Skip to content

Commit 5ba9559

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 6488430 + b132f58 commit 5ba9559

File tree

102 files changed

+2829
-1614
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

102 files changed

+2829
-1614
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10895,6 +10895,11 @@
1089510895
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
1089610896
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
1089710897
"redirect_document_id": false
10898+
},
10899+
{
10900+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
10901+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
10902+
"redirect_document_id": false
1089810903
}
1089910904
]
1090010905
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-dotnet-legacy.md",
5+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-java-legacy.md",
10+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-python-legacy.md",
15+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-xamarin.md",
20+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path": "articles/site-recovery/deploy-vmware-azure-replication-appliance-preview.md",
525
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Trial Playbook - Microsoft Entra Permissions Management
2+
title: Trial User Guide - Microsoft Entra Permissions Management
33
description: How to get started with your Entra Permissions free trial
44
services: active-directory
55
author: jenniferf-skc
@@ -11,11 +11,11 @@ ms.date: 09/01/2022
1111
ms.author: jfields
1212
---
1313

14-
# Trial playbook: Microsoft Entra Permissions Management
14+
# Trial user guide: Microsoft Entra Permissions Management
1515

16-
Welcome to the Microsoft Entra Permissions Management trial playbook!
16+
Welcome to the Microsoft Entra Permissions Management trial user guide!
1717

18-
This playbook is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this playbook from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
18+
This user guide is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this user guide from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
1919

2020
## What is Permissions Management?
2121

@@ -28,7 +28,7 @@ Permissions Management helps your organization tackle cloud permissions by enabl
2828
- Enforce least privilege - Right-size permissions based on usage and activity and enforce permissions on-demand at cloud scale.
2929
- Monitor and detect anomalies - Detect anomalous permission usage and generate detailed forensic reports.
3030

31-
![Diagram, schematic Description automatically generated](media/permissions-management-trial-playbook/microsoft-entra-permissions-management-diagram.png)
31+
![Diagram, schematic Description automatically generated](media/permissions-management-trial-user-guide/microsoft-entra-permissions-management-diagram.png)
3232

3333

3434
## Step 1: Set-up Permissions Management
@@ -182,23 +182,23 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
182182

183183
Example: Any activity done by root:
184184

185-
![Diagram, Any activity done by root user in AWS.](media/permissions-management-trial-playbook/custom-alerts-1.png)
185+
![Diagram, Any activity done by root user in AWS.](media/permissions-management-trial-user-guide/custom-alerts-1.png)
186186

187187
Alert for monitoring any direct Azure role assignment
188188

189-
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user.](media/permissions-management-trial-playbook/custom-alerts-2.png)
189+
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user.](media/permissions-management-trial-user-guide/custom-alerts-2.png)
190190

191191
- Access to critical sensitive resources
192192

193193
Example: Alert for monitoring any action on Azure resources
194194

195-
![Diagram, Alert for monitoring any action on Azure resources.](media/permissions-management-trial-playbook/custom-alerts-3.png)
195+
![Diagram, Alert for monitoring any action on Azure resources.](media/permissions-management-trial-user-guide/custom-alerts-3.png)
196196

197197
- Use of break glass accounts like root in AWS, global admin in Azure AD accessing subscriptions, etc.
198198

199199
Example: BreakGlass users should be used for emergency access only.
200200

201-
![Diagram, Example of break glass account users used for emergency access only.](media/permissions-management-trial-playbook/custom-alerts-4.png)
201+
![Diagram, Example of break glass account users used for emergency access only.](media/permissions-management-trial-user-guide/custom-alerts-4.png)
202202

203203
- Create and view reports
204204

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 18 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: 'Quickstart: Enable single sign-on for an enterprise application'
2+
title: Enable single sign-on for an enterprise application
33
description: Enable single sign-on for an enterprise application in Azure Active Directory.
44
services: active-directory
5-
author: davidmu1
5+
author: omondiatieno
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
9-
ms.topic: quickstart
9+
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/21/2021
12-
ms.author: davidmu
11+
ms.date: 09/29/2022
12+
ms.author: jomondi
1313
ms.reviewer: ergleenl
1414
ms.custom: contperf-fy22q2, mode-other
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to enable single sign-on for an enterprise application.
1616
---
1717

