Skip to content

Commit 66db39c

Browse files
authored
Merge pull request #242255 from MicrosoftDocs/main
Merge main to live, 4AM
2 parents 73fade4 + d58b262 commit 66db39c

File tree

151 files changed

+1565
-1039
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+1565
-1039
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ For a full list of endpoints needed to use Microsoft online products, see [Offic
106106
To check if the Windows 10 client device has the right domain join type, use the following command:
107107

108108
```console
109-
Dsregcmd/status
109+
Dsregcmd /status
110110
```
111111

112112
The following sample output shows that the device is Azure AD joined as *AzureADJoined* is set to *YES*:

articles/active-directory/external-identities/customers/how-to-customize-languages-customers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ You can modify any or all of these attributes in the downloaded file. For exampl
166166
:::image type="content" source="media/how-to-customize-languages-customers/customized-attributes.png" alt-text="Screenshot of the modified sign-up page attributes.":::
167167

168168
> [!IMPORTANT]
169-
> In the customer tenant, we have two options to add custom text to the sign-up and sign-in experience. The function is available under each user flow during language customization and under [Company Branding](https://github.com/csmulligan/entra-previews/blob/PP3/docs/PP3_Customize%20CIAM%20neutral%20branding.md#customize-the-neutral-default-authentication-experience-for-the-ciam-tenant). Although we have to ways to customize strings (via Company branding and via User flows), both ways modify the same JSON file. The most recent change made either via User flows or via Company branding will always override the previous one.
169+
> In the customer tenant, we have two options to add custom text to the sign-up and sign-in experience. The function is available under each user flow during language customization and under [Company Branding](/azure/active-directory/external-identities/customers/how-to-customize-branding-customers). Although we have to ways to customize strings (via Company branding and via User flows), both ways modify the same JSON file. The most recent change made either via User flows or via Company branding will always override the previous one.
170170
171171
## Right-to-left language support
172172

articles/active-directory/external-identities/customers/how-to-facebook-federation-customers.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 05/24/2023
11+
ms.date: 06/20/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -27,32 +27,30 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
2727

2828
1. Sign in to [Facebook for developers](https://developers.facebook.com/apps) with your Facebook developer account credentials.
2929
1. If you haven't already done so, register as a Facebook developer: Select **Get Started** in the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
30-
1. Select **Create App**.
31-
1. For **Select an app type**, select **customers**, then select **Next**.
32-
1. Enter an **App Display Name** and a valid **App Contact Email**.
33-
1. Select **Create App**. This step may require you to accept Facebook platform policies and complete an online security check.
30+
1. Select **Create App**. Select **Set up Facebook Login**, and then select **Next**.
31+
1. For **Select an app type**, select **Consumer**, then select **Next**.
32+
1. Add an app name and a valid app contact mail.
33+
1. Select **Create app**. This step may require you to accept Facebook platform policies and complete an online security check.
3434
1. Select **Settings** > **Basic**.
35-
1. Copy the value of **App ID**.
36-
1. Select **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
35+
1. Copy the value of **App ID**. Then select **Show** and copy the value of **App Secret**. You use both of these values to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
3736
1. Enter a URL for the **Privacy Policy URL**, for example `https://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
3837
1. Enter a URL for the **Terms of Service URL**, for example `https://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
3938
1. Enter a URL for the **User Data Deletion**, for example `https://www.contoso.com/delete_my_data`. The User Data Deletion URL is a page you maintain to provide away for users to request that their data be deleted.
40-
1. Choose a **Category**, for example `Business and Pages`. Facebook requires this value, but it's not used for Azure AD.
41-
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
39+
1. Choose a **Category**, for example `Business and pages`. Facebook requires this value, but it's not used by Azure AD.
40+
1. At the bottom of the page, select **Add platform**, select **Website**, and then select **Next**.
4241
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43-
1. Select **Save Changes**.
44-
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45-
1. From the menu, select **Facebook Login**, select **Settings**.
46-
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
42+
1. Select **Save changes**.
43+
1. From the menu, select **Products**. Next to **Facebook Login**, select **Configure** > **Settings**.
44+
1. In **Valid OAuth Redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
4745
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
4846
- `https://<tenant-name>.ciamlogin.com/<tenant-ID>/federation/oidc/www.facebook.com`
4947
- `https://<tenant-name>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/www.facebook.com`
5048
- `https://<tenant-name>.ciamlogin.com/<tenant-ID>/federation/oauth2`
5149
- `https://<tenant-name>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
5250
> [!NOTE]
5351
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
54-
1. Select **Save Changes** at the bottom of the page.
55-
1. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
52+
1. Select **Save changes** at the bottom of the page.
53+
1. At this point, only Facebook application owners can sign in. Because you registered the app, you can sign in with your Facebook account. To make your Facebook application available to your users, from the menu, select **Go live**. Follow all of the steps listed to complete all requirements. You'll likely need to complete the business verification to verify your identity as a business entity or organization. For more information, see [Meta App Development](https://developers.facebook.com/docs/development/release).
5654

