Skip to content

Commit 559af18

Browse files
author
Jill Grant
authored
Merge pull request #252269 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230920-132739-2802923-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra (part 39)
2 parents 7337b5c + 751a32f commit 559af18

40 files changed

+1185
-905
lines changed

articles/active-directory/saas-apps/teachme-biz-tutorial.md

Lines changed: 29 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Teachme Biz'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Teachme Biz.
2+
title: 'Tutorial: Microsoft Entra single sign-on (SSO) integration with Teachme Biz'
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and Teachme Biz.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -14,30 +14,30 @@ ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Teachme Biz
17+
# Tutorial: Microsoft Entra single sign-on (SSO) integration with Teachme Biz
1818

19-
In this tutorial, you'll learn how to integrate Teachme Biz with Azure Active Directory (Azure AD). When you integrate Teachme Biz with Azure AD, you can:
19+
In this tutorial, you'll learn how to integrate Teachme Biz with Microsoft Entra ID. When you integrate Teachme Biz with Microsoft Entra ID, you can:
2020

21-
* Control in Azure AD who has access to Teachme Biz.
22-
* Enable your users to be automatically signed-in to Teachme Biz with their Azure AD accounts.
21+
* Control in Microsoft Entra ID who has access to Teachme Biz.
22+
* Enable your users to be automatically signed-in to Teachme Biz with their Microsoft Entra accounts.
2323
* Manage your accounts in one central location.
2424

2525
## Prerequisites
2626

2727
To get started, you need the following items:
2828

29-
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29+
* A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Teachme Biz single sign-on (SSO) enabled subscription.
3131

3232
## Scenario description
3333

34-
In this tutorial, you configure and test Azure AD SSO in a test environment.
34+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
3535

3636
* Teachme Biz supports **SP and IDP** initiated SSO.
3737

3838
## Add Teachme Biz from the gallery
3939

40-
To configure the integration of Teachme Biz into Azure AD, you need to add Teachme Biz from the gallery to your list of managed SaaS apps.
40+
To configure the integration of Teachme Biz into Microsoft Entra ID, you need to add Teachme Biz from the gallery to your list of managed SaaS apps.
4141

4242
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4343
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
@@ -46,22 +46,26 @@ To configure the integration of Teachme Biz into Azure AD, you need to add Teach
4646

4747
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
4848

49-
## Configure and test Azure AD SSO for Teachme Biz
49+
<a name='configure-and-test-azure-ad-sso-for-teachme-biz'></a>
5050

51-
Configure and test Azure AD SSO with Teachme Biz using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Teachme Biz.
51+
## Configure and test Microsoft Entra SSO for Teachme Biz
5252

53-
To configure and test Azure AD SSO with Teachme Biz, perform the following steps:
53+
Configure and test Microsoft Entra SSO with Teachme Biz using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Teachme Biz.
5454

55-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
55+
To configure and test Microsoft Entra SSO with Teachme Biz, perform the following steps:
56+
57+
1. **[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58+
1. **[Create a Microsoft Entra test user](#create-an-azure-ad-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
59+
1. **[Assign the Microsoft Entra test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
5860
1. **[Configure Teachme Biz SSO](#configure-teachme-biz-sso)** - to configure the single sign-on settings on application side.
59-
1. **[Create Teachme Biz test user](#create-teachme-biz-test-user)** - to have a counterpart of B.Simon in Teachme Biz that is linked to the Azure AD representation of user.
61+
1. **[Create Teachme Biz test user](#create-teachme-biz-test-user)** - to have a counterpart of B.Simon in Teachme Biz that is linked to the Microsoft Entra representation of user.
6062
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6163

62-
## Configure Azure AD SSO
64+
<a name='configure-azure-ad-sso'></a>
65+
66+
## Configure Microsoft Entra SSO
6367

64-
Follow these steps to enable Azure AD SSO.
68+
Follow these steps to enable Microsoft Entra SSO.
6569

