You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Trial Playbook - Microsoft Entra Permissions Management
2
+
title: Trial User Guide - Microsoft Entra Permissions Management
3
3
description: How to get started with your Entra Permissions free trial
4
4
services: active-directory
5
5
author: jenniferf-skc
@@ -11,11 +11,11 @@ ms.date: 09/01/2022
11
11
ms.author: jfields
12
12
---
13
13
14
-
# Trial playbook: Microsoft Entra Permissions Management
14
+
# Trial user guide: Microsoft Entra Permissions Management
15
15
16
-
Welcome to the Microsoft Entra Permissions Management trial playbook!
16
+
Welcome to the Microsoft Entra Permissions Management trial user guide!
17
17
18
-
This playbook is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this playbook from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
18
+
This user guide is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this user guide from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
19
19
20
20
## What is Permissions Management?
21
21
@@ -28,7 +28,7 @@ Permissions Management helps your organization tackle cloud permissions by enabl
28
28
- Enforce least privilege - Right-size permissions based on usage and activity and enforce permissions on-demand at cloud scale.
29
29
- Monitor and detect anomalies - Detect anomalous permission usage and generate detailed forensic reports.
@@ -182,23 +182,23 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
182
182
183
183
Example: Any activity done by root:
184
184
185
-

185
+

186
186
187
187
Alert for monitoring any direct Azure role assignment
188
188
189
-

189
+

190
190
191
191
- Access to critical sensitive resources
192
192
193
193
Example: Alert for monitoring any action on Azure resources
194
194
195
-

195
+

196
196
197
197
- Use of break glass accounts like root in AWS, global admin in Azure AD accessing subscriptions, etc.
198
198
199
199
Example: BreakGlass users should be used for emergency access only.
200
200
201
-

201
+

Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/add-application-portal-setup-sso.md
+18-21Lines changed: 18 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,27 @@
1
1
---
2
-
title: 'Quickstart: Enable single sign-on for an enterprise application'
2
+
title: Enable single sign-on for an enterprise application
3
3
description: Enable single sign-on for an enterprise application in Azure Active Directory.
4
4
services: active-directory
5
-
author: davidmu1
5
+
author: omondiatieno
6
6
manager: CelesteDG
7
7
ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
-
ms.topic: quickstart
9
+
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 09/21/2021
12
-
ms.author: davidmu
11
+
ms.date: 09/29/2022
12
+
ms.author: jomondi
13
13
ms.reviewer: ergleenl
14
14
ms.custom: contperf-fy22q2, mode-other
15
15
#Customer intent: As an administrator of an Azure AD tenant, I want to enable single sign-on for an enterprise application.
16
16
---
17
17
18
-
# Quickstart: Enable single sign-on for an enterprise application
18
+
# Enable single sign-on for an enterprise application
19
19
20
-
In this quickstart, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
20
+
In this article, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
21
21
22
-
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This quickstart uses an enterprise application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
22
+
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This article uses an enterprise application named **Azure AD SAML Toolkit 1** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
23
23
24
-
It is recommended that you use a non-production environment to test the steps in this quickstart.
24
+
It is recommended that you use a non-production environment to test the steps in this article.
25
25
26
26
## Prerequisites
27
27
@@ -39,7 +39,7 @@ To enable SSO for an application:
39
39
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
40
40
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
41
41
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
42
-
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit** are listed in this quickstart.
42
+
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide**link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
43
43
44
44
:::image type="content" source="media/add-application-portal-setup-sso/saml-configuration.png" alt-text="Configure single sign-on for an enterprise application.":::
45
45
@@ -55,7 +55,7 @@ To configure SSO in Azure AD:
55
55
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
56
56
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
57
57
1. Select **Save**.
58
-
1. In the **SAML Signing Certificate** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
58
+
1. In the **SAML Certificates** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
59
59
60
60
## Configure single sign-on in the application
61
61
@@ -70,15 +70,15 @@ To register a user account with the application:
70
70
71
71
:::image type="content" source="media/add-application-portal-setup-sso/toolkit-register.png" alt-text="Register a user account in the Azure AD SAML Toolkit application.":::
72
72
73
-
1. For **Email**, enter the email address of the user that will access the application. For example, in a previous quickstart, the user account was created that uses the address of `[email protected]`. Be sure to change `contoso.com` to the domain of your tenant.
73
+
1. For **Email**, enter the email address of the user that will access the application. Ensure that the user account is already assigned to the application.
74
74
1. Enter a **Password** and confirm it.
75
75
1. Select **Register**.
76
76
77
77
### Configure SAML settings
78
78
79
-
To configure SAML setting for the application:
79
+
To configure SAML settings for the application:
80
80
81
-
1. Signed in with the credentials of the user account that you created, select **SAML Configuration** at the upper-left corner of the page.
81
+
1. Signed in with the credentials of the user account that you already assigned to the application, select **SAML Configuration** at the upper-left corner of the page.
82
82
1. Select **Create** in the middle of the page.
83
83
1. For **Login URL**, **Azure AD Identifier**, and **Logout URL**, enter the values that you recorded earlier.
84
84
1. Select **Choose file** to upload the certificate that you previously downloaded.
@@ -102,15 +102,12 @@ You can test the single sign-on configuration from the **Set up single sign-on**
102
102
103
103
To test SSO:
104
104
105
-
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on** pane, select **Test**.
105
+
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on with SAML** pane, select **Test**.
106
106
1. Sign in to the application using the Azure AD credentials of the user account that you assigned to the application.
107
107
108
-
## Clean up resources
109
-
110
-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant.
111
108
112
109
## Next steps
113
110
114
-
Learn how to configure the properties of an enterprise application.
115
-
> [!div class="nextstepaction"]
116
-
> [Configure an application](add-application-portal-configure.md)
111
+
-[Manage self service access](manage-self-service-access.md)
112
+
-[Configure user consent](configure-user-consent.md)
0 commit comments