Skip to content

Commit 89d5351

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-rename
2 parents 7fe9f47 + 1b95cc5 commit 89d5351

File tree

15 files changed

+57
-73
lines changed

15 files changed

+57
-73
lines changed

articles/active-directory/saas-apps/hornbill-tutorial.md

Lines changed: 15 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Hornbill
@@ -116,37 +116,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
1. In a different web browser window, log in to Hornbill as a Security Administrator.
118118

119-
2. On the Home page, click **System**.
119+
2. On the Home page, click the **Configuration** settings icon at the bottom left of the page.
120120

121-
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/system.png "Hornbill system")
121+
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/settings.png "Hornbill system")
122122

123-
3. Navigate to **Security**.
123+
3. Navigate to **Platform Configuration**.
124124

125-
![Screenshot shows the Hornbill security.](./media/hornbill-tutorial/security.png "Hornbill security")
125+
![Screenshot shows the Hornbill platform configuration.](./media/hornbill-tutorial/platform-configuration.png "Hornbill security")
126126

127-
4. Click **SSO Profiles**.
127+
4. Click **SSO Profiles** under Security.
128128

129-
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profile.png "Hornbill single")
129+
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profiles.png "Hornbill single")
130130

131-
5. On the right side of the page, click on **Add logo**.
131+
5. On the right side of the page, click on **+ Create New Profile**.
132132

133-
![Screenshot shows to add the logo.](./media/hornbill-tutorial/add-logo.png "Hornbill add")
133+
![Screenshot shows to add the logo.](./media/hornbill-tutorial/create-new-profile.png "Hornbill create")
134134

135-
6. On the **Profile Details** bar, click on **Import SAML Meta logo**.
135+
6. On the **Profile Details** bar, click on the **Import IDP Meta Data** button.
136136

137-
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/logo.png "Hornbill logo")
137+
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/import-metadata.png "Hornbill logo")
138138

139-
7. On the Pop-up page in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
139+
7. On the pop-up, in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
140140

141-
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/process.png "Hornbill process")
141+
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/metadata-url.png "Hornbill process")
142142

143143
8. After clicking process the values get auto populated automatically under **Profile Details** section.
144144

145-
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/page.png "Hornbill profile")
146-
147-
![Screenshot shows Hornbill details.](./media/hornbill-tutorial/services.png "Hornbill details")
148-
149-
![Screenshot shows Hornbill certificate.](./media/hornbill-tutorial/details.png "Hornbill certificate")
145+
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/profile-details.png "Hornbill profile")
150146

151147
9. Click **Save Changes**.
152148

@@ -155,7 +151,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
155151
In this section, a user called Britta Simon is created in Hornbill. Hornbill supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Hornbill, a new one is created after authentication.
156152

157153
> [!Note]
158-
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
154+
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
159155
160156
## Test SSO
161157

60.5 KB
Loading
11.8 KB
Loading
20.1 KB
Loading
59.6 KB
Loading
71.5 KB
Loading
56.1 KB
Loading
349 KB
Loading

articles/active-directory/saas-apps/workday-tutorial.md

Lines changed: 20 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/18/2023
1313
ms.author: jeedes
1414
---
1515

@@ -73,7 +73,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373
1. On the **Select a Single sign-on method** page, select **SAML**.
7474
1. On the **Set up Single Sign-On with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7575

76-
![Edit Basic SAML Configuration](common/edit-urls.png)
76+
![Screenshot showing Edit Basic SAML Configuration.](common/edit-urls.png)
7777

7878
1. On the **Basic SAML Configuration** page, enter the values for the following fields:
7979

@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9090
> These values are not the real. Update these values with the actual Sign-on URL, Reply URL and Logout URL. Your reply URL must have a subdomain for example: www, wd2, wd3, wd3-impl, wd5, wd5-impl).
9191
> Using something like `http://www.myworkday.com` works but `http://myworkday.com` does not. Contact [Workday Client support team](https://www.workday.com/en-us/partners-services/services/support.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9292

