Skip to content

Commit 66c3140

Browse files
committed
Resolved merge conflict
2 parents dad29e8 + c035b0f commit 66c3140

33 files changed

+616
-927
lines changed

articles/active-directory/saas-apps/evidence-tutorial.md

Lines changed: 80 additions & 121 deletions
Large diffs are not rendered by default.
24.5 KB
Loading
93.3 KB
Loading
19 KB
Loading
1.81 KB
Loading
4.69 KB
Loading
23 KB
Loading
Lines changed: 166 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,166 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with My IBISWorld | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and My IBISWorld.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 4b420540-bc72-4bc0-afaa-d5a7e4f0eaa4
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.topic: tutorial
16+
ms.date: 04/27/2020
17+
ms.author: jeedes
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with My IBISWorld
23+
24+
In this tutorial, you'll learn how to integrate My IBISWorld with Azure Active Directory (Azure AD). When you integrate My IBISWorld with Azure AD, you can:
25+
26+
* Control in Azure AD who has access to My IBISWorld.
27+
* Enable your users to be automatically signed-in to My IBISWorld with their Azure AD accounts.
28+
* Manage your accounts in one central location - the Azure portal.
29+
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
31+
32+
## Prerequisites
33+
34+
To get started, you need the following items:
35+
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* My IBISWorld single sign-on (SSO) enabled subscription.
38+
39+
## Scenario description
40+
41+
In this tutorial, you configure and test Azure AD SSO in a test environment.
42+
43+
* My IBISWorld supports **SP and IDP** initiated SSO
44+
* My IBISWorld supports **Just In Time** user provisioning
45+
* Once you configure My IBISWorld you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46+
47+
## Adding My IBISWorld from the gallery
48+
49+
To configure the integration of My IBISWorld into Azure AD, you need to add My IBISWorld from the gallery to your list of managed SaaS apps.
50+
51+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52+
1. On the left navigation pane, select the **Azure Active Directory** service.
53+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54+
1. To add new application, select **New application**.
55+
1. In the **Add from the gallery** section, type **My IBISWorld** in the search box.
56+
1. Select **My IBISWorld** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57+
58+
59+
## Configure and test Azure AD single sign-on for My IBISWorld
60+
61+
Configure and test Azure AD SSO with My IBISWorld using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in My IBISWorld.
62+
63+
To configure and test Azure AD SSO with My IBISWorld, complete the following building blocks:
64+
65+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
1. **[Configure My IBISWorld SSO](#configure-my-ibisworld-sso)** - to configure the single sign-on settings on application side.
69+
1. **[Create My IBISWorld test user](#create-my-ibisworld-test-user)** - to have a counterpart of B.Simon in My IBISWorld that is linked to the Azure AD representation of user.
70+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
71+
72+
## Configure Azure AD SSO
73+
74+
Follow these steps to enable Azure AD SSO in the Azure portal.
75+
76+
1. In the [Azure portal](https://portal.azure.com/), on the **My IBISWorld** application integration page, find the **Manage** section and select **single sign-on**.
77+
1. On the **Select a single sign-on method** page, select **SAML**.
78+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
79+
80+
![Edit Basic SAML Configuration](common/edit-urls.png)
81+
82+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
83+
84+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
85+
86+
In the **Sign-on URL** text box, type the URL:
87+
`https://my.ibisworld.com/account/login`
88+
89+
1. Click **Save**.
90+
91+
1. My IBISWorld application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
92+
93+
![image](common/default-attributes.png)
94+
95+
1. In addition to above, My IBISWorld application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
96+
97+
| Name | | Source Attribute|
98+
| ---------------| --------------- | --------- |
99+
| department | | user.department |
100+
| language | | user.preferredlanguage |
101+
| phone | | user.telephonenumber |
102+
| title | | user.jobtitle |
103+
| userid | | user.employeeid |
104+
| country | | user.country |
105+
106+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
107+
108+
![The Certificate download link](common/copy-metadataurl.png)
109+
### Create an Azure AD test user
110+
111+
In this section, you'll create a test user in the Azure portal called B.Simon.
112+
113+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
114+
1. Select **New user** at the top of the screen.
115+
1. In the **User** properties, follow these steps:
116+
1. In the **Name** field, enter `B.Simon`.
117+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
118+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
119+
1. Click **Create**.
120+
121+
### Assign the Azure AD test user
122+
123+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to My IBISWorld.
124+
125+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
126+
1. In the applications list, select **My IBISWorld**.
127+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
128+
129+
![The "Users and groups" link](common/users-groups-blade.png)
130+
131+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
132+
133+
![The Add User link](common/add-assign-user.png)
134+
135+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
136+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
137+
1. In the **Add Assignment** dialog, click the **Assign** button.
138+
139+
## Configure My IBISWorld SSO
140+
141+
To configure single sign-on on **My IBISWorld** side, you need to send the **App Federation Metadata Url** to [My IBISWorld support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
142+
143+
### Create My IBISWorld test user
144+
145+
In this section, a user called Britta Simon is created in My IBISWorld. My IBISWorld supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in My IBISWorld, a new one is created after authentication.
146+
147+
## Test SSO
148+
149+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
150+
151+
When you click the My IBISWorld tile in the Access Panel, you should be automatically signed in to the My IBISWorld for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
152+
153+
## Additional resources
154+
155+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
156+
157+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
158+
159+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
160+
161+
- [Try My IBISWorld with Azure AD](https://aad.portal.azure.com/)
162+
163+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
164+
165+
- [How to protect My IBISWorld with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
166+

articles/active-directory/saas-apps/netdocuments-tutorial.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -137,49 +137,48 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
137137

