoint. If you use the `token` response type, the `scope` parameter must contain a scope that indicates which resource to issue the token for. |
168168
| redirect_uri |Recommended |The redirect URI of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect URIs you registered in the portal, except that it must be URL-encoded. |
169169
| scope |Required |A space-separated list of scopes. For getting tokens, include all scopes that you require for the intended resource. |
170-
| response_mode |Recommended |Specifies the method that is used to send the resulting token back to your app. Can be `query`, `form_post`, or `fragment`. |
170+
| response_mode |Recommended |Specifies the method that is used to send the resulting token back to your app. For implicit flow, use `fragment`. Two other modes can be specified, `query` and `form_post`, but do not work in the implicit flow. |
171171
| state |Recommended |A value included in the request that is returned in the token response. It can be a string of any content that you want to use. Usually, a randomly generated, unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page or view the user was on. |
172172
| nonce |Required |A value included in the request, generated by the app, that is included in the resulting ID token as a claim. The app can then verify this value to mitigate token replay attacks. Usually, the value is a randomized, unique string that identifies the origin of the request. |
173173
| prompt |Required |To refresh and get tokens in a hidden iframe, use `prompt=none` to ensure that the iframe does not get stuck on the sign-in page, and returns immediately. |
@@ -246,4 +246,4 @@ This sample on GitHub is intended to help get you started with Azure AD B2C in a
246246

247247
<!-- Links - EXTERNAL -->
248248
[github-hello-js-example]: https://github.com/azure-ad-b2c/apps/tree/master/spa/javascript-hellojs-singlepageapp-popup
249-
[github-hello-js]: https://github.com/MrSwitch/hello.js
249+
[github-hello-js]: https://github.com/MrSwitch/hello.js

articles/active-directory/saas-apps/4me-tutorial.md

Lines changed: 75 additions & 141 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/bluejeans-tutorial.md

Lines changed: 90 additions & 134 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/ebsco-tutorial.md

Lines changed: 23 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 08/24/2019
17+
ms.date: 10/11/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -45,7 +45,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4545
* EBSCO supports **Just In Time** user provisioning
4646

4747
> [!NOTE]
48-
> Because the identifier of this application is a fixed string value, only one instance can be configured in one tenant.
48+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
4949
5050
## Adding EBSCO from the gallery
5151

@@ -65,10 +65,10 @@ Configure and test Azure AD SSO with EBSCO using a test user called **B.Simon**.
6565
To configure and test Azure AD SSO with EBSCO, complete the following building blocks:
6666

6767
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
68-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
69-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
69+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
7070
1. **[Configure EBSCO SSO](#configure-ebsco-sso)** - to configure the single sign-on settings on application side.
71-
1. **[Create EBSCO test user](#create-ebsco-test-user)** - to have a counterpart of B.Simon in EBSCO that is linked to the Azure AD representation of user.
71+
* **[Create EBSCO test user](#create-ebsco-test-user)** - to have a counterpart of B.Simon in EBSCO that is linked to the Azure AD representation of user.
7272
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
7373

7474
## Configure Azure AD SSO
@@ -100,6 +100,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
100100

101101
o **Profile** = Clients can tailor the link to direct users to a specific profile (depending on what they purchase from EBSCO). They can enter a specific profile ID. The main IDs are eds (EBSCO Discovery Service) and ehost (EBSOCOhost databases). Instructions for the same are given [here](https://help.ebsco.com/interfaces/EBSCOhost/EBSCOhost_FAQs/How_do_I_set_up_direct_links_to_EBSCOhost_profiles_and_or_databases#profile).
102102

103+
1. EBSCO application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
104+
105+
![image](common/default-attributes.png)
106+
107+
> [!Note]
108+
> The **name** attribute is mandatory and it is mapped with **Name Identifier value** in EBSCO application. This is added by default so you don't need to add this manually.
109+
110+
1. In addition to above, EBSCO application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
111+
112+
| Name | Source Attribute|
113+
| ---------------| --------------- |
114+
| FirstName | user.givenname |
115+
| LastName | user.surname |
116+
| Email | user.mail |
117+
103118
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
104119

105120
![The Certificate download link](common/metadataxml.png)
@@ -150,8 +165,8 @@ In the case of EBSCO, user provisioning is automatic.
150165

151166
Azure AD passes the required data to EBSCO application. EBSCO’s user provisioning can be automatic OR require a one-time form. It depends on whether the client has a lot of pre-existing EBSCOhost accounts with personal settings saved. The same can be discussed with the [EBSCO support team](mailto:[email protected]) during the implementation. Either way, the client doesn’t have to create any EBSCOhost accounts prior to testing.
152167

153-
>[!Note]
154-
>You can automate EBSCOhost user provisioning/personalization. Contact [EBSCO support team](mailto:[email protected]) about Just-In-Time user provisioning.
168+
> [!Note]
169+
> You can automate EBSCOhost user provisioning/personalization. Contact [EBSCO support team](mailto:[email protected]) about Just-In-Time user provisioning.
155170
156171
## Test SSO
157172