93-
1. Your Workday application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, where as **nameidentifier** is mapped with **user.userprincipalname**. Workday application expects **nameidentifier** to be mapped with **user.mail**, **UPN**, etc., so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
93+
1. Your Workday application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, whereas **nameidentifier** is mapped with **user.userprincipalname**. Workday application expects **nameidentifier** to be mapped with **user.mail**, **UPN**, etc., so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
9494

9595
![Screenshot shows User Attributes with the Edit icon selected.](common/edit-attribute.png)
9696

@@ -99,21 +99,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9999

100100
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
101101

102-
![The Certificate download link](common/metadataxml.png)
102+
![Screenshot showing The Certificate download link.](common/metadataxml.png)
103103

104104
1. To modify the **Signing** options as per your requirement, click **Edit** button to open **SAML Signing Certificate** dialog.
105105

106-
![Certificate](common/edit-certificate.png)
107-
108-
![SAML Signing Certificate](./media/workday-tutorial/signing-option.png)
106+
![Screenshot showing Certificate.](common/edit-certificate.png)
109107

110108
a. Select **Sign SAML response and assertion** for **Signing Option**.
111109

110+
![Screenshot showing SAML Signing Certificate.](./media/workday-tutorial/signing-option.png)
111+
112112
b. Click **Save**
113113

114114
1. On the **Set up Workday** section, copy the appropriate URL(s) based on your requirement.
115115

116-
![Copy configuration URLs](common/copy-configuration-urls.png)
116+
![Screenshot showing Copy configuration URLs.](common/copy-configuration-urls.png)
117117

118118
### Create an Azure AD test user
119119

@@ -136,7 +136,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136136
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
137137
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
138138
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
139-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been setup for this app, you see "Default Access" role selected.
139+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
140140
1. In the **Add Assignment** dialog, click the **Assign** button.
141141

142142
## Configure Workday
@@ -145,28 +145,28 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
145145

146146
1. In the **Search box**, search with the name **Edit Tenant Setup – Security** on the top left side of the home page.
147147

148-
![Edit Tenant Security](./media/workday-tutorial/search-box.png "Edit Tenant Security")
148+
![Screenshot showing Edit Tenant Security.](./media/workday-tutorial/search-box.png "Edit Tenant Security")
149149

150150

151151
1. In the **SAML Setup** section, click on **Import Identity Provider**.
152152

153-
![SAML Setup](./media/workday-tutorial/saml-setup.png "SAML Setup")
153+
![Screenshot showing SAML Setup.](./media/workday-tutorial/saml-setup.png "SAML Setup")
154154

155155
1. In **Import Identity Provider** section, perform the below steps:
156156

157-
![Importing Identity Provider](./media/workday-tutorial/import-identity-provider.png)
157+
![Screenshot showing Importing Identity Provider.](./media/workday-tutorial/import-identity-provider.png)
158158

159159
a. Give the **Identity Provider Name** like `AzureAD` in the textbox.
160160

161161
b. In **Used for Environments** textbox, select the appropriate environment names from the dropdown.
162162

163163
c. Click on **Select files** to upload the downloaded **Federation Metadata XML** file.
164164

165-
d. Click on **OK** and then **Done**.
165+
d. Click on **OK**.
166166

167-
1. After clicking **Done**, a new row will be added in the **SAML Identity Providers** and then you can add the below steps for the newly created row.
167+
1. After clicking **OK**, a new row will be added in the **SAML Identity Providers** and then you can add the below steps for the newly created row.
168168

169-
![SAML Identity Providers.](./media/workday-tutorial/saml-identity-providers.png "SAML Identity Providers")
169+
![Screenshot showing SAML Identity Providers.](./media/workday-tutorial/saml-identity-providers.png "SAML Identity Providers")
170170

171171
a. Click on **Enable IDP Initiated Logout** checkbox.
172172

@@ -180,21 +180,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
180180

181181
f. In the **Service Provider ID** textbox, type **http://www.workday.com**.
182182