6670
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6771
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Teachme Biz** > **Single sign-on**.
@@ -90,7 +94,9 @@ Follow these steps to enable Azure AD SSO.
9094

9195
![The Certificate download link](common/copy-metadataurl.png)
9296

93-
### Create an Azure AD test user
97+
<a name='create-an-azure-ad-test-user'></a>
98+
99+
### Create a Microsoft Entra test user
94100

95101
In this section, you'll create a test user called B.Simon.
96102

@@ -104,7 +110,9 @@ In this section, you'll create a test user called B.Simon.
104110
1. Select **Review + create**.
105111
1. Select **Create**.
106112

107-
### Assign the Azure AD test user
113+
<a name='assign-the-azure-ad-test-user'></a>
114+
115+
### Assign the Microsoft Entra test user
108116

109117
In this section, you'll enable B.Simon to use single sign-on by granting access to Teachme Biz.
110118

@@ -126,7 +134,7 @@ In this section, you create a user called Britta Simon in Teachme Biz. Work with
126134

127135
## Test SSO
128136

129-
In this section, you test your Azure AD single sign-on configuration with following options.
137+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
130138

131139
#### SP initiated:
132140

articles/active-directory/saas-apps/teamgo-provisioning-tutorial.md

Lines changed: 30 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Configure Teamgo for automatic user provisioning with Azure Active Directory'
3-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Teamgo.
2+
title: 'Tutorial: Configure Teamgo for automatic user provisioning with Microsoft Entra ID'
3+
description: Learn how to automatically provision and de-provision user accounts from Microsoft Entra ID to Teamgo.
44
services: active-directory
55
author: twimmers
66
writer: twimmers
@@ -16,56 +16,62 @@ ms.author: thwimmer
1616

1717
# Tutorial: Configure Teamgo for automatic user provisioning
1818

19-
This tutorial describes the steps you need to perform in both Teamgo and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Teamgo](https://www.teamgo.co/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19+
This tutorial describes the steps you need to perform in both Teamgo and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Teamgo](https://www.teamgo.co/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](../app-provisioning/user-provisioning.md).
2020

2121

2222
## Capabilities Supported
2323
> [!div class="checklist"]
2424
> * Create users in Teamgo
2525
> * Remove users in Teamgo when they do not require access anymore
26-
> * Keep user attributes synchronized between Azure AD and Teamgo
26+
> * Keep user attributes synchronized between Microsoft Entra ID and Teamgo
2727
> * [Single sign-on](teamgo-tutorial.md) to Teamgo (recommended)
2828
2929
## Prerequisites
3030

3131
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
3232

33-
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
34-
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
33+
* [A Microsoft Entra tenant](../develop/quickstart-create-new-tenant.md)
34+
* A user account in Microsoft Entra ID with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
3535
* A Teamgo account with Azure integration supported.
3636

37-
## Step 1. Plan your provisioning deployment
37+
## Step 1: Plan your provisioning deployment
3838
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
3939
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40-
3. Determine what data to [map between Azure AD and Teamgo](../app-provisioning/customize-application-attributes.md).
40+
3. Determine what data to [map between Microsoft Entra ID and Teamgo](../app-provisioning/customize-application-attributes.md).
4141

42-
## Step 2. Configure Teamgo to support provisioning with Azure AD
42+
<a name='step-2-configure-teamgo-to-support-provisioning-with-azure-ad'></a>
43+
44+
## Step 2: Configure Teamgo to support provisioning with Microsoft Entra ID
4345

4446
1. Sign-in to the [Teamgo dashboard](https://my.teamgo.co) and go to the Settings.
4547
1. Click on **Integrations** under settings.
46-
1. Under **Employee Directory**, look for **Azure Active Directory** and click on **Enable** button.
48+
1. Under **Employee Directory**, look for **Microsoft Entra ID** and click on **Enable** button.
4749
![Integrations tab](media/teamgo-provisioning-tutorial/enable-azure-in-teamgo.png)
4850
1. Go to **SCIM Bearer Token** tab and copy the bearer token. The **Secret Token** will be required in the **Step 5**.
4951
![Integration tab](media/teamgo-provisioning-tutorial/scim-bearer-token.png)
5052

