Skip to content

Commit 89f62b0

Browse files
author
BobbySchmidt2
committed
fixing merge conflicts
2 parents 2447459 + b18b482 commit 89f62b0

File tree

196 files changed

+3220
-1265
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+3220
-1265
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28496,6 +28496,11 @@
2849628496
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds",
2849728497
"redirect_document_id": false
2849828498
},
28499+
{
28500+
"source_path": "articles/hdinsight/domain-joined/domain-joined-zeppelin-signin.md",
28501+
"redirect_url": "/azure/hdinsight/domain-joined/hdinsight-security-overview",
28502+
"redirect_document_id": false
28503+
},
2849928504
{
2850028505
"source_path": "articles/hdinsight/hdinsight-domain-joined-introduction.md",
2850128506
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-introduction",

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In an Azure AD tenant, users that belong to the tenant sign-in with an email add
3535

3636
In an Azure AD B2C tenant, most apps want the user to sign-in with any arbitrary email address (for example, [email protected], [email protected], [email protected], or [email protected]). This type of account is a local account. We also support arbitrary user names as local accounts (for example, joe, bob, sarah, or jim). You can choose one of these two local account types when configuring identity providers for Azure AD B2C in the Azure portal. In your Azure AD B2C tenant, select **Identity providers**, select **Local account**, and then select **Username**.
3737

38-
User accounts for applications must always be created through a sign-up user flow, sign-up or sign-in user flow, or by using the Azure AD Graph API. User accounts created in the Azure portal are only used for administering the tenant.
38+
User accounts for applications can be created through a sign-up user flow, sign-up or sign-in user flow, the Microsoft Graph API, or in the Azure portal.
3939

4040
### Which social identity providers do you support now? Which ones do you plan to support in the future?
4141

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Web APIs don't need to register a redirect URI because no user is interactively
5555

5656
Other settings specific to web APIs are the exposed API and the exposed scopes.
5757

58-
### Resource URI and scopes
58+
### Application ID URI and scopes
5959

6060
Scopes usually have the form `resourceURI/scopeName`. For Microsoft Graph, the scopes have shortcuts. For example, `User.Read` is a shortcut for `https://graph.microsoft.com/user.read`.
6161

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,22 +27,21 @@ This article explains how this works.
2727

2828
## How it works
2929

30-
Because you need to remember just one single user name and password, SSO simplifies access to your resources and improves the security of your environment. With an Azure AD joined device, your users already have an SSO experience to the cloud apps in your environment. If your environment has an Azure AD and an on-premises AD, you probably want to expand the scope of your SSO experience to your on-premises Line Of Business (LOB) apps, file shares, and printers.
30+
Because you need to remember just one single user name and password, SSO simplifies access to your resources and improves the security of your environment. With an Azure AD joined device, your users already have an SSO experience to the cloud apps in your environment. If your environment has an Azure AD and an on-premises AD, you probably want to expand the scope of your SSO experience to your on-premises Line Of Business (LOB) apps, file shares, and printers.
3131

3232
Azure AD joined devices have no knowledge about your on-premises AD environment because they aren't joined to it. However, you can provide additional information about your on-premises AD to these devices with Azure AD Connect.
3333

3434
An environment that has both, an Azure AD and an on-premises AD, is also known has hybrid environment. If you have a hybrid environment, it is likely that you already have Azure AD Connect deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, Azure AD Connect synchronizes on-premises user information to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
3535

36-
1. Azure AD sends the name of the on-premises domain the user is a member of back to the device.
36+
1. Azure AD sends the name of the on-premises domain the user is a member of back to the device.
3737
1. The local security authority (LSA) service enables Kerberos authentication on the device.
3838

39-
During an access attempt to a resource in the user's on-premises domain, the device:
39+
During an access attempt to a resource requesting Kerberos in the user's on-premises environment, the device:
4040

41-
1. Uses the domain information to locate a domain controller (DC).
4241
1. Sends the on-premises domain information and user credentials to the located DC to get the user authenticated.
43-
1. Receives a Kerberos [Ticket-Granting Ticket (TGT)](https://docs.microsoft.com/windows/desktop/secauthn/ticket-granting-tickets) that is used to access AD-joined resources.
42+
1. Receives a Kerberos [Ticket-Granting Ticket (TGT)](https://docs.microsoft.com/windows/desktop/secauthn/ticket-granting-tickets) that is used to access AD-joined resources. If the attempt to get the TGT for the AAD connect domain fails (related DCLocator timeout can cause a delay), Credential Manager entries are attempted, or the user may receive an authentication popup requesting credentials for the target resource.
4443

