Skip to content

Commit 690f454

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 6273f09 + edaec57 commit 690f454

File tree

63 files changed

+778
-321
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+778
-321
lines changed

articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,7 @@ ms.custom: "devx-track-csharp, aaddev, identityplatformtop40, scenarios:getting-
1818

1919
In this quickstart, you download and run a code sample that demonstrates how an ASP.NET Core web app can sign in users from any Azure Active Directory (Azure AD) organization.
2020

21-
The following diagram shows how the sample app works:
22-
23-
![Diagram of the interaction between the web browser, the web app, and the Microsoft identity platform in the sample app.](../../media/quickstart-v2-aspnet-core-webapp/aspnetcorewebapp-intro.svg)
21+
See [How the sample works](#how-the-sample-works) for an illustration.
2422

2523
## Prerequisites
2624

@@ -48,7 +46,6 @@ The following diagram shows how the sample app works:
4846

4947
#### Step 2: Download the ASP.NET Core project
5048

51-
5249
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1.zip)
5350

5451
[!INCLUDE [active-directory-develop-path-length-tip](../../../../../includes/active-directory-develop-path-length-tip.md)]
@@ -91,6 +88,10 @@ After consenting to the requested permissions, the app displays that you've succ
9188

9289
This section gives an overview of the code required to sign in users and call the Microsoft Graph API on their behalf. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET Core application and call Microsoft Graph. It uses [Microsoft.Identity.Web](../../microsoft-identity-web.md), which is a wrapper around [MSAL.NET](../../msal-overview.md).
9390

91+
### How the sample works
92+
93+
![Diagram of the interaction between the web browser, the web app, and the Microsoft identity platform in the sample app.](../../media/quickstart-v2-aspnet-core-webapp/aspnetcorewebapp-intro.svg)
94+
9495
### Startup class
9596

9697
The *Microsoft.AspNetCore.Authentication* middleware uses a `Startup` class that's executed when the hosting process starts:

articles/active-directory/develop/includes/web-app/quickstart-aspnet.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,9 @@ ms.custom: "devx-track-csharp, aaddev, identityplatformtop40, scenarios:getting-
1616
# Customer intent: As an application developer, I want to see a sample ASP.NET web app that can sign in Azure AD users.
1717
---
1818

19-
In this quickstart, you download and run a code sample that demonstrates an ASP.NET web application that can sign in users with Azure Active Directory (Azure AD) accounts.
19+
In this quickstart, you download and run a code sample that demonstrates an ASP.NET web application that can sign in users with Azure Active Directory (Azure AD) accounts.
2020

21-
The following diagram shows how the sample app works:
22-
23-
![Diagram of the interaction between the web browser, the web app, and the Microsoft identity platform in the sample app.](../../media/quickstart-v2-aspnet-webapp/aspnetwebapp-intro.svg)
21+
See [How the sample works](#how-the-sample-works) for an illustration.
2422

2523
## Prerequisites
2624

@@ -55,13 +53,12 @@ If you want to manually configure your application and code sample, use the foll
5553

5654
#### Step 2: Download the project
5755

58-
59-
[Download the Visual Studio 2019 solution](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
56+
[Download the ASP.NET code sample](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
6057

6158
[!INCLUDE [active-directory-develop-path-length-tip](../../../../../includes/active-directory-develop-path-length-tip.md)]
6259

6360

64-
#### Step 3: Run your Visual Studio project
61+
#### Step 3: Run the project
6562

6663
1. Extract the .zip file to a local folder that's close to the root folder. For example, extract to *C:\Azure-Samples*.
6764

articles/active-directory/develop/includes/web-app/quickstart-nodejs.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,21 @@ Next, clone the sample repo and install the NPM modules.
5454

5555
From your shell or command line:
5656

57-
`$ git clone [email protected]:AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-nodejs.git`
58-
57+
```
58+
$ git clone [email protected]:AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-nodejs.git
59+
```
5960
or
6061

61-
`$ git clone https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-nodejs.git`
62+
```
63+
$ git clone https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-nodejs.git
64+
```
6265

6366
From the project root directory, run the command:
6467

65-
`$ npm install`
68+
```
69+
$ npm install
70+
71+
```
6672

6773
## Configure the application
6874

@@ -78,15 +84,15 @@ Provide the parameters in `exports.creds` in config.js as instructed.
7884
* Update `exports.destroySessionUrl` in config.js, if you want to use a different `post_logout_redirect_uri`.
7985

8086
* Set `exports.useMongoDBSessionStore` in config.js to true, if you want to use [mongoDB](https://www.mongodb.com) or other [compatible session stores](https://github.com/expressjs/session#compatible-session-stores).
81-
The default session store in this sample is `express-session`. The default session store is not suitable for production.
87+
The default session store in this sample is `express-session`. The default session store isn't suitable for production.
8288

8389
* Update `exports.databaseUri`, if you want to use mongoDB session store and a different database URI.
8490

8591
* Update `exports.mongoDBSessionMaxAge`. Here you can specify how long you want to keep a session in mongoDB. The unit is second(s).
8692

8793
## Build and run the application
8894

89-
Start mongoDB service. If you are using mongoDB session store in this app, you have to [install mongoDB](http://www.mongodb.org/) and start the service first. If you are using the default session store, you can skip this step.
95+
Start mongoDB service. If you're using mongoDB session store in this app, you have to [install mongoDB](http://www.mongodb.org/) and start the service first. If you're using the default session store, you can skip this step.
9096

