You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/silverfort-azure-ad-integration.md
+36-30Lines changed: 36 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,13 +13,15 @@ ms.author: gasinh
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Silverfort
16
+
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Silverfort
17
17
18
-
[Silverfort](https://www.silverfort.com/) uses innovative agent-less and proxy-less technology to connect your assets on-premises and in the cloud to Azure Active Directory (Azure AD). This solution enables organizations to apply identity protection, visibility, and user experience across environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and proactively prevents threats.
18
+
[Silverfort](https://www.silverfort.com/) uses agent-less and proxy-less technology to connect your assets on-premises and in the cloud to Azure Active Directory (Azure AD). This solution enables organizations to apply identity protection, visibility, and user experience across environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and helps to prevent threats.
19
19
20
-
In this tutorial, learn how to integrate your on-premises Silverfort implementation with Azure AD for [hybrid access](../devices/concept-azure-ad-join-hybrid.md).
20
+
In this tutorial, learn how to integrate your on-premises Silverfort implementation with Azure AD.
21
21
22
-
Silverfort connects assets with Azure AD. These bridged assets appear as regular applications in Azure AD and can be protected with Conditional Access, single-sign-on (SSO), multifactor authentication (MFA), auditing and more. Use Silverfort to connect assets including:
22
+
Learn more: [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md).
23
+
24
+
Silverfort connects assets with Azure AD. These bridged assets appear as regular applications in Azure AD and can be protected with [Conditional Access](../conditional-access/overview.md), single-sign-on (SSO), multi-factor authentication (MFA), auditing and more. Use Silverfort to connect assets including:
23
25
24
26
- Legacy and homegrown applications
25
27
- Remote desktop and Secure Shell (SSH)
@@ -33,25 +35,25 @@ Use this tutorial to configure and test the Silverfort Azure AD bridge in your A
33
35
34
36
## Silverfort with Azure AD authentication architecture
35
37
36
-
The following diagram describes the authentication architecture orchestrated by Silverfort in a hybrid environment.
38
+
The following diagram shows the authentication architecture orchestrated by Silverfort, in a hybrid environment.
37
39
38
40

39
41
40
42
### User flow
41
43
42
-
1. User sends authentication request to the original Identity provider (IdP) through protocols such as Kerberos, SAML, NTLM, OIDC, and LDAP(s).
43
-
2. The response is routed as-is to Silverfort for validation to check authentication state.
44
-
3. Silverfort provides visibility, discovery, and bridging to Azure AD.
45
-
4. If the application is bridged, the authentication decision is passed to Azure AD. Azure AD evaluates Conditional Access policies and validates authentication.
46
-
5. The authentication state response goes as-is to the IdP by Silverfort.
47
-
6. IdP grants or denies access to the resource.
48
-
7. User is notified if access request is granted or denied.
44
+
1. User sends authentication request to the original Identity Provider (IdP) through protocols such as Kerberos, SAML, NTLM, OIDC, and LDAP(s)
45
+
2. The response is routed as-is to Silverfort for validation to check authentication state
46
+
3. Silverfort provides visibility, discovery, and a bridge to Azure AD
47
+
4. If the application is bridged, the authentication decision passes to Azure AD. Azure AD evaluates Conditional Access policies and validates authentication.
48
+
5. The authentication state response goes as-is from Silverfort to the IdP
49
+
6. IdP grants or denies access to the resource
50
+
7. User is notified if access request is granted or denied
49
51
50
52
## Prerequisites
51
53
52
-
You need Silverfort deployed in your tenant or infrastructure to perform this tutorial. To deploy Silverfort in your tenant or infrastructure, go to [Silverfort](https://www.silverfort.com/). Install Silverfort Desktop app on your workstations.
54
+
You need Silverfort deployed in your tenant or infrastructure to perform this tutorial. To deploy Silverfort in your tenant or infrastructure, go to silverfort.com [Silverfort](https://www.silverfort.com/) to install the Silverfort desktop app on your workstations.
53
55
54
-
This tutorial requires you to set up Silverfort Azure AD Adapter in your Azure AD tenant. You'll need:
56
+
Set up Silverfort Azure AD Adapter in your Azure AD tenant:
55
57
56
58
- An Azure account with an active subscription
57
59
- You can create an [Azure free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
@@ -60,70 +62,74 @@ This tutorial requires you to set up Silverfort Azure AD Adapter in your Azure A
60
62
- Cloud Application Administrator
61
63
- Application Administrator
62
64
- Service Principal Owner
63
-
- The Silverfort Azure AD Adapter application in the Azure AD gallery is pre-configured to support SSO. Add the Silverfort Azure AD Adapter to your tenant as an Enterprise application, from the gallery.
65
+
- The Silverfort Azure AD Adapter application in the Azure AD gallery is pre-configured to support SSO. From the gallery, add the Silverfort Azure AD Adapter to your tenant as an Enterprise application.
64
66
65
67
## Configure Silverfort and create a policy
66
68
67
69
1. From a browser, sign in to the Silverfort admin console.
68
70
2. In the main menu, navigate to **Settings** and then scroll to **Azure AD Bridge Connector** in the General section.
69
71
3. Confirm your tenant ID, and then select **Authorize**.
72
+
4. Select **Save Changes**.
73
+
5. On the **Permissions requested** dialog, select **Accept**.
70
74
71
75

5. On the **Settings** page, select **Save Changes**.
83
+
7. On the **Settings** page, select **Save Changes**.
80
84
81
85

82
86
83
-
6. Sign in to your Azure AD console. You'll see **Silverfort Azure AD Adapter** application registered as an Enterprise application.
87
+
8. Sign in to your Azure AD console. In the left pane, select **Enterprise applications**. The **Silverfort Azure AD Adapter** application appears as registered.
7. In the Silverfort admin console, navigate to the **Policies** page and select **Create Policy**. The **New Policy** dialog appears.
88
-
8. Enter a **Policy Name**, the application name to be created in Azure. For example, if adding multiple servers or applications under this policy, name it to reflect the resources covered by the policy. In the example, we create a policy for the SL-APP1 server.
91
+
9. In the Silverfort admin console, navigate to the **Policies** page and select **Create Policy**. The **New Policy** dialog appears.
92
+
10. Enter a **Policy Name**, the application name to be created in Azure. For example, if adding multiple servers or applications for this policy, name it to reflect the resources covered by the policy. In the example, we create a policy for the SL-APP1 server.
9. Select the **Authentication** type, and **Protocol**.
96
+
11. Select the **Auth Type**, and **Protocol**.
93
97
94
-
10. In the **Users and Groups** field, select the **edit** icon to configure users affected by the policy. These users' authentication will be bridged to Azure AD.
98
+
12. In the **Users and Groups** field, select the **edit** icon to configure users affected by the policy. These users' authentication bridges to Azure AD.
95
99
96
100

97
101
98
-
11. Search and select users, groups, or Organization Units (OUs).
102
+
13. Search and select users, groups, or Organization Units (OUs).
18. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application appears. You can include this application in [Conditional Access policies](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
130
+
20. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application appears. You can include this application in Conditional Access policies.
131
+
132
+
Learn more: [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
0 commit comments