Skip to content

Commit 54e7b2e

Browse files
authored
Merge pull request #175334 from MicrosoftDocs/master
10/11 PM Publish
2 parents af30326 + 2ca0d4a commit 54e7b2e

File tree

188 files changed

+2518
-941
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

188 files changed

+2518
-941
lines changed

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/17/2021
4+
ms.date: 10/11/2021
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,7 @@ Here are the sample test cases for passwordless authentication with security key
297297
| User can't perform combined registration.| Ensure [combined registration](concept-registration-mfa-sspr-combined.md) is enabled. |
298298
| User can't add a security key in their [security settings](https://aka.ms/mysecurityinfo).| Ensure that [security keys](howto-authentication-passwordless-security-key.md) are enabled. |
299299
| User can't add security key in Windows 10 sign-in options.| [Ensure that security keys for Windows sign in](concept-authentication-passwordless.md) are enabled |
300-
| **Error message**: We detected that this browser or OS doesn't support FIDO2 security keys.| Passwordless FIDO2 security devices can only be registered in supported browsers (Microsoft Edge, Firefox version 67) o Windows 10 version 1809 or higher. |
300+
| **Error message**: We detected that this browser or OS doesn't support FIDO2 security keys.| Passwordless FIDO2 security devices can only be registered in supported browsers (Microsoft Edge, Firefox version 67) on Windows 10 version 1809 or higher. |
301301
| **Error message**: Your company policy requires that you use a different method to sign in.| Ensure security keys are enabled in the tenant. |
302302
| User unable to manage my security key on Windows 10 version 1809| Version 1809 requires that you use the security key management software provided by the FIDO2 key vendor. Contact the vendor for support. |
303303
| I think my FIDO2 security key may be defective—how can I test it.| Navigate to [https://webauthntest.azurewebsites.net/](https://webauthntest.azurewebsites.net/), enter credentials for a test account, plug in the suspect security key, select the + button at the top right of the screen, select create, and go through the creation process. If this scenario fails, your device may be defective. |
@@ -382,4 +382,4 @@ Select the user row, and then select the **Authentication Details** tab to view
382382

383383
* [Learn how passwordless authentication works](concept-authentication-passwordless.md)
384384

385-
* [Deploy other identity features](../fundamentals/active-directory-deployment-plans.md)
385+
* [Deploy other identity features](../fundamentals/active-directory-deployment-plans.md)

articles/active-directory/conditional-access/resilience-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ You can configure Conditional Access resilience defaults from the Azure portal,
8383

8484
### MS Graph APIs
8585

86-
You can also manage resilience defaults for your Conditional Access policies using the MS Graph API and the [Microsoft Graph Explorer](/graph/graph-explorer).
86+
You can also manage resilience defaults for your Conditional Access policies using the MS Graph API and the [Microsoft Graph Explorer](/graph/graph-explorer/graph-explorer-overview).
8787

8888
Sample request URL:
8989

articles/active-directory/fundamentals/security-operations-introduction.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,10 @@ Microsoft has many products and services that enable you to customize your IT en
6868

6969
* [Security baseline (FINAL) for Windows 10 v1909 and Windows Server v1909](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-final-for-windows-10-v1909-and-windows-server/ba-p/1023093)
7070

71+
* [Security baseline for Windows 11](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-security-baseline/ba-p/2810772)
72+
73+
* [Security baseline for Windows Server 2022](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-server-2022-security-baseline/ba-p/2724685)
74+
7175
* On-premises environments
7276

7377
* [Microsoft Defender for Identity architecture](/defender-for-identity/architecture)

articles/active-directory/governance/entitlement-management-group-licenses.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ For more information, see [License requirements](entitlement-management-overview
5353

5454
1. Select **Next: Resource roles** to go to the **Resource roles** tab.
5555

56-
2. On this tab, you select the resources and the resource role to include in the access package. In this scenario, select **Groups and Teams** and search for your group that has assigned [Office licenses](/active-directory/enterprise-users/licensing-groups-assign.md).
56+
2. On this tab, you select the resources and the resource role to include in the access package. In this scenario, select **Groups and Teams** and search for your group that has assigned [Office licenses](/azure/active-directory/enterprise-users/licensing-groups-assign).
5757

5858
3. In the **Role** list, select **Member**.
5959

@@ -139,4 +139,4 @@ In this step, you can delete the Office Licenses access package.
139139

140140
Learn how to create access packages to manage access to other types of resources, like applications and sites:
141141

142-
[Manage access to resources in Azure AD entitlement management](/active-directory/governance/entitlement-management-access-package-first.md)
142+
[Manage access to resources in Azure AD entitlement management](/azure/active-directory/governance/entitlement-management-access-package-first)

articles/active-directory/governance/entitlement-management-onboard-external-user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,4 +129,4 @@ In this step, you can delete the **External user package** access package.
129129

130130
## Next steps
131131

132-
Learn about creating access packages to manage access to other types of resources such as applications, and sites. [Tutorial: Manage access to resources in Azure AD entitlement management](/active-directory/governance/entitlement-management-access-package-first.md)
132+
Learn about creating access packages to manage access to other types of resources such as applications, and sites. [Tutorial: Manage access to resources in Azure AD entitlement management](/azure/active-directory/governance/entitlement-management-access-package-first)

articles/active-directory/saas-apps/axiad-cloud-tutorial.md

Lines changed: 23 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Axiad Cloud | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Axiad Cloud'
33
description: Learn how to configure single sign-on between Azure Active Directory and Axiad Cloud.
44
services: active-directory
55
author: jeevansd
@@ -9,20 +9,18 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 05/15/2020
12+
ms.date: 10/07/2021
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Axiad Cloud
16+
# Tutorial: Azure AD SSO integration with Axiad Cloud
1717

