Skip to content

Commit 5f52a03

Browse files
authored
Merge pull request #233754 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 4/7
2 parents 0f1c7ee + 1de9eb6 commit 5f52a03

File tree

44 files changed

+1828
-427
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+1828
-427
lines changed

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,24 +24,37 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2424
- Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

27-
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
29-
30-
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
31-
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.
32-
3. Once installed, locate and launch the **AAD Connect Provisioning Agent wizard**, and when prompted for an extensions select **On-premises provisioning**
33-
4. For the agent to register itself with your tenant, provide credentials for an Azure AD admin with Hybrid administrator or global administrator permissions.
34-
5. Select **Confirm** to confirm the installation was successful.
27+
## Download, install, and configure the Azure AD Connect Provisioning Agent Package
28+
29+
If you have already downloaded the provisioning agent and configured it for another on-premises application, then continue reading in the next section.
30+
31+
1. In the Azure portal, select **Azure Active Directory**.
32+
2. On the left, select **Azure AD Connect**.
33+
3. On the left, select **Cloud sync**.
34+
35+
:::image type="content" source="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png" alt-text="Screenshot of new UX screen." lightbox="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png":::
36+
37+
4. On the left, select **Agent**.
38+
5. Select **Download on-premises agent**, and select **Accept terms & download**.
39+
40+
>[!NOTE]
41+
>Please use different provisioning agents for on-premises application provisioning and Azure AD Connect Cloud Sync / HR-driven provisioning. All three scenarios should not be managed on the same agent.
42+
43+
1. Open the provisioning agent installer, agree to the terms of service, and select **next**.
44+
1. When the provisioning agent wizard opens, continue to the **Select Extension** tab and select **On-premises application provisioning** when prompted for the extension you want to enable.
45+
1. The provisioning agent will use the operating system's web browser to display a popup window for you to authenticate to Azure AD, and potentially also your organization's identity provider. If you are using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
46+
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. The user is required to have the Hybrid Identity Administrator or Global Administrator role.
47+
1. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
3548

3649
## Provisioning to SCIM-enabled application
37-
Once the agent is installed, no further configuration is necesary on-prem, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
50+
Once the agent is installed, no further configuration is necessary on-premises, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
3851

3952
1. In the Azure portal navigate to the Enterprise applications and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
4053
2. From the left hand menu navigate to the **Provisioning** option and select **Get started**.
4154
3. Select **Automatic** from the dropdown list and expand the **On-Premises Connectivity** option.
4255
4. Select the agent that you installed from the dropdown list and select **Assign Agent(s)**.
4356
5. Now either wait 10 minutes or restart the **Microsoft Azure AD Connect Provisioning Agent** before proceeding to the next step & testing the connection.
44-
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolveable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
57+
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
4558
7. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
4659
>[!NOTE]
4760
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the aplication contains the entire URL provided above.
@@ -53,7 +66,7 @@ Once the agent is installed, no further configuration is necesary on-prem, and a
5366
12. Go to the **Provisioning** pane, and select **Start provisioning**.
5467
13. Monitor using the [provisioning logs](../../active-directory/reports-monitoring/concept-provisioning-logs.md).
5568

56-
The following video provides an overview of on-premises provisoning.
69+
The following video provides an overview of on-premises provisioning.
5770
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
5871
5972
## Additional requirements
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Azure Active Directory SSO integration with DDC Web
3+
description: Learn how to configure single sign-on between Azure Active Directory and DDC Web.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 04/06/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with DDC Web
18+
19+
In this article, you learn how to integrate DDC Web with Azure Active Directory (Azure AD). Engage and mobilize your advocates and PAC eligible class with ease using the flexible DDC Web platform with personalized content, simple activation, and PAC fundraising tools. When you integrate DDC Web with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to DDC Web.
22+
* Enable your users to be automatically signed-in to DDC Web with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You configure and test Azure AD single sign-on for DDC Web in a test environment. DDC Web supports **SP** and **IDP** initiated single sign-on.
26+
27+
## Prerequisites
28+
29+
To integrate Azure Active Directory with DDC Web, you need:
30+
31+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34+
* DDC Web single sign-on (SSO) enabled subscription.
35+
36+
## Add application and assign a test user
37+
38+
Before you begin the process of configuring single sign-on, you need to add the DDC Web application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
39+
40+
### Add DDC Web from the Azure AD gallery
41+
42+
Add DDC Web from the Azure AD application gallery to configure single sign-on with DDC Web. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
43+
44+
### Create and assign Azure AD test user
45+
46+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
47+
48+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
49+
50+
## Configure Azure AD SSO
51+
52+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
53+
54+
1. In the Azure portal, on the **DDC Web** application integration page, find the **Manage** section and select **single sign-on**.
55+
1. On the **Select a single sign-on method** page, select **SAML**.
56+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
57+
58+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
59+
60+
1. On the **Basic SAML Configuration** section, perform the following steps:
61+
62+
a. In the **Identifier** textbox, type a URL using the following pattern:
63+
`https://<yourwebsite>.com`
64+
65+
b. In the **Reply URL** textbox, type a URL using the following pattern:
66+
`https://<yourwebsite>.com/sso/`
67+
68+
1. If you wish to configure the application in **SP** initiated mode, then perform the following step:
69+
70+
In the **Sign on URL** textbox, type a URL using the following pattern:
71+
`https://<yourwebsite>.com`
72+
73+
> [!NOTE]
74+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [DDC Web Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
75+
76+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
77+
78+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
79+
80+
1. On the **Set up DDC Web** section, copy the appropriate URL(s) based on your requirement.
81+
82+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
83+
84+
## Configure DDC Web SSO
85+
86+
To configure single sign-on on **DDC Web** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [DDC Web support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
87+
88+
### Create DDC Web test user
89+
90+
In this section, you create a user called Britta Simon at DDC Web. Work with [DDC Web support team](mailto:[email protected]) to add the users in the DDC Web platform. Users must be created and activated before you use single sign-on.
91+
92+
## Test SSO
93+
94+
In this section, you test your Azure AD single sign-on configuration with following options.
95+
96+
#### SP initiated:
97+
98+
* Click on **Test this application** in Azure portal. This will redirect to DDC Web Sign-on URL where you can initiate the login flow.
99+
100+
* Go to DDC Web Sign-on URL directly and initiate the login flow from there.
101+
102+
#### IDP initiated:
103+
104+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the DDC Web for which you set up the SSO.
105+
106+
You can also use Microsoft My Apps to test the application in any mode. When you click the DDC Web tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the DDC Web for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
107+
108+
## Additional resources
109+
110+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
111+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
112+
113+
## Next steps
114+
115+
Once you configure DDC Web you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)