Skip to content

Commit 57eba19

Browse files
committed
Update sharepoint-on-premises-tutorial.md
1 parent d6e5e71 commit 57eba19

File tree

1 file changed

+16
-30
lines changed

1 file changed

+16
-30
lines changed

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 16 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -55,15 +55,14 @@ To add SharePoint on-premises from the gallery, perform the following steps:
5555

5656
4. In the search box, type **SharePoint on-premises**, select **SharePoint on-premises** from result panel.
5757

58-
> [!div class="mx-imgBorder"]
59-
> ![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/search-new-app.png)
58+
![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/search-new-app.png)
6059

6160
1. Specify a name for your SharePoint OnPrem and click the **Add** button to add the application.
6261

6362
1. In the new Enterprise Application click on Properties and check the value for **User assignment required**
6463

65-
> [!div class="mx-imgBorder"]
66-
> ![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/user-assignment-required.png)
64+
[!div class="mx-imgBorder"]
65+
![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/user-assignment-required.png)
6766

6867
in our scenario this value is set to **No**.
6968

@@ -97,8 +96,7 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
9796

9897
4. On the **Basic SAML Configuration** section, perform the following steps:
9998

100-
> [!div class="mx-imgBorder"]
101-
> ![SharePoint on-premises Domain and URLs single sign-on information](./media/sharepoint-on-premises-tutorial/sp-identifier-reply.png)
99+
![SharePoint on-premises Domain and URLs single sign-on information](./media/sharepoint-on-premises-tutorial/sp-identifier-reply.png)
102100

103101
1. In the **Identifier** box, type a URL using the following pattern:
104102
`urn:<sharepointFarmName>:<federationName>`
@@ -115,8 +113,7 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
115113

116114
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
117115

118-
> [!div class="mx-imgBorder"]
119-
> ![The Certificate download link](./media/sharepoint-on-premises-tutorial/certificatebase64.png)
116+
![The Certificate download link](./media/sharepoint-on-premises-tutorial/certificatebase64.png)
120117

121118
6. On the **Set up SharePoint on-premises** section, copy the appropriate URL(s) as per your requirement.
122119