@@ -178,5 +193,4 @@ For more information about the Access Panel, see [Introduction to the Access Pan
178193

179194
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
180195

181-
- [Try EBSCO with Azure AD](https://aad.portal.azure.com/)
182-
196+
- [Try EBSCO with Azure AD](https://aad.portal.azure.com/)
Lines changed: 168 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,168 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with eCornell | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and eCornell.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: f88bc7ba-bf14-496b-9491-91965869eadf
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 10/18/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with eCornell
24+
25+
In this tutorial, you'll learn how to integrate eCornell with Azure Active Directory (Azure AD). When you integrate eCornell with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to eCornell.
28+
* Enable your users to be automatically signed-in to eCornell with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* eCornell single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* eCornell supports **SP** initiated SSO
45+
* eCornell supports **Just In Time** user provisioning
46+
47+
## Adding eCornell from the gallery
48+
49+
To configure the integration of eCornell into Azure AD, you need to add eCornell from the gallery to your list of managed SaaS apps.
50+
51+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52+
1. On the left navigation pane, select the **Azure Active Directory** service.
53+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54+
1. To add new application, select **New application**.
55+
1. In the **Add from the gallery** section, type **eCornell** in the search box.
56+
1. Select **eCornell** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57+
58+
## Configure and test Azure AD single sign-on for eCornell
59+
60+
Configure and test Azure AD SSO with eCornell using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in eCornell.
61+
62+
To configure and test Azure AD SSO with eCornell, complete the following building blocks:
63+
64+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
65+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67+
1. **[Configure eCornell SSO](#configure-ecornell-sso)** - to configure the single sign-on settings on application side.
68+
* **[Create eCornell test user](#create-ecornell-test-user)** - to have a counterpart of B.Simon in eCornell that is linked to the Azure AD representation of user.
69+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
70+
71+
## Configure Azure AD SSO
72+
73+
Follow these steps to enable Azure AD SSO in the Azure portal.
74+
75+
1. In the [Azure portal](https://portal.azure.com/), on the **eCornell** application integration page, find the **Manage** section and select **single sign-on**.
76+
1. On the **Select a single sign-on method** page, select **SAML**.
77+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
78+
79+
![Edit Basic SAML Configuration](common/edit-urls.png)
80+
81+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
82+
83+
a. In the **Sign-on URL** text box, type a URL using the following pattern:
84+
`https://admin.ecornell.com/sso/clp/<groupCode>`
85+
86+
b. In the **Identifier** box, type a URL using the following pattern:
87+
`http://pingone.com/<eCornellCustomGUID>`
88+
89+
c. In the **Reply URL** text box, type a URL using the following pattern:
90+
`https://sso.connect.pingidentity.com/sso/sp/ACS.saml2?saasid=<CustomGUID>`
91+
92+
> [!NOTE]
93+
> These values are not real. Update these values with the actual Sign-On URL, Identifier and Reply URL. Contact [eCornell Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
94+
95+
1. eCornell application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
96+
97+
![image](common/default-attributes.png)
98+
99+
1. In addition to above, eCornell application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
100+
101+
| Name | Source Attribute|
102+
| -------------- | --------- |
103+
| firstName | user.givenname |
104+
| lastName | user.surname |
105+
| email | user.mail |
106+
| SAML_SUBJECT | user.userprincipalname |
107+
108+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
109+
110+
![The Certificate download link](common/metadataxml.png)
111+
112+
1. On the **Set up eCornell** section, copy the appropriate URL(s) based on your requirement.
113+
114+
![Copy configuration URLs](common/copy-configuration-urls.png)
115+
116+
### Create an Azure AD test user
117+
118+
In this section, you'll create a test user in the Azure portal called B.Simon.
119+
120+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
121+
1. Select **New user** at the top of the screen.
122+
1. In the **User** properties, follow these steps:
123+
1. In the **Name** field, enter `B.Simon`.
124+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
125+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
126+
1. Click **Create**.
127+
128+
### Assign the Azure AD test user
129+
130+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to eCornell.
131+
132+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
133+
1. In the applications list, select **eCornell**.
134+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
135+
136+
![The "Users and groups" link](common/users-groups-blade.png)
137+
138+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
139+
140+
![The Add User link](common/add-assign-user.png)
141+
142+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
143+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144+
1. In the **Add Assignment** dialog, click the **Assign** button.
145+
146+
## Configure eCornell SSO
147+
148+
To configure single sign-on on **eCornell** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [eCornell support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
149+
150+
### Create eCornell test user
151+
152+
In this section, a user called B.Simon is created in eCornell. eCornell supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in eCornell, a new one is created after authentication.
153+
154+
## Test SSO
155+
156+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
157+
158+
When you click the eCornell tile in the Access Panel, you should be automatically signed in to the eCornell for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
159+
160+
## Additional resources
161+
162+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
163+
164+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
165+
166+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
167+
168+
- [Try eCornell with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)