1818
In this tutorial, you'll learn how to integrate Axiad Cloud with Azure Active Directory (Azure AD). When you integrate Axiad Cloud with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to Axiad Cloud.
2121
* Enable your users to be automatically signed-in to Axiad Cloud with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25-
2624
## Prerequisites
2725

2826
To get started, you need the following items:
@@ -34,25 +32,24 @@ To get started, you need the following items:
3432

3533
In this tutorial, you configure and test Azure AD SSO in a test environment.
3634

37-
* Axiad Cloud supports **SP** initiated SSO
38-
* Once you configure Axiad Cloud you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
35+
* Axiad Cloud supports **SP** initiated SSO.
3936

40-
## Adding Axiad Cloud from the gallery
37+
## Add Axiad Cloud from the gallery
4138

4239
To configure the integration of Axiad Cloud into Azure AD, you need to add Axiad Cloud from the gallery to your list of managed SaaS apps.
4340

44-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
41+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4542
1. On the left navigation pane, select the **Azure Active Directory** service.
4643
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4744
1. To add new application, select **New application**.
4845
1. In the **Add from the gallery** section, type **Axiad Cloud** in the search box.
4946
1. Select **Axiad Cloud** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5047

51-
## Configure and test Azure AD single sign-on for Axiad Cloud
48+
## Configure and test Azure AD SSO for Axiad Cloud
5249

5350
Configure and test Azure AD SSO with Axiad Cloud using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Axiad Cloud.
5451

55-
To configure and test Azure AD SSO with Axiad Cloud, complete the following building blocks:
52+
To configure and test Azure AD SSO with Axiad Cloud, perform the following steps:
5653

5754
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5855
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -65,25 +62,25 @@ To configure and test Azure AD SSO with Axiad Cloud, complete the following buil
6562

6663
Follow these steps to enable Azure AD SSO in the Azure portal.
6764

68-
1. In the [Azure portal](https://portal.azure.com/), on the **Axiad Cloud** application integration page, find the **Manage** section and select **single sign-on**.
65+
1. In the Azure portal, on the **Axiad Cloud** application integration page, find the **Manage** section and select **single sign-on**.
6966
1. On the **Select a single sign-on method** page, select **SAML**.
70-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
67+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7168

7269
![Edit Basic SAML Configuration](common/edit-urls.png)
7370

74-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
75-
76-
a. In the **Sign on URL** text box, type a URL using the following pattern:
77-
`https://portal-<INSTANCE_NAME>.axiadids.net`
71+
1. On the **Basic SAML Configuration** section, perform the following steps:
7872

79-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
73+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
8074
`https://access-<INSTANCE_NAME>.axiadids.net/<CUSTOM_URL>`
8175

82-
c. In the **Reply URL** textbox, type a URL using the following pattern:
76+
b. In the **Reply URL** textbox, type a URL using the following pattern:
8377
`https://access-<INSTANCE_NAME>.axiadids.net/<CUSTOM_URL>`
8478

79+
c. In the **Sign on URL** text box, type a URL using the following pattern:
80+
`https://portal-<INSTANCE_NAME>.axiadids.net`
81+
8582
> [!NOTE]
86-
> These values are not real. Update these values with the actual Sign on URL, Identifier and Reply URL. Contact [Axiad Cloud Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
83+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Axiad Cloud Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8784

8885
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
8986

@@ -112,13 +109,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112109
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113110
1. In the applications list, select **Axiad Cloud**.
114111
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115-
116-
![The "Users and groups" link](common/users-groups-blade.png)
117-
118112
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
119-
120-
![The Add User link](common/add-assign-user.png)
121-
122113
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
123114
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
124115
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -133,20 +124,14 @@ In this section, you create a user called Britta Simon in Axiad Cloud. Work with
133124

134125
## Test SSO
135126

136-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
137-
138-
When you click the Axiad Cloud tile in the Access Panel, you should be automatically signed in to the Axiad Cloud for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
139-
140-
## Additional resources
141-
142-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
127+
In this section, you test your Azure AD single sign-on configuration with following options.
143128

144-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
129+
* Click on **Test this application** in Azure portal. This will redirect to Axiad Cloud Sign-on URL where you can initiate the login flow.
145130

146-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
131+
* Go to Axiad Cloud Sign-on URL directly and initiate the login flow from there.
147132

148-
- [Try Axiad Cloud with Azure AD](https://aad.portal.azure.com/)
133+
* You can use Microsoft My Apps. When you click the Axiad Cloud tile in the My Apps, this will redirect to Axiad Cloud Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
149134

150-
- [What is session control in Microsoft Cloud App Security?](/cloud-app-security/proxy-intro-aad)
135+
## Next steps
151136

152-
- [How to protect Axiad Cloud with advanced visibility and controls](/cloud-app-security/proxy-intro-aad)
137+
Once you configure Axiad Cloud you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)