18-
# Quickstart: Enable single sign-on for an enterprise application
18+
# Enable single sign-on for an enterprise application
1919

20-
In this quickstart, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
20+
In this article, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
2121

22-
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This quickstart uses an enterprise application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
22+
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This article uses an enterprise application named **Azure AD SAML Toolkit 1** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
2323

24-
It is recommended that you use a non-production environment to test the steps in this quickstart.
24+
It is recommended that you use a non-production environment to test the steps in this article.
2525

2626
## Prerequisites
2727

@@ -39,7 +39,7 @@ To enable SSO for an application:
3939
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
4040
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
4141
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
42-
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit** are listed in this quickstart.
42+
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide** link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
4343

4444
:::image type="content" source="media/add-application-portal-setup-sso/saml-configuration.png" alt-text="Configure single sign-on for an enterprise application.":::
4545

@@ -55,7 +55,7 @@ To configure SSO in Azure AD:
5555
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
5656
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
5757
1. Select **Save**.
58-
1. In the **SAML Signing Certificate** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
58+
1. In the **SAML Certificates** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
5959

6060
## Configure single sign-on in the application
6161

@@ -70,15 +70,15 @@ To register a user account with the application:
7070

7171
:::image type="content" source="media/add-application-portal-setup-sso/toolkit-register.png" alt-text="Register a user account in the Azure AD SAML Toolkit application.":::
7272

73-
1. For **Email**, enter the email address of the user that will access the application. For example, in a previous quickstart, the user account was created that uses the address of `[email protected]`. Be sure to change `contoso.com` to the domain of your tenant.
73+
1. For **Email**, enter the email address of the user that will access the application. Ensure that the user account is already assigned to the application.
7474
1. Enter a **Password** and confirm it.
7575
1. Select **Register**.
7676

7777
### Configure SAML settings
7878

79-
To configure SAML setting for the application:
79+
To configure SAML settings for the application:
8080

81-
1. Signed in with the credentials of the user account that you created, select **SAML Configuration** at the upper-left corner of the page.
81+
1. Signed in with the credentials of the user account that you already assigned to the application, select **SAML Configuration** at the upper-left corner of the page.
8282
1. Select **Create** in the middle of the page.
8383
1. For **Login URL**, **Azure AD Identifier**, and **Logout URL**, enter the values that you recorded earlier.
8484
1. Select **Choose file** to upload the certificate that you previously downloaded.
@@ -102,15 +102,12 @@ You can test the single sign-on configuration from the **Set up single sign-on**
102102

103103
To test SSO:
104104

105-
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on** pane, select **Test**.
105+
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on with SAML** pane, select **Test**.
106106
1. Sign in to the application using the Azure AD credentials of the user account that you assigned to the application.
107107

108-
## Clean up resources
109-
110-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant.
111108

112109
## Next steps
113110

114-
Learn how to configure the properties of an enterprise application.
115-
> [!div class="nextstepaction"]
116-
> [Configure an application](add-application-portal-configure.md)
111+
- [Manage self service access](manage-self-service-access.md)
112+
- [Configure user consent](configure-user-consent.md)
113+
- [Grant tenant-wide admin consent](grant-admin-consent.md)

articles/active-directory/manage-apps/index.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,10 @@ landingContent:
101101
url: configure-permission-classifications.md
102102
- text: Manage entitlement
103103
url: ../governance/entitlement-management-scenarios.md
104+
- linkListType: learn
105+
links:
106+
- text: Configure admin consent workflow
107+
url: /training/modules/configure-admin-consent-workflow/
104108
- title: Maintain an app
105109
linkLists:
106110
- linkListType: how-to-guide

0 commit comments

Comments
 (0)