9197
Run the app using the following command from your command line.
9298

@@ -104,7 +110,7 @@ $ node app.js | bunyan
104110

105111
### You're done!
106112

107-
You will have a server successfully running on `http://localhost:3000`.
113+
You'll have a server successfully running on `http://localhost:3000`.
108114

109115
[!INCLUDE [Help and support](../../../../../includes/active-directory-develop-help-support-include.md)]
110116

Lines changed: 169 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,169 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Air'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Air.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 02/14/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Air
18+
19+
In this tutorial, you'll learn how to integrate Air with Azure Active Directory (Azure AD). When you integrate Air with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Air.
22+
* Enable your users to be automatically signed-in to Air with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Air single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Azure AD SSO in a test environment.
35+
36+
* Air supports **SP and IDP** initiated SSO.
37+
38+
## Adding Air from the gallery
39+
40+
To configure the integration of Air into Azure AD, you need to add Air from the gallery to your list of managed SaaS apps.
41+
42+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
43+
1. On the left navigation pane, select the **Azure Active Directory** service.
44+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
45+
1. To add new application, select **New application**.
46+
1. In the **Add from the gallery** section, type **Air** in the search box.
47+
1. Select **Air** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48+
49+
50+
## Configure and test Azure AD SSO for Air
51+
52+
Configure and test Azure AD SSO with Air using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Air.
53+
54+
To configure and test Azure AD SSO with Air, perform the following steps:
55+
56+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
57+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
58+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
59+
1. **[Configure Air SSO](#configure-air-sso)** - to configure the single sign-on settings on application side.
60+
1. **[Create Air test user](#create-air-test-user)** - to have a counterpart of B.Simon in Air that is linked to the Azure AD representation of user.
61+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
62+
63+
## Configure Azure AD SSO
64+
65+
Follow these steps to enable Azure AD SSO in the Azure portal.
66+
67+
1. In the Azure portal, on the **Air** application integration page, find the **Manage** section and select **single sign-on**.
68+
1. On the **Select a single sign-on method** page, select **SAML**.
69+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
70+
71+
![Edit Basic SAML Configuration](common/edit-urls.png)
72+
73+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
74+
75+
a. In the **Identifier** text box, type the value:
76+
`urn:amazon:cognito:sp:us-east-1_hFBg5izBk`
77+
78+
b. In the **Reply URL** text box, type the URL:
79+
`https://auth.air.inc/saml2/idpresponse`
80+
81+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
82+
83+
In the **Sign-on URL** text box, type a URL using the following pattern:
84+
`https://api.air.inc/integrations/saml/login/<CustomerID>`
85+
86+
> [!NOTE]
87+
> The value is not real. Update the value with the actual Sign-on URL. Contact [Air Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
88+
89+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
90+
91+
![The Certificate download link](common/copy-metadataurl.png)
92+
93+
### Create an Azure AD test user
94+
95+
In this section, you'll create a test user in the Azure portal called B.Simon.
96+
97+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
98+
1. Select **New user** at the top of the screen.
99+
1. In the **User** properties, follow these steps:
100+
1. In the **Name** field, enter `B.Simon`.
101+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
102+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
103+
1. Click **Create**.
104+
105+
### Assign the Azure AD test user
106+
107+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Air.
108+
109+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
110+
1. In the applications list, select **Air**.
111+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
112+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
113+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
114+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
115+
1. In the **Add Assignment** dialog, click the **Assign** button.
116+
117+
## Configure Air SSO
118+
119+
1. Log in to the Air website as an administrator.
120+
121+
1. Click on the **Workspace** at the top left corner.
122+
123+
1. Go to the **Settings** -> **SECURITY &IDENTITY** tab and perform the perform the following steps:
124+
125+
![Screenshot for Air configiration](./media/air-tutorial/integration.png)
126+
127+
a. In the **Manage approved email domains** text box, add your organizations email domains to the approved domains list to allow users with these domains to authenticate using SAML SSO.
128+
129+
b. Copy **Single sign-on URL** value, paste this value into the **Sign on URL** text box in the **Basic SAML Configuration** section in the Azure portal.
130+
131+
c. In the SAML metadata URL text box, paste the **App Federation Metadata Url** value which you have copied in the Azure portal.
132+
133+
d. Click **Enable SAML SSO**.
134+
135+
### Create Air test user
136+
137+
Log in to the Air website as an administrator.
138+
139+
1. Click on the **Workspace** at the top left corner.
140+
141+
1. Go to the **Settings** -> **MEMBERS** tab and click **Add members**.
142+
143+
1. Give the Email address and click **Invite**.
144+
145+
![Screenshot for User creation](./media/air-tutorial/user-new.png)
146+
147+
148+
## Test SSO
149+
150+
In this section, you test your Azure AD single sign-on configuration with following options.
151+
152+
#### SP initiated:
153+
154+
* Click on Test this application in Azure portal. This will redirect to Air Sign on URL where you can initiate the login flow.
155+
156+
* Go to Air Sign-on URL directly and initiate the login flow from there.
157+
158+
#### IDP initiated:
159+
160+
* Click on Test this application in Azure portal and you should be automatically signed in to the Air for which you set up the SSO
161+
162+
You can also use Microsoft My Apps to test the application in any mode. When you click the Air tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Air for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
163+
164+
165+
## Next steps
166+
167+
Once you configure Air you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
168+
169+

0 commit comments

Comments
 (0)