Skip to content

Commit 7681c8e

Browse files
authored
Merge pull request #101370 from v-hagamp/featuredapp7
Product Backlog Item 897190: SaaS App Tutorial: Description Update fo…
2 parents d87f718 + 64933a6 commit 7681c8e

File tree

2 files changed

+49
-39
lines changed

2 files changed

+49
-39
lines changed

articles/active-directory/saas-apps/netsuite-tutorial.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/10/2020
16+
ms.date: 01/16/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -45,6 +45,7 @@ NetSuite supports:
4545
* IDP-initiated SSO.
4646
* JIT (just-in-time) user provisioning.
4747
* [Automated user provisioning](NetSuite-provisioning-tutorial.md).
48+
* Once you configure the NetSuite you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4849

4950
> [!NOTE]
5051
> Because the identifier of this application is a fixed string value, only one instance can be configured in one tenant.
@@ -262,3 +263,6 @@ When you select the NetSuite tile in the Access Panel, you should be automatical
262263
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
263264
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
264265
- [Try NetSuite with Azure AD](https://aad.portal.azure.com/)
266+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
267+
268+
- [How to protect NetSuite with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/oracle-cloud-tutorial.md

Lines changed: 44 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 07/26/2019
16+
ms.date: 01/16/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
@@ -39,7 +38,10 @@ To get started, you need the following items:
3938

4039
## Scenario description
4140

42-
In this tutorial, you configure and test Azure AD SSO in a test environment. Oracle Cloud Infrastructure Console supports **SP** initiated SSO.
41+
In this tutorial, you configure and test Azure AD SSO in a test environment.
42+
43+
* Oracle Cloud Infrastructure Console supports **SP** initiated SSO.
44+
* Once you configure the Oracle Cloud Infrastructure Console you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4345

4446
## Adding Oracle Cloud Infrastructure Console from the gallery
4547

@@ -59,10 +61,10 @@ Configure and test Azure AD SSO with Oracle Cloud Infrastructure Console using a
5961
To configure and test Azure AD SSO with Oracle Cloud Infrastructure Console, complete the following building blocks:
6062

6163
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
64+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
65+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
6266
1. **[Configure Oracle Cloud Infrastructure Console](#configure-oracle-cloud-infrastructure-console)** to configure the SSO settings on application side.
63-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
64-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
65-
1. **[Create Oracle Cloud Infrastructure Console test user](#create-oracle-cloud-infrastructure-console-test-user)** to have a counterpart of B. Simon in Oracle Cloud Infrastructure Console that is linked to the Azure AD representation of user.
67+
1. **[Create Oracle Cloud Infrastructure Console test user](#create-oracle-cloud-infrastructure-console-test-user)** to have a counterpart of B. Simon in Oracle Cloud Infrastructure Console that is linked to the Azure AD representation of user.
6668
1. **[Test SSO](#test-sso)** to verify whether the configuration works.
6769

6870
### Configure Azure AD SSO
@@ -135,39 +137,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
135137

136138
![Copy configuration URLs](common/copy-configuration-urls.png)
137139

138-
### Configure Oracle Cloud Infrastructure Console
139140

140-
1. In a different web browser window, sign in to Oracle Cloud Infrastructure Console as an Administrator.
141-
142-
1. Click on the left side of the menu and click on **Identity** then navigate to **Federation**.
143-
144-
![Configuration](./media/oracle-cloud-tutorial/config01.png)
145-
146-
1. Save the **Service Provider metadata file** by clicking the **Download this document** link and upload it into the **Basic SAML Configuration** section of Azure portal and then click on **Add Identity Provider**.
147-
148-
![Configuration](./media/oracle-cloud-tutorial/config02.png)
149-
150-
1. On the **Add Identity Provider** pop-up, perform the following steps:
151-
152-
![Configuration](./media/oracle-cloud-tutorial/config03.png)
153-
154-
1. In the **NAME** text box, enter your name.
155-
156-
1. In the **DESCRIPTION** text box, enter your description.
157-
158-
1. Select **MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICE (ADFS) OR SAML 2.0 COMPLIANT IDENTITY PROVIDER** as **TYPE**.
159-
160-
1. Click **Browse** to upload the Federation Metadata XML, which you have downloaded from Azure portal.
161-
162-
1. Click **Continue** and on the **Edit Identity Provider** section perform the following steps:
163-
164-
![Configuration](./media/oracle-cloud-tutorial/config09.png)
165-
166-
1. The **IDENTITY PROVIDER GROUP** should be selected as Custom Group. The GROUP ID should be the GUID of the group from Azure Active Directory. The group needs to be mapped with corresponding group in **OCI GROUP** field.
167-
168-
1. You can map multiple groups as per your setup in Azure portal and your organization need. Click on **+ Add mapping** to add as many groups as you need.
169-
170-
1. Click **Submit**.
171141

172142
### Create an Azure AD test user
173143

@@ -199,6 +169,40 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
199169
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
200170
1. In the **Add Assignment** dialog, click the **Assign** button.
201171

172+
## Configure Oracle Cloud Infrastructure Console
173+
174+
1. In a different web browser window, sign in to Oracle Cloud Infrastructure Console as an Administrator.
175+
176+
1. Click on the left side of the menu and click on **Identity** then navigate to **Federation**.
177+
178+
![Configuration](./media/oracle-cloud-tutorial/config01.png)
179+
180+
1. Save the **Service Provider metadata file** by clicking the **Download this document** link and upload it into the **Basic SAML Configuration** section of Azure portal and then click on **Add Identity Provider**.
181+
182+
![Configuration](./media/oracle-cloud-tutorial/config02.png)
183+
184+
1. On the **Add Identity Provider** pop-up, perform the following steps:
185+
186+
![Configuration](./media/oracle-cloud-tutorial/config03.png)
187+
188+
1. In the **NAME** text box, enter your name.
189+
190+
1. In the **DESCRIPTION** text box, enter your description.
191+
192+
1. Select **MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICE (ADFS) OR SAML 2.0 COMPLIANT IDENTITY PROVIDER** as **TYPE**.
193+
194+
1. Click **Browse** to upload the Federation Metadata XML, which you have downloaded from Azure portal.
195+
196+
1. Click **Continue** and on the **Edit Identity Provider** section perform the following steps:
197+
198+
![Configuration](./media/oracle-cloud-tutorial/config09.png)
199+
200+
1. The **IDENTITY PROVIDER GROUP** should be selected as Custom Group. The GROUP ID should be the GUID of the group from Azure Active Directory. The group needs to be mapped with corresponding group in **OCI GROUP** field.
201+
202+
1. You can map multiple groups as per your setup in Azure portal and your organization need. Click on **+ Add mapping** to add as many groups as you need.
203+
204+
1. Click **Submit**.
205+
202206
### Create Oracle Cloud Infrastructure Console test user
203207

204208
Oracle Cloud Infrastructure Console supports just-in-time provisioning, which is by default. There is no action item for you in this section. A new user does not get created during an attempt to access and also no need to create the user.
@@ -216,3 +220,5 @@ When you select the Oracle Cloud Infrastructure Console tile in the Access Panel
216220
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
217221

218222
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
223+
224+
- [How to protect Oracle Cloud Infrastructure Console with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)