@@ -164,8 +161,7 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
164161
165162
d. Click **OK**.
166163
167-
> [!div class="mx-imgBorder"]
168-
> ![Configuring your authentication provider](./media/sharepoint-on-premises-tutorial/config-auth-provider.png)
164+
![Configuring your authentication provider](./media/sharepoint-on-premises-tutorial/config-auth-provider.png)
169165
170166
### Create an Azure AD test user in the Azure portal
171167
@@ -183,8 +179,7 @@ The objective of this section is to create a test user in the Azure portal.
183179
b. In the **User name** field type `[email protected]`
184180
For example, [email protected]
185181
186-
> [!div class="mx-imgBorder"]
187-
> ![The User dialog box](./media/sharepoint-on-premises-tutorial/user-properties.png)
182+
![The User dialog box](./media/sharepoint-on-premises-tutorial/user-properties.png)
188183
189184
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
190185
@@ -200,24 +195,21 @@ The objective of this section is to create a test user in the Azure portal.
200195
201196
3. Fill in **Group type**, **Group name**, **Group description**, **Membership type**. Click on the arrow to select members, then search for or click on the member you will like to add to the group. Click on **Select** to add the selected members, then click on **Create**.
202197
203-
> [!div class="mx-imgBorder"]
204-
> ![Create an Azure AD Security Group](./media/sharepoint-on-premises-tutorial/new-group.png)
198+
![Create an Azure AD Security Group](./media/sharepoint-on-premises-tutorial/new-group.png)
205199
206200
### Grant permissions to Azure Active Directory account in SharePoint on-premises
207201
208202
To Grant access to the Azure Active Directory User in the on-premise SharePoint you need to share the site collection or add the Azure Active Directory User to one of the site collection's group.Users can now sign into SharePoint 201x using identities from Azure AD, but there are still opportunities for improvement to the user experience. For instance, searching for a user presents multiple search results in the people picker. There is a search result for each of the claims types that are created in the claim mapping. To choose a user using the people picker, you must type their user name exactly and choose the **name** claim result.
209203
210-
> [!div class="mx-imgBorder"]
211-
> ![Claims search results](./media/sharepoint-on-premises-tutorial/claims-search-results.png)
204+
![Claims search results](./media/sharepoint-on-premises-tutorial/claims-search-results.png)
212205
213206
There is no validation on the values you search for, which can lead to misspellings or users accidentally choosing the wrong claim type. This can prevent users from successfully accessing resources.
214207
215208
**To fix the people picker** with this scenario, there is an open-source solution called [AzureCP](https://yvand.github.io/AzureCP/) that provides a custom claims provider for SharePoint 2013, 2016 and 2019. It will use the Microsoft Graph API to resolve what users enter and perform validation. Learn more at [AzureCP](https://yvand.github.io/AzureCP/).
216209
217210
> [!NOTE]
218211
> without AzureCP you can add Groups by adding the Azure AD group's ID but this is not user's friendly and reliable. There is how it looks:
219-
> [!div class="mx-imgBorder"]
220-
> ![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/adding-group-by-id.png)
212+
>![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/adding-group-by-id.png)
221213
222214
### Grant permissions to Azure AD group in SharePoint on-premises
223215
@@ -240,8 +232,7 @@ To grant access to the Azure Active Directory Security Group in the on-premise S
240232
241233
1. Browse to the SharePoint Site Collection, under Site Settings for the Site Collection, click on "People and groups". Select the SharePoint group then click on New, "Add Users to this Group" and start to type the name of your group the People Picker will display the Azure Active Directory Security Group.
242234
243-
> [!div class="mx-imgBorder"]
244-
>![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/permission-azure-ad-group.png)
235+
![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/permission-azure-ad-group.png)
245236
246237
### Grant access to a Guest account to SharePoint on-premises in the Azure portal
247238
@@ -255,13 +246,11 @@ it's now possible to grant access to your SharePoint Site to a Guest Account in
255246
256247
1. Change the **Source Attribute** Property to the value **user.localuserprincipalname** and **save**.
257248
258-
> [!div class="mx-imgBorder"]
259-
>![User Attributes & Claims initial](./media/sharepoint-on-premises-tutorial/manage-claim.png)
249+
![User Attributes & Claims initial](./media/sharepoint-on-premises-tutorial/manage-claim.png)
260250
261251
1. Using ribbon go back to **SAML-based Sign-on** now the **User Attributes & Claims** section would look like this :
262252
263-
> [!div class="mx-imgBorder"]
264-
>![User Attributes & Claims final](./media/sharepoint-on-premises-tutorial/user-attributes-claims-final.png)
253+
![User Attributes & Claims final](./media/sharepoint-on-premises-tutorial/user-attributes-claims-final.png)
265254
266255
> [!NOTE]
267256
> Surname and Given name are not required in this setup.
@@ -274,8 +263,7 @@ it's now possible to grant access to your SharePoint Site to a Guest Account in
274263
275264
1. You can now share the site with [email protected] and permit this user to access it.
276265
277-
> [!div class="mx-imgBorder"]
278-
>![Sharing Site with Guest Account](./media/sharepoint-on-premises-tutorial/sharing-guest-account.png)
266+
![Sharing Site with Guest Account](./media/sharepoint-on-premises-tutorial/sharing-guest-account.png)
279267
280268
### Configuring the trusted identity provider for multiple web applications
281269
@@ -285,13 +273,11 @@ The configuration works for a single web application, but needs additional confi
285273
286274
2. In the page **Set up Single Sign-On with SAM**, edit the **Basic SAML Configuration**.
287275
288-
> [!div class="mx-imgBorder"]
289-
>![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/add-reply-url.png)
276+
![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/add-reply-url.png)
290277
291278
3. In **Reply URL (Assertion Consumer Service URL)** add the URL for the additional web applications and click **Save**.
292279
293-
> [!div class="mx-imgBorder"]
294-
>![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/reply-url-for-web-application.png)
280+
![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/reply-url-for-web-application.png)
295281
296282
4. On the SharePoint server, open the **SharePoint 201x Management Shell** and execute the following commands, using the name of the trusted identity token issuer that you used previously.
297283
```

0 commit comments

Comments
 (0)