138138
1. In a different web browser window, sign into your NetDocuments company site as an administrator.
139139

140-
2. Go to **Admin**.
140+
2. In the upper-right corner, select your name>**Admin**.
141141

142-
3. Click **Add and remove users and groups**.
142+
3. Select **Security Center**.
143143

144-
![Repository](./media/netdocuments-tutorial/ic795047.png "Repository")
144+
![Repository](./media/netdocuments-tutorial/security-center.png "Security Center")
145145

146-
4. Click **Configure advanced authentication options**.
146+
4. Select **Advanced Authentication**.
147147

148-
![Configure advanced authentication options](./media/netdocuments-tutorial/ic795048.png "Configure advanced authentication options")
148+
![Configure advanced authentication options](./media/netdocuments-tutorial/advance-authentication.png "Configure advanced authentication options")
149149

150-
5. On the **Federated Identity** dialog, perform the following steps:
150+
5. On the **Federated ID** tab, perform the following steps:
151151

152-
![Federated Identity](./media/netdocuments-tutorial/ic795049.png "Federated Identity")
152+
![Federated Identity](./media/netdocuments-tutorial/federated-id.png "Federated Identity")
153153

154154
a. As **Federated identity server type**, select **Active Directory Federation Services**.
155-
156-
b. Click **Choose file**, to upload the downloaded metadata file which you have downloaded from Azure portal.
157-
158-
c. Click **OK**.
155+
156+
b. Select **Choose File**, to upload the downloaded metadata file which you have downloaded from Azure portal.
157+
158+
c. Select **SAVE**.
159159

160160
### Create NetDocuments test user
161161

162-
To enable Azure AD users to sign in to NetDocuments, they must be provisioned into NetDocuments.
163-
In the case of NetDocuments, provisioning is a manual task.
162+
To enable Azure AD users to sign in to NetDocuments, they must be provisioned into NetDocuments. In the case of NetDocuments, provisioning is a manual task.
164163

165164
**To provision a user account, perform the following steps:**
166165

167166
1. Sign on to your **NetDocuments** company site as administrator.
168167

169-
2. In the menu on the top, click **Admin**.
168+
2. In the upper-right corner, select your name>**Admin**.
170169

171-
![Admin](./media/netdocuments-tutorial/ic795051.png "Admin")
170+
![Admin](./media/netdocuments-tutorial/user-admin.png "Admin")
172171

173-
3. Click **Add and remove users and groups**.
172+
3. Select **Users and groups**.
174173

175-
![Repository](./media/netdocuments-tutorial/ic795047.png "Repository")
174+
![Repository](./media/netdocuments-tutorial/users-groups.png "Repository")
176175

177176
4. In the **Email Address** textbox, type the email address of a valid Azure Active Directory account you want to provision, and then click **Add User**.
178177

179-
![Email Address](./media/netdocuments-tutorial/ic795053.png "Email Address")
178+
![Email Address](./media/netdocuments-tutorial/user-mail.png "Email Address")
180179

181-
>[!NOTE]
182-
>The Azure Active Directory account holder will get an email that includes a link to confirm the account before it becomes active.
180+
> [!NOTE]
181+
> The Azure Active Directory account holder will get an email that includes a link to confirm the account before it becomes active.
183182
You can use any other NetDocuments user account creation tools or APIs provided by NetDocuments to provision Azure Active Directory user accounts.
184183

185184
## Test SSO
@@ -197,4 +196,3 @@ When you click the NetDocuments tile in the Access Panel, you should be automati
197196
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
198197

199198
- [Try NetDocuments with Azure AD](https://aad.portal.azure.com/)
200-

articles/active-directory/saas-apps/netsuite-tutorial.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/22/2020
16+
ms.date: 04/28/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -88,14 +88,14 @@ To enable Azure AD SSO in the Azure portal, do the following:
8888

8989
||
9090
|-|
91-
| `https://<Account ID>.NetSuite.com/saml2/acs`|
92-
| `https://<Account ID>.na1.NetSuite.com/saml2/acs`|
93-
| `https://<Account ID>.na2.NetSuite.com/saml2/acs`|
94-
| `https://<Account ID>.sandbox.NetSuite.com/saml2/acs`|
95-
| `https://<Account ID>.na1.sandbox.NetSuite.com/saml2/acs`|
96-
| `https://<Account ID>.na2.sandbox.NetSuite.com/saml2/acs`|
97-
98-
* You will get the **<`Account ID`>** value in the Netsuite configuration section which is explained later in the tutorial at step 8 under Netsuite Configuration. You will find the exact domain (such as system.na0.netsuite.com in this case).
91+
| `https://<Instance ID>.NetSuite.com/saml2/acs`|
92+
| `https://<Instance ID>.na1.NetSuite.com/saml2/acs`|
93+
| `https://<Instance ID>.na2.NetSuite.com/saml2/acs`|
94+
| `https://<Instance ID>.sandbox.NetSuite.com/saml2/acs`|
95+
| `https://<Instance ID>.na1.sandbox.NetSuite.com/saml2/acs`|
96+
| `https://<Instance ID>.na2.sandbox.NetSuite.com/saml2/acs`|
97+
98+
* You will get the **<`Instance ID`>** value in the Netsuite configuration section which is explained later in the tutorial at step 8 under Netsuite Configuration. You will find the exact domain (such as system.na0.netsuite.com in this case).
9999

100100
![Configure single sign-on](./media/NetSuite-tutorial/domain-value.png)
101101

0 commit comments

Comments
 (0)