183-
g Select **Do Not Deflate SP-initiated Authentication Request**.
184-
185-
1. Perform the following steps in the below image.
186-
187-
![Workday](./media/workday-tutorial/service-provider.png "SAML Identity Providers")
188-
189-
a. In the **Service Provider ID (Will be Deprecated)** textbox, type **http://www.workday.com**.
190-
191-
b. In the **IDP SSO Service URL (Will be Deprecated)** textbox, type **Login URL** value.
192-
193-
c. Select **Do Not Deflate SP-initiated Authentication Request (Will be Deprecated)**.
183+
g. Select **Do Not Deflate SP-initiated Authentication Request**.
194184

195-
d. For **Authentication Request Signature Method**, select **SHA256**.
185+
h. Click **Ok**.
196186

197-
e. Click **OK**.
187+
i. If the task was completed successfully, click **Done**.
198188

199189
> [!NOTE]
200190
> Please ensure you set up single sign-on correctly. In case you enable single sign-on with incorrect setup, you may not be able to enter the application with your credentials and get locked out. In this situation, Workday provides a backup log-in URL where users can sign-in using their normal username and password in the following format:[Your Workday URL]/login.flex?redirect=n
@@ -207,13 +197,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
207197

208198
1. In the **Directory** page, select **Find Workers** in view tab.
209199

210-
![Find workers](./media/workday-tutorial/user-directory.png)
200+
![Screenshot showing Find workers.](./media/workday-tutorial/user-directory.png)
211201

212202
1. In the **Find Workers** page, select the user from the results.
213203

214204
1. In the following page,select **Job > Worker Security** and the **Workday account** has to match with the Azure active directory as the **Name ID** value.
215205

216-
![Worker Security](./media/workday-tutorial/worker-security.png)
206+
![Screenshot showing Worker Security.](./media/workday-tutorial/worker-security.png)
217207

218208
> [!NOTE]
219209
> For more information on how to create a workday test user, please contact [Workday Client support team](https://www.workday.com/en-us/partners-services/services/support.html).

articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,8 +152,8 @@ The following sections describe the syslog output syntax for each format.
152152

153153
| Name | Description |
154154
|--|--|
155-
| Date and Time | Date and time that the syslog server machine received the information. |
156155
| Priority | User.Alert |
156+
| Date and Time | Date and time that the syslog server machine received the information. |
157157
| Hostname | Sensor IP |
158158
| Message | Sensor name: The name of the appliance. <br /> Alert time: The time that the alert was detected: Can vary from the time of the syslog server machine, and depends on the time-zone configuration of the forwarding rule. <br /> Alert title: The title of the alert. <br /> Alert message: The message of the alert. <br /> Alert severity: The severity of the alert: **Warning**, **Minor**, **Major**, or **Critical**. <br /> Alert type: **Protocol Violation**, **Policy Violation**, **Malware**, **Anomaly**, or **Operational**. <br /> Protocol: The protocol of the alert. <br /> **Source_MAC**: IP address, name, vendor, or OS of the source device. <br /> Destination_MAC: IP address, name, vendor, or OS of the destination. If data is missing, the value will be **N/A**. <br /> alert_group: The alert group associated with the alert. |
159159

@@ -170,8 +170,8 @@ The following sections describe the syslog output syntax for each format.
170170

171171
| Name | Description |
172172
|--|--|
173-
| Date and time | Date and time that the sensor sent the information, in UTC format |
174173
| Priority | User.Alert |
174+
| Date and time | Date and time that the sensor sent the information, in UTC format |
175175
| Hostname | Sensor IP |
176176
| Message | Sensor name: The name of the Microsoft Defender for IoT appliance. <br />LEEF:1.0 <br />Microsoft Defender for IoT <br />Sensor <br />Sensor version <br />Microsoft Defender for IoT Alert <br />title: The title of the alert. <br />msg: The message of the alert. <br />protocol: The protocol of the alert.<br />severity: **Warning**, **Minor**, **Major**, or **Critical**. <br />type: The type of the alert: **Protocol Violation**, **Policy Violation**, **Malware**, **Anomaly**, or **Operational**. <br />start: The time of the alert. It may be different from the time of the syslog server machine, and depends on the time-zone configuration. <br />src_ip: IP address of the source device.<br />dst_ip: IP address of the destination device. <br />cat: The alert group associated with the alert. |
177177

0 commit comments

Comments
 (0)