45-
All apps that are configured for **Windows-Integrated authentication** seamlessly get SSO when a user tries to access them.
44+
All apps that are configured for **Windows-Integrated authentication** seamlessly get SSO when a user tries to access them.
4645

4746
Windows Hello for Business requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
4847

Lines changed: 159 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,159 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Coda | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Coda.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: acaf2012-ef2e-4ce0-8467-ceece3bae50e
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.topic: tutorial
16+
ms.date: 01/23/2020
17+
ms.author: jeedes
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Coda
23+
24+
In this tutorial, you'll learn how to integrate Coda with Azure Active Directory (Azure AD). When you integrate Coda with Azure AD, you can:
25+
26+
* Control in Azure AD who has access to Coda.
27+
* Enable your users to be automatically signed-in to Coda with their Azure AD accounts.
28+
* Manage your accounts in one central location - the Azure portal.
29+
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
31+
32+
## Prerequisites
33+
34+
To get started, you need the following items:
35+
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* Coda single sign-on (SSO) enabled subscription.
38+
39+
## Scenario description
40+
41+
In this tutorial, you configure and test Azure AD SSO in a test environment.
42+
43+
* Coda supports **IDP** initiated SSO
44+
45+
* Coda supports **Just In Time** user provisioning
46+
47+
* Once you configure the Coda you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
48+
49+
## Adding Coda from the gallery
50+
51+
To configure the integration of Coda into Azure AD, you need to add Coda from the gallery to your list of managed SaaS apps.
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
54+
1. On the left navigation pane, select the **Azure Active Directory** service.
55+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
56+
1. To add new application, select **New application**.
57+
1. In the **Add from the gallery** section, type **Coda** in the search box.
58+
1. Select **Coda** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
59+
60+
61+
## Configure and test Azure AD single sign-on for Coda
62+
63+
Configure and test Azure AD SSO with Coda using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Coda.
64+
65+
To configure and test Azure AD SSO with Coda, complete the following building blocks:
66+
67+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
68+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
69+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
70+
1. **[Configure Coda SSO](#configure-coda-sso)** - to configure the single sign-on settings on application side.
71+
* **[Create Coda test user](#create-coda-test-user)** - to have a counterpart of B.Simon in Coda that is linked to the Azure AD representation of user.
72+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
73+
74+
## Configure Azure AD SSO
75+
76+
Follow these steps to enable Azure AD SSO in the Azure portal.
77+
78+
1. In the [Azure portal](https://portal.azure.com/), on the **Coda** application integration page, find the **Manage** section and select **single sign-on**.
79+
1. On the **Select a single sign-on method** page, select **SAML**.
80+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
81+
82+
![Edit Basic SAML Configuration](common/edit-urls.png)
83+
84+
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
85+
86+
a. In the **Identifier** text box, type a URL using the following pattern:
87+
`https://coda.io/samlId/<CUSTOMID>`
88+
89+
b. In the **Reply URL** text box, type a URL using the following pattern:
90+
`https://coda.io/samlId/<CUSTOMID>/consume`
91+
92+
> [!NOTE]
93+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Coda Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
94+
95+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
96+
97+
![The Certificate download link](common/certificatebase64.png)
98+
99+
1. On the **Set up Coda** section, copy the appropriate URL(s) based on your requirement.
100+
101+
![Copy configuration URLs](common/copy-configuration-urls.png)
102+
103+
### Create an Azure AD test user
104+
105+
In this section, you'll create a test user in the Azure portal called B.Simon.
106+
107+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
108+
1. Select **New user** at the top of the screen.
109+
1. In the **User** properties, follow these steps:
110+
1. In the **Name** field, enter `B.Simon`.
111+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
112+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
113+
1. Click **Create**.
114+
115+
### Assign the Azure AD test user
116+
117+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Coda.
118+
119+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
120+
1. In the applications list, select **Coda**.
121+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
122+
123+
![The "Users and groups" link](common/users-groups-blade.png)
124+
125+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
126+
127+
![The Add User link](common/add-assign-user.png)
128+
129+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
130+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
131+
1. In the **Add Assignment** dialog, click the **Assign** button.
132+
133+
## Configure Coda SSO
134+
135+
To configure single sign-on on **Coda** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Coda support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
136+
137+
### Create Coda test user
138+
139+
In this section, a user called Britta Simon is created in Coda. Coda supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Coda, a new one is created after authentication.
140+
141+
## Test SSO
142+
143+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
144+
145+
When you click the Coda tile in the Access Panel, you should be automatically signed in to the Coda for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
146+
147+
## Additional resources
148+
149+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
150+
151+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
152+
153+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
154+
155+
- [Try Coda with Azure AD](https://aad.portal.azure.com/)
156+
157+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
158+
159+
- [How to protect Coda with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)