You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/hornbill-tutorial.md
+15-19Lines changed: 15 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 11/21/2022
12
+
ms.date: 04/19/2023
13
13
ms.author: jeedes
14
14
---
15
15
# Tutorial: Azure AD SSO integration with Hornbill
@@ -116,37 +116,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116
116
117
117
1. In a different web browser window, log in to Hornbill as a Security Administrator.
118
118
119
-
2. On the Home page, click **System**.
119
+
2. On the Home page, click the **Configuration** settings icon at the bottom left of the page.
120
120
121
-

121
+

122
122
123
-
3. Navigate to **Security**.
123
+
3. Navigate to **Platform Configuration**.
124
124
125
-

125
+

126
126
127
-
4. Click **SSO Profiles**.
127
+
4. Click **SSO Profiles** under Security.
128
128
129
-

129
+

130
130
131
-
5. On the right side of the page, click on **Add logo**.
131
+
5. On the right side of the page, click on **+ Create New Profile**.
132
132
133
-

133
+

134
134
135
-
6. On the **Profile Details** bar, click on **Import SAML Meta logo**.
135
+
6. On the **Profile Details** bar, click on the **Import IDP Meta Data** button.
136
136
137
-

137
+

138
138
139
-
7. On the Pop-up page in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
139
+
7. On the pop-up, in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
@@ -155,7 +151,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
155
151
In this section, a user called Britta Simon is created in Hornbill. Hornbill supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Hornbill, a new one is created after authentication.
156
152
157
153
> [!Note]
158
-
> If you need to create a user manually, contact[Hornbill Client support team](https://www.hornbill.com/support/?request/).
154
+
> If you need to create a user manually, contact[Hornbill Client support team](https://www.hornbill.com/support/?request/).
1. On the **Basic SAML Configuration** page, enter the values for the following fields:
79
79
@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
90
90
> These values are not the real. Update these values with the actual Sign-on URL, Reply URL and Logout URL. Your reply URL must have a subdomain for example: www, wd2, wd3, wd3-impl, wd5, wd5-impl).
91
91
> Using something like `http://www.myworkday.com` works but `http://myworkday.com` does not. Contact [Workday Client support team](https://www.workday.com/en-us/partners-services/services/support.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
92
92
93
-
1. Your Workday application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, where as**nameidentifier** is mapped with **user.userprincipalname**. Workday application expects **nameidentifier** to be mapped with **user.mail**, **UPN**, etc., so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
93
+
1. Your Workday application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, whereas**nameidentifier** is mapped with **user.userprincipalname**. Workday application expects **nameidentifier** to be mapped with **user.mail**, **UPN**, etc., so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
94
94
95
95

96
96
@@ -99,21 +99,21 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
99
99
100
100
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
@@ -136,7 +136,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136
136
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
137
137
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
138
138
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
139
-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been setup for this app, you see "Default Access" role selected.
139
+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
140
140
1. In the **Add Assignment** dialog, click the **Assign** button.
141
141
142
142
## Configure Workday
@@ -145,28 +145,28 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
145
145
146
146
1. In the **Search box**, search with the name **Edit Tenant Setup – Security** on the top left side of the home page.
a. In the **Service Provider ID (Will be Deprecated)** textbox, type **http://www.workday.com**.
190
-
191
-
b. In the **IDP SSO Service URL (Will be Deprecated)** textbox, type **Login URL** value.
192
-
193
-
c. Select **Do Not Deflate SP-initiated Authentication Request (Will be Deprecated)**.
183
+
g. Select **Do Not Deflate SP-initiated Authentication Request**.
194
184
195
-
d. For**Authentication Request Signature Method**, select **SHA256**.
185
+
h. Click**Ok**.
196
186
197
-
e. Click **OK**.
187
+
i. If the task was completed successfully, click **Done**.
198
188
199
189
> [!NOTE]
200
190
> Please ensure you set up single sign-on correctly. In case you enable single sign-on with incorrect setup, you may not be able to enter the application with your credentials and get locked out. In this situation, Workday provides a backup log-in URL where users can sign-in using their normal username and password in the following format:[Your Workday URL]/login.flex?redirect=n
@@ -207,13 +197,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
207
197
208
198
1. In the **Directory** page, select **Find Workers** in view tab.
1. In the **Find Workers** page, select the user from the results.
213
203
214
204
1. In the following page,select **Job > Worker Security** and the **Workday account** has to match with the Azure active directory as the **Name ID** value.
> For more information on how to create a workday test user, please contact [Workday Client support team](https://www.workday.com/en-us/partners-services/services/support.html).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -152,8 +152,8 @@ The following sections describe the syslog output syntax for each format.
152
152
153
153
| Name | Description |
154
154
|--|--|
155
-
| Date and Time | Date and time that the syslog server machine received the information. |
156
155
| Priority | User.Alert |
156
+
| Date and Time | Date and time that the syslog server machine received the information. |
157
157
| Hostname | Sensor IP |
158
158
| Message | Sensor name: The name of the appliance. <br /> Alert time: The time that the alert was detected: Can vary from the time of the syslog server machine, and depends on the time-zone configuration of the forwarding rule. <br /> Alert title: The title of the alert. <br /> Alert message: The message of the alert. <br /> Alert severity: The severity of the alert: **Warning**, **Minor**, **Major**, or **Critical**. <br /> Alert type: **Protocol Violation**, **Policy Violation**, **Malware**, **Anomaly**, or **Operational**. <br /> Protocol: The protocol of the alert. <br /> **Source_MAC**: IP address, name, vendor, or OS of the source device. <br /> Destination_MAC: IP address, name, vendor, or OS of the destination. If data is missing, the value will be **N/A**. <br /> alert_group: The alert group associated with the alert. |
159
159
@@ -170,8 +170,8 @@ The following sections describe the syslog output syntax for each format.
170
170
171
171
| Name | Description |
172
172
|--|--|
173
-
| Date and time | Date and time that the sensor sent the information, in UTC format |
174
173
| Priority | User.Alert |
174
+
| Date and time | Date and time that the sensor sent the information, in UTC format |
175
175
| Hostname | Sensor IP |
176
176
| Message | Sensor name: The name of the Microsoft Defender for IoT appliance. <br />LEEF:1.0 <br />Microsoft Defender for IoT <br />Sensor <br />Sensor version <br />Microsoft Defender for IoT Alert <br />title: The title of the alert. <br />msg: The message of the alert. <br />protocol: The protocol of the alert.<br />severity: **Warning**, **Minor**, **Major**, or **Critical**. <br />type: The type of the alert: **Protocol Violation**, **Policy Violation**, **Malware**, **Anomaly**, or **Operational**. <br />start: The time of the alert. It may be different from the time of the syslog server machine, and depends on the time-zone configuration. <br />src_ip: IP address of the source device.<br />dst_ip: IP address of the destination device. <br />cat: The alert group associated with the alert. |
0 commit comments