You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md
+16-30Lines changed: 16 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,15 +55,14 @@ To add SharePoint on-premises from the gallery, perform the following steps:
55
55
56
56
4. In the search box, type **SharePoint on-premises**, select **SharePoint on-premises** from result panel.
57
57
58
-
> [!div class="mx-imgBorder"]
59
-
> 
58
+

60
59
61
60
1. Specify a name for your SharePoint OnPrem and click the **Add** button to add the application.
62
61
63
62
1. In the new Enterprise Application click on Properties and check the value for **User assignment required**
64
63
65
-
> [!div class="mx-imgBorder"]
66
-
> 
64
+
[!div class="mx-imgBorder"]
65
+

67
66
68
67
in our scenario this value is set to **No**.
69
68
@@ -97,8 +96,7 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
97
96
98
97
4. On the **Basic SAML Configuration** section, perform the following steps:
99
98
100
-
> [!div class="mx-imgBorder"]
101
-
> 
99
+

102
100
103
101
1. In the **Identifier** box, type a URL using the following pattern:
104
102
`urn:<sharepointFarmName>:<federationName>`
@@ -115,8 +113,7 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
115
113
116
114
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
> 
182
+

188
183
189
184
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
190
185
@@ -200,24 +195,21 @@ The objective of this section is to create a test user in the Azure portal.
200
195
201
196
3. Fill in **Group type**, **Group name**, **Group description**, **Membership type**. Click on the arrow to select members, then search for or click on the member you will like to add to the group. Click on **Select** to add the selected members, then click on **Create**.
202
197
203
-
> [!div class="mx-imgBorder"]
204
-
> 
198
+

205
199
206
200
### Grant permissions to Azure Active Directory account in SharePoint on-premises
207
201
208
202
To Grant access to the Azure Active Directory User in the on-premise SharePoint you need to share the site collection or add the Azure Active Directory User to one of the site collection's group.Users can now sign into SharePoint 201x using identities from Azure AD, but there are still opportunities for improvement to the user experience. For instance, searching for a user presents multiple search results in the people picker. There is a search result for each of the claims types that are created in the claim mapping. To choose a user using the people picker, you must type their user name exactly and choose the **name** claim result.
There is no validation on the values you search for, which can lead to misspellings or users accidentally choosing the wrong claim type. This can prevent users from successfully accessing resources.
214
207
215
208
**To fix the people picker** with this scenario, there is an open-source solution called [AzureCP](https://yvand.github.io/AzureCP/) that provides a custom claims provider for SharePoint 2013, 2016 and 2019. It will use the Microsoft Graph API to resolve what users enter and perform validation. Learn more at [AzureCP](https://yvand.github.io/AzureCP/).
216
209
217
210
> [!NOTE]
218
211
> without AzureCP you can add Groups by adding the Azure AD group's ID but this is not user's friendly and reliable. There is how it looks:
219
-
> [!div class="mx-imgBorder"]
220
-
> 
212
+
>
221
213
222
214
### Grant permissions to Azure AD group in SharePoint on-premises
223
215
@@ -240,8 +232,7 @@ To grant access to the Azure Active Directory Security Group in the on-premise S
240
232
241
233
1. Browse to the SharePoint Site Collection, under Site Settings for the Site Collection, click on "People and groups". Select the SharePoint group then click on New, "Add Users to this Group" and start to type the name of your group the People Picker will display the Azure Active Directory Security Group.
242
234
243
-
> [!div class="mx-imgBorder"]
244
-
>
235
+

245
236
246
237
### Grant access to a Guest account to SharePoint on-premises in the Azure portal
247
238
@@ -255,13 +246,11 @@ it's now possible to grant access to your SharePoint Site to a Guest Account in
255
246
256
247
1. Change the **Source Attribute** Property to the value **user.localuserprincipalname** and **save**.
4. On the SharePoint server, open the **SharePoint 201x Management Shell** and execute the following commands, using the name of the trusted identity token issuer that you used previously.
0 commit comments