51-
## Step 3. Add Teamgo from the Azure AD application gallery
53+
<a name='step-3-add-teamgo-from-the-azure-ad-application-gallery'></a>
54+
55+
## Step 3: Add Teamgo from the Microsoft Entra application gallery
5256

53-
Add Teamgo from the Azure AD application gallery to start managing provisioning to Teamgo. If you have previously setup Teamgo for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
57+
Add Teamgo from the Microsoft Entra application gallery to start managing provisioning to Teamgo. If you have previously setup Teamgo for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
5458

55-
## Step 4. Define who will be in scope for provisioning
59+
## Step 4: Define who will be in scope for provisioning
5660

57-
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
61+
The Microsoft Entra provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
5862

5963
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
6064

6165
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
6266

6367

64-
## Step 5. Configure automatic user provisioning to Teamgo
68+
## Step 5: Configure automatic user provisioning to Teamgo
69+
70+
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Microsoft Entra ID.
6571

66-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
72+
<a name='to-configure-automatic-user-provisioning-for-teamgo-in-azure-ad'></a>
6773

68-
### To configure automatic user provisioning for Teamgo in Azure AD:
74+
### To configure automatic user provisioning for Teamgo in Microsoft Entra ID:
6975

7076
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7177
1. Browse to **Identity** > **Applications** > **Enterprise applications**
@@ -84,7 +90,7 @@ This section guides you through the steps to configure the Azure AD provisioning
8490

8591
![Provisioning tab](common/provisioning-automatic.png)
8692

87-
5. Under the **Admin Credentials** section, input your Teamgo Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Teamgo. If the connection fails, ensure your Teamgo account has Admin permissions and try again.
93+
5. Under the **Admin Credentials** section, input your Teamgo Tenant URL and Secret Token. Click **Test Connection** to ensure Microsoft Entra ID can connect to Teamgo. If the connection fails, ensure your Teamgo account has Admin permissions and try again.
8894

8995
![Token](common/provisioning-testconnection-tenanturltoken.png)
9096

@@ -94,9 +100,9 @@ This section guides you through the steps to configure the Azure AD provisioning
94100

95101
7. Select **Save**.
96102

97-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Teamgo**.
103+
8. Under the **Mappings** section, select **Synchronize Microsoft Entra users to Teamgo**.
98104

99-
9. Review the user attributes that are synchronized from Azure AD to Teamgo in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Teamgo for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Teamgo API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
105+
9. Review the user attributes that are synchronized from Microsoft Entra ID to Teamgo in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Teamgo for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Teamgo API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
100106

101107
|Attribute|Type|Supported for filtering
102108
|---|---|---|
@@ -115,7 +121,7 @@ This section guides you through the steps to configure the Azure AD provisioning
115121
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|String|
116122
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
117123

118-
11. To enable the Azure AD provisioning service for Teamgo, change the **Provisioning Status** to **On** in the **Settings** section.
124+
11. To enable the Microsoft Entra provisioning service for Teamgo, change the **Provisioning Status** to **On** in the **Settings** section.
119125

120126
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
121127

@@ -127,9 +133,9 @@ This section guides you through the steps to configure the Azure AD provisioning
127133

128134
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
129135

130-
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
136+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Microsoft Entra provisioning service is running.
131137

132-
## Step 6. Monitor your deployment
138+
## Step 6: Monitor your deployment
133139
Once you've configured provisioning, use the following resources to monitor your deployment:
134140

135141
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
@@ -139,7 +145,7 @@ Once you've configured provisioning, use the following resources to monitor your
139145
## Additional resources
140146

141147
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
142-
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
148+
* [What is application access and single sign-on with Microsoft Entra ID?](../manage-apps/what-is-single-sign-on.md)
143149

144150
## Next steps
145151

0 commit comments

Comments
 (0)