You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/teachme-biz-tutorial.md
+29-21Lines changed: 29 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Teachme Biz'
3
-
description: Learn how to configure single sign-on between Azure Active Directory and Teachme Biz.
2
+
title: 'Tutorial: Microsoft Entra single sign-on (SSO) integration with Teachme Biz'
3
+
description: Learn how to configure single sign-on between Microsoft Entra ID and Teachme Biz.
4
4
services: active-directory
5
5
author: jeevansd
6
6
manager: CelesteDG
@@ -14,30 +14,30 @@ ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Teachme Biz
17
+
# Tutorial: Microsoft Entra single sign-on (SSO) integration with Teachme Biz
18
18
19
-
In this tutorial, you'll learn how to integrate Teachme Biz with Azure Active Directory (Azure AD). When you integrate Teachme Biz with Azure AD, you can:
19
+
In this tutorial, you'll learn how to integrate Teachme Biz with Microsoft Entra ID. When you integrate Teachme Biz with Microsoft Entra ID, you can:
20
20
21
-
* Control in Azure AD who has access to Teachme Biz.
22
-
* Enable your users to be automatically signed-in to Teachme Biz with their Azure AD accounts.
21
+
* Control in Microsoft Entra ID who has access to Teachme Biz.
22
+
* Enable your users to be automatically signed-in to Teachme Biz with their Microsoft Entra accounts.
23
23
* Manage your accounts in one central location.
24
24
25
25
## Prerequisites
26
26
27
27
To get started, you need the following items:
28
28
29
-
*An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29
+
*A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30
30
* Teachme Biz single sign-on (SSO) enabled subscription.
31
31
32
32
## Scenario description
33
33
34
-
In this tutorial, you configure and test Azure AD SSO in a test environment.
34
+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
35
35
36
36
* Teachme Biz supports **SP and IDP** initiated SSO.
37
37
38
38
## Add Teachme Biz from the gallery
39
39
40
-
To configure the integration of Teachme Biz into Azure AD, you need to add Teachme Biz from the gallery to your list of managed SaaS apps.
40
+
To configure the integration of Teachme Biz into Microsoft Entra ID, you need to add Teachme Biz from the gallery to your list of managed SaaS apps.
41
41
42
42
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -46,22 +46,26 @@ To configure the integration of Teachme Biz into Azure AD, you need to add Teach
46
46
47
47
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
Configure and test Azure AD SSO with Teachme Biz using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Teachme Biz.
51
+
## Configure and test Microsoft Entra SSO for Teachme Biz
52
52
53
-
To configure and test Azure AD SSO with Teachme Biz, perform the following steps:
53
+
Configure and test Microsoft Entra SSO with Teachme Biz using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Teachme Biz.
54
54
55
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
55
+
To configure and test Microsoft Entra SSO with Teachme Biz, perform the following steps:
56
+
57
+
1.**[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58
+
1.**[Create a Microsoft Entra test user](#create-an-azure-ad-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
59
+
1.**[Assign the Microsoft Entra test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
58
60
1.**[Configure Teachme Biz SSO](#configure-teachme-biz-sso)** - to configure the single sign-on settings on application side.
59
-
1.**[Create Teachme Biz test user](#create-teachme-biz-test-user)** - to have a counterpart of B.Simon in Teachme Biz that is linked to the Azure AD representation of user.
61
+
1.**[Create Teachme Biz test user](#create-teachme-biz-test-user)** - to have a counterpart of B.Simon in Teachme Biz that is linked to the Microsoft Entra representation of user.
60
62
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
61
63
62
-
## Configure Azure AD SSO
64
+
<aname='configure-azure-ad-sso'></a>
65
+
66
+
## Configure Microsoft Entra SSO
63
67
64
-
Follow these steps to enable Azure AD SSO.
68
+
Follow these steps to enable Microsoft Entra SSO.
65
69
66
70
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/teamgo-provisioning-tutorial.md
+30-24Lines changed: 30 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Tutorial: Configure Teamgo for automatic user provisioning with Azure Active Directory'
3
-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Teamgo.
2
+
title: 'Tutorial: Configure Teamgo for automatic user provisioning with Microsoft Entra ID'
3
+
description: Learn how to automatically provision and de-provision user accounts from Microsoft Entra ID to Teamgo.
4
4
services: active-directory
5
5
author: twimmers
6
6
writer: twimmers
@@ -16,56 +16,62 @@ ms.author: thwimmer
16
16
17
17
# Tutorial: Configure Teamgo for automatic user provisioning
18
18
19
-
This tutorial describes the steps you need to perform in both Teamgo and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Teamgo](https://www.teamgo.co/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19
+
This tutorial describes the steps you need to perform in both Teamgo and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Teamgo](https://www.teamgo.co/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](../app-provisioning/user-provisioning.md).
