You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/silverfort-azure-ad-integration.md
+19-21Lines changed: 19 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,11 +14,13 @@ ms.author: gasinh
14
14
ms.collection: M365-identity-device-management
15
15
---
16
16
17
-
# Tutorial: Configure Silverfort with Azure Active Directory for secure hybrid access
17
+
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Silverfort
18
18
19
-
In this tutorial, learn how to integrate Silverfort with Azure Active Directory (Azure AD). [Silverfort](https://www.silverfort.com/) uses innovative agent-less and proxy-less technology to connect all your assets on-premises and in the cloud to Azure AD. This solution enables organizations to apply identity protection, visibility, and user experience across all environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and proactively prevents threats.
19
+
[Silverfort](https://www.silverfort.com/) uses innovative agent-less and proxy-less technology to connect all your assets on-premises and in the cloud to Azure AD. This solution enables organizations to apply identity protection, visibility, and user experience across all environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and proactively prevents threats.
20
20
21
-
Silverfort can seamlessly connect any type of asset into Azure AD, as if it was a modern web application. For example:
21
+
In this tutorial, learn how to integrate your existing on premises Silverfort implementation with Azure Active Directory (Azure AD) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md).
22
+
23
+
Silverfort seamlessly connects assets with Azure AD. These **bridged** assets appear as regular applications in Azure AD and can be protected with Conditional Access, single-sign-on (SSO), multifactor authentication, auditing and more. Use Silverfort to connect assets including:
22
24
23
25
- Legacy and homegrown applications
24
26
@@ -30,17 +32,13 @@ Silverfort can seamlessly connect any type of asset into Azure AD, as if it was
30
32
31
33
- Infrastructure and industrial systems
32
34
33
-
These **bridged** assets appear as regular applications in Azure AD and can be protected with Conditional Access, single-sign-on (SSO), multifactor authentication, auditing and more.
34
-
35
-
This solution combines all corporate assets and third-party Identity and Access Management (IAM) platforms. For example, Active Directory, Active Directory Federation Services (ADFS), and Remote Authentication Dial-In User Service (RADIUS) on Azure AD, including hybrid and multi-cloud environments.
35
+
Silverfort integrates your corporate assets and third-party Identity and Access Management (IAM) platforms. This includes Active Directory, Active Directory Federation Services (ADFS), and Remote Authentication Dial-In User Service (RADIUS) on Azure AD, including hybrid and multi-cloud environments.
36
36
37
-
## Scenario description
37
+
Follow the steps in this tutorial to configure and test the Silverfort Azure AD bridge in your Azure AD tenant to communicate with your existing Silverfort implementation. Once configured, you can create Silverfort authentication policies that bridge authentication requests from various identity sources to Azure AD for SSO. After an application is bridged, it can be managed in Azure AD.
38
38
39
-
In this guide, you'll configure and test the Silverfort Azure AD bridge in your Azure AD tenant.
39
+
## Silverfort with Azure AD Authentication Architecture
40
40
41
-
Once configured, you can create Silverfort authentication policies that bridge authentication requests from various identity sources to Azure AD for SSO. Once an application is bridged, it can be managed in Azure AD.
42
-
43
-
The following diagram shows the components included in the solution and sequence of authentication orchestrated by Silverfort.
41
+
The following diagram describes the authentication architecture orchestrated by Silverfort in a hybrid environment.
44
42
45
43

46
44
@@ -56,23 +54,21 @@ The following diagram shows the components included in the solution and sequence
56
54
57
55
## Prerequisites
58
56
59
-
To set up SSO for an application that you added to your Azure AD tenant, you'll need:
57
+
You must already have Silverfort deployed in your tenant or infrastructure in order to perform this tutorial. To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](https://www.silverfort.com/). You will need to install Silverfort Desktop app on relevant workstations.
58
+
59
+
This tutorial requires you to set up Silverfort Azure AD Adapter in your Azure AD tenant. You'll need:
60
60
61
61
- An Azure account with an active subscription. You can create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
62
62
63
63
- One of the following roles in your Azure account - Global administrator, Cloud application administrator, Application administrator, or Owner of the service principal.
64
64
65
-
- An application that supports SSO and that was already pre-configured and added to the Azure AD gallery. The Silverfort application in the Azure AD gallery is already pre-configured. You'll need to add it as an Enterprise application from the gallery.
66
-
67
-
## Onboard with Silverfort
68
-
69
-
To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](https://www.silverfort.com/). Install Silverfort Desktop app on relevant workstations.
65
+
- The Silverfort Azure AD Adapter application in the Azure AD gallery is pre-configured to support SSO. You'll need to add Silverfort Azure AD Adapter to your tenant as an Enterprise application from the gallery.
70
66
71
67
## Configure Silverfort and create a policy
72
68
73
69
1. From a browser, log in to the **Silverfort admin console**.
74
70
75
-
2. In the main menu, navigate to **Settings**, and then scroll to
71
+
2. In the main menu, navigate to **Settings** and then scroll to
76
72
**Azure AD Bridge Connector** in the General section. Confirm your tenant ID, and then select **Authorize**.
77
73
78
74

@@ -91,9 +87,9 @@ To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](http
5. In the Silverfot admin console, navigate to the **Policies** page, and select **Create Policy**.
90
+
5. In the Silverfort admin console, navigate to the **Policies** page and select **Create Policy**.
95
91
96
-
6. The **New Policy** dialog will appear. Enter a **Policy Name**, that would indicate the application name that will be created in Azure. For example, if you're adding multiple servers or applications under this policy, name it to reflect the resources covered by the policy. In the example, we'll create a policy for the *SL-APP1* server.
92
+
6. The **New Policy** dialog will appear. Enter a **Policy Name** that would indicate the application name that will be created in Azure. For example, if you're adding multiple servers or applications under this policy, name it to reflect the resources covered by the policy. In the example, we'll create a policy for the *SL-APP1* server.
14. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application should now appear. This application can now be included in [CA policies](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
130
+
14. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application should now appear. This application can now be included in [Conditional Access policies](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
135
131
136
132
## Next steps
137
133
138
134
-[Silverfort Azure AD adapter](https://azuremarketplace.microsoft.com/marketplace/apps/aad.silverfortazureadadapter?tab=overview)
0 commit comments