Skip to content

Commit 69575e6

Browse files
authored
Merge pull request #199363 from janicericketts/patch-1
Update silverfort-azure-ad-integration.md
2 parents f5a230f + e1fc018 commit 69575e6

File tree

1 file changed

+19
-21
lines changed

1 file changed

+19
-21
lines changed

articles/active-directory/manage-apps/silverfort-azure-ad-integration.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,13 @@ ms.author: gasinh
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# Tutorial: Configure Silverfort with Azure Active Directory for secure hybrid access
17+
# Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Silverfort
1818

19-
In this tutorial, learn how to integrate Silverfort with Azure Active Directory (Azure AD). [Silverfort](https://www.silverfort.com/) uses innovative agent-less and proxy-less technology to connect all your assets on-premises and in the cloud to Azure AD. This solution enables organizations to apply identity protection, visibility, and user experience across all environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and proactively prevents threats.
19+
[Silverfort](https://www.silverfort.com/) uses innovative agent-less and proxy-less technology to connect all your assets on-premises and in the cloud to Azure AD. This solution enables organizations to apply identity protection, visibility, and user experience across all environments in Azure AD. It enables universal risk-based monitoring and assessment of authentication activity for on-premises and cloud environments, and proactively prevents threats.
2020

21-
Silverfort can seamlessly connect any type of asset into Azure AD, as if it was a modern web application. For example:
21+
In this tutorial, learn how to integrate your existing on premises Silverfort implementation with Azure Active Directory (Azure AD) for [hybrid access](../devices/concept-azure-ad-join-hybrid.md).
22+
23+
Silverfort seamlessly connects assets with Azure AD. These **bridged** assets appear as regular applications in Azure AD and can be protected with Conditional Access, single-sign-on (SSO), multifactor authentication, auditing and more. Use Silverfort to connect assets including:
2224

2325
- Legacy and homegrown applications
2426

@@ -30,17 +32,13 @@ Silverfort can seamlessly connect any type of asset into Azure AD, as if it was
3032

3133
- Infrastructure and industrial systems
3234

33-
These **bridged** assets appear as regular applications in Azure AD and can be protected with Conditional Access, single-sign-on (SSO), multifactor authentication, auditing and more.
34-
35-
This solution combines all corporate assets and third-party Identity and Access Management (IAM) platforms. For example, Active Directory, Active Directory Federation Services (ADFS), and Remote Authentication Dial-In User Service (RADIUS) on Azure AD, including hybrid and multi-cloud environments.
35+
Silverfort integrates your corporate assets and third-party Identity and Access Management (IAM) platforms. This includes Active Directory, Active Directory Federation Services (ADFS), and Remote Authentication Dial-In User Service (RADIUS) on Azure AD, including hybrid and multi-cloud environments.
3636

37-
## Scenario description
37+
Follow the steps in this tutorial to configure and test the Silverfort Azure AD bridge in your Azure AD tenant to communicate with your existing Silverfort implementation. Once configured, you can create Silverfort authentication policies that bridge authentication requests from various identity sources to Azure AD for SSO. After an application is bridged, it can be managed in Azure AD.
3838

39-
In this guide, you'll configure and test the Silverfort Azure AD bridge in your Azure AD tenant.
39+
## Silverfort with Azure AD Authentication Architecture
4040

41-
Once configured, you can create Silverfort authentication policies that bridge authentication requests from various identity sources to Azure AD for SSO. Once an application is bridged, it can be managed in Azure AD.
42-
43-
The following diagram shows the components included in the solution and sequence of authentication orchestrated by Silverfort.
41+
The following diagram describes the authentication architecture orchestrated by Silverfort in a hybrid environment.
4442

4543
![image shows the architecture diagram](./media/silverfort-azure-ad-integration/silverfort-architecture-diagram.png)
4644

@@ -56,23 +54,21 @@ The following diagram shows the components included in the solution and sequence
5654

5755
## Prerequisites
5856

59-
To set up SSO for an application that you added to your Azure AD tenant, you'll need:
57+
You must already have Silverfort deployed in your tenant or infrastructure in order to perform this tutorial. To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](https://www.silverfort.com/). You will need to install Silverfort Desktop app on relevant workstations.
58+
59+
This tutorial requires you to set up Silverfort Azure AD Adapter in your Azure AD tenant. You'll need:
6060

6161
- An Azure account with an active subscription. You can create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
6262

6363
- One of the following roles in your Azure account - Global administrator, Cloud application administrator, Application administrator, or Owner of the service principal.
6464

65-
- An application that supports SSO and that was already pre-configured and added to the Azure AD gallery. The Silverfort application in the Azure AD gallery is already pre-configured. You'll need to add it as an Enterprise application from the gallery.
66-
67-
## Onboard with Silverfort
68-
69-
To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](https://www.silverfort.com/). Install Silverfort Desktop app on relevant workstations.
65+
- The Silverfort Azure AD Adapter application in the Azure AD gallery is pre-configured to support SSO. You'll need to add Silverfort Azure AD Adapter to your tenant as an Enterprise application from the gallery.
7066

7167
## Configure Silverfort and create a policy
7268

7369
1. From a browser, log in to the **Silverfort admin console**.
7470

75-
2. In the main menu, navigate to **Settings**, and then scroll to
71+
2. In the main menu, navigate to **Settings** and then scroll to
7672
**Azure AD Bridge Connector** in the General section. Confirm your tenant ID, and then select **Authorize**.
7773

7874
![image shows azure ad bridge connector](./media/silverfort-azure-ad-integration/azure-ad-bridge-connector.png)
@@ -91,9 +87,9 @@ To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](http
9187

9288
![image shows enterprise application](./media/silverfort-azure-ad-integration/enterprise-application.png)
9389

94-
5. In the Silverfot admin console, navigate to the **Policies** page, and select **Create Policy**.
90+
5. In the Silverfort admin console, navigate to the **Policies** page and select **Create Policy**.
9591

96-
6. The **New Policy** dialog will appear. Enter a **Policy Name**, that would indicate the application name that will be created in Azure. For example, if you're adding multiple servers or applications under this policy, name it to reflect the resources covered by the policy. In the example, we'll create a policy for the *SL-APP1* server.
92+
6. The **New Policy** dialog will appear. Enter a **Policy Name** that would indicate the application name that will be created in Azure. For example, if you're adding multiple servers or applications under this policy, name it to reflect the resources covered by the policy. In the example, we'll create a policy for the *SL-APP1* server.
9793

9894
![image shows define policy](./media/silverfort-azure-ad-integration/define-policy.png)
9995

@@ -131,10 +127,12 @@ To deploy Silverfort in your tenant or infrastructure, [contact Silverfort](http
131127

132128
![image shows add policy](./media/silverfort-azure-ad-integration/add-policy.png)
133129

134-
14. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application should now appear. This application can now be included in [CA policies](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
130+
14. Return to the Azure AD console, and navigate to **Enterprise applications**. The new Silverfort application should now appear. This application can now be included in [Conditional Access policies](../authentication/tutorial-enable-azure-mfa.md?bc=/azure/active-directory/conditional-access/breadcrumb/toc.json&toc=/azure/active-directory/conditional-access/toc.json%23create-a-conditional-access-policy).
135131

136132
## Next steps
137133

138134
- [Silverfort Azure AD adapter](https://azuremarketplace.microsoft.com/marketplace/apps/aad.silverfortazureadadapter?tab=overview)
139135

140136
- [Silverfort resources](https://www.silverfort.com/resources/)
137+
138+
- [Contact Silverfort](https://www.silverfort.com/company/contact/)

0 commit comments

Comments
 (0)