20
20
21
21
22
22
## Capabilities Supported
23
23
> [!div class="checklist"]
24
24
> * Create users in Teamgo
25
25
> * Remove users in Teamgo when they do not require access anymore
26
-
> * Keep user attributes synchronized between Azure AD and Teamgo
26
+
> * Keep user attributes synchronized between Microsoft Entra ID and Teamgo
27
27
> *[Single sign-on](teamgo-tutorial.md) to Teamgo (recommended)
28
28
29
29
## Prerequisites
30
30
31
31
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
32
32
33
-
*[An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
34
-
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
33
+
*[A Microsoft Entra tenant](../develop/quickstart-create-new-tenant.md)
34
+
* A user account in Microsoft Entra ID with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35
35
* A Teamgo account with Azure integration supported.
36
36
37
-
## Step 1. Plan your provisioning deployment
37
+
## Step 1: Plan your provisioning deployment
38
38
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
39
39
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40
-
3. Determine what data to [map between Azure AD and Teamgo](../app-provisioning/customize-application-attributes.md).
40
+
3. Determine what data to [map between Microsoft Entra ID and Teamgo](../app-provisioning/customize-application-attributes.md).
41
41
42
-
## Step 2. Configure Teamgo to support provisioning with Azure AD
## Step 3: Add Teamgo from the Microsoft Entra application gallery
52
56
53
-
Add Teamgo from the Azure AD application gallery to start managing provisioning to Teamgo. If you have previously setup Teamgo for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
57
+
Add Teamgo from the Microsoft Entra application gallery to start managing provisioning to Teamgo. If you have previously setup Teamgo for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
54
58
55
-
## Step 4. Define who will be in scope for provisioning
59
+
## Step 4: Define who will be in scope for provisioning
56
60
57
-
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
61
+
The Microsoft Entra provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
58
62
59
63
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
60
64
61
65
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
62
66
63
67
64
-
## Step 5. Configure automatic user provisioning to Teamgo
68
+
## Step 5: Configure automatic user provisioning to Teamgo
69
+
70
+
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Microsoft Entra ID.
65
71
66
-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
### To configure automatic user provisioning for Teamgo in Azure AD:
74
+
### To configure automatic user provisioning for Teamgo in Microsoft Entra ID:
69
75
70
76
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
71
77
1. Browse to **Identity** > **Applications** > **Enterprise applications**
@@ -84,7 +90,7 @@ This section guides you through the steps to configure the Azure AD provisioning
5. Under the **Admin Credentials** section, input your Teamgo Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Teamgo. If the connection fails, ensure your Teamgo account has Admin permissions and try again.
93
+
5. Under the **Admin Credentials** section, input your Teamgo Tenant URL and Secret Token. Click **Test Connection** to ensure Microsoft Entra ID can connect to Teamgo. If the connection fails, ensure your Teamgo account has Admin permissions and try again.
@@ -94,9 +100,9 @@ This section guides you through the steps to configure the Azure AD provisioning
94
100
95
101
7. Select **Save**.
96
102
97
-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Teamgo**.
103
+
8. Under the **Mappings** section, select **Synchronize Microsoft Entra users to Teamgo**.
98
104
99
-
9. Review the user attributes that are synchronized from Azure AD to Teamgo in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Teamgo for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Teamgo API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
105
+
9. Review the user attributes that are synchronized from Microsoft Entra ID to Teamgo in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Teamgo for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Teamgo API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
100
106
101
107
|Attribute|Type|Supported for filtering
102
108
|---|---|---|
@@ -115,7 +121,7 @@ This section guides you through the steps to configure the Azure AD provisioning
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
117
123
118
-
11. To enable the Azure AD provisioning service for Teamgo, change the **Provisioning Status** to **On** in the **Settings** section.
124
+
11. To enable the Microsoft Entra provisioning service for Teamgo, change the **Provisioning Status** to **On** in the **Settings** section.
119
125
120
126

121
127
@@ -127,9 +133,9 @@ This section guides you through the steps to configure the Azure AD provisioning
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
136
+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Microsoft Entra provisioning service is running.
131
137
132
-
## Step 6. Monitor your deployment
138
+
## Step 6: Monitor your deployment
133
139
Once you've configured provisioning, use the following resources to monitor your deployment:
134
140
135
141
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
@@ -139,7 +145,7 @@ Once you've configured provisioning, use the following resources to monitor your
139
145
## Additional resources
140
146
141
147
*[Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
142
-
*[What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
148
+
*[What is application access and single sign-on with Microsoft Entra ID?](../manage-apps/what-is-single-sign-on.md)
0 commit comments