5755
## Configure Facebook federation in Azure AD for customers
5856

Lines changed: 106 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,106 @@
1+
---
2+
title: Azure Active Directory SSO integration with AlertEnterprise-Guardian
3+
description: Learn how to configure single sign-on between Azure Active Directory and AlertEnterprise-Guardian.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 06/16/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with AlertEnterprise-Guardian
18+
19+
In this article, you'll learn how to integrate AlertEnterprise-Guardian with Azure Active Directory (Azure AD). Application automates the identity management lifecycle. Built-in Regulatory Compliance ensures controls are in place before granting access to identities. When you integrate AlertEnterprise-Guardian with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to AlertEnterprise-Guardian.
22+
* Enable your users to be automatically signed-in to AlertEnterprise-Guardian with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You'll configure and test Azure AD single sign-on for AlertEnterprise-Guardian in a test environment. AlertEnterprise-Guardian supports **IDP** initiated single sign-on.
26+
27+
> [!NOTE]
28+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
29+
30+
## Prerequisites
31+
32+
To integrate Azure Active Directory with AlertEnterprise-Guardian, you need:
33+
34+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* AlertEnterprise-Guardian single sign-on (SSO) enabled subscription.
38+
39+
## Add application and assign a test user
40+
41+
Before you begin the process of configuring single sign-on, you need to add the AlertEnterprise-Guardian application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
42+
43+
### Add AlertEnterprise-Guardian from the Azure AD gallery
44+
45+
Add AlertEnterprise-Guardian from the Azure AD application gallery to configure single sign-on with AlertEnterprise-Guardian. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
46+
47+
### Create and assign Azure AD test user
48+
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
50+
51+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
52+
53+
## Configure Azure AD SSO
54+
55+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
56+
57+
1. In the Azure portal, on the **AlertEnterprise-Guardian** application integration page, find the **Manage** section and select **single sign-on**.
58+
1. On the **Select a single sign-on method** page, select **SAML**.
59+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
60+
61+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
62+
63+
1. On the **Basic SAML Configuration** section, perform the following steps:
64+
65+
a. In the **Identifier** textbox, type the value:
66+
`urn:mace:saml:pac4j.org`
67+
68+
b. In the **Reply URL** textbox, type a URL using the following pattern:
69+
`https://<SUBDOMAIN>.alerthsc.com/api/auth/sso/callback?client_name=<Client_Name>`
70+
71+
> [!Note]
72+
> The Reply URL is not real. Update this value with the actual Reply URL. Contact [AlertEnterprise-Guardian support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
73+
74+
1. AlertEnterprise-Guardian application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
75+
76+
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Image")
77+
78+
1. In addition to above, AlertEnterprise-Guardian application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
79+
80+
| Name | Source Attribute|
81+
| ---------------| --------- |
82+
| tenant | <Share_By_ALERT_Team> |
83+
84+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
85+
86+
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
87+
88+
## Configure AlertEnterprise-Guardian SSO
89+
90+
To configure single sign-on on **AlertEnterprise-Guardian** side, you need to send the **App Federation Metadata Url** to [AlertEnterprise-Guardian support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
91+
92+
### Create AlertEnterprise-Guardian test user
93+
94+
In this section, you create a user called Britta Simon at AlertEnterprise-Guardian. Work with [AlertEnterprise-Guardian support team](mailto:[email protected]) to add the users in the AlertEnterprise-Guardian platform. Users must be created and activated before you use single sign-on.
95+
96+
## Test SSO
97+
98+
In this section, you test your Azure AD single sign-on configuration with following options.
99+
100+
* Click on Test this application in Azure portal and you should be automatically signed in to the AlertEnterprise-Guardian for which you set up the SSO.
101+
102+
* You can use Microsoft My Apps. When you click the AlertEnterprise-Guardian tile in the My Apps, you should be automatically signed in to the AlertEnterprise-Guardian for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
103+
104+
## Next steps
105+
106+
Once you configure AlertEnterprise-Guardian you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)