You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-request-access.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 04/19/2019
15
+
ms.date: 10/26/2019
16
16
ms.author: ajburnle
17
17
ms.reviewer: mamkumar
18
18
ms.collection: M365-identity-device-management
@@ -56,13 +56,14 @@ Once you have found the access package in the My Access portal, you can submit a
56
56
57
57
1. Find the access package in the list. If necessary, you can search by typing a search string and then selecting the **Name**, **Catalog**, or **Resources** filter.
1. If the **Business justification** box is displayed, type a justification for needing access.
67
68
68
69
1. If **Request for specific period?** is enabled, select **Yes** or **No**.
@@ -77,6 +78,12 @@ Once you have found the access package in the My Access portal, you can submit a
77
78
78
79
If the access package requires approval, the request is now in a pending approval state.
79
80
81
+
### Select a policy
82
+
83
+
If you request access to an access package that has multiple policies that apply, you might be asked to select a policy. For example, an access package manager might configure an access package with two policies for two groups of internal employees. The first policy might allow access for 60 days and require approval. The second policy might allow access for 2 days and not require approval. If you encounter this scenario, you must select the policy you want to use.
If you submit an access request and the request is still in the **pending approval** state, you can cancel the request.
@@ -93,12 +100,6 @@ If you submit an access request and the request is still in the **pending approv
93
100
94
101
1. Click **Request history** to confirm the request was canceled.
95
102
96
-
## Select a policy
97
-
98
-
If you are requesting access to an access package that has multiple policies that apply, you might be asked to select a policy. For example, an access package manager might configure an access package with two policies for two groups of internal employees. The first policy might allow access for 60 days and require approval. The second policy might allow access for 2 days and not require approval. If you encounter this scenario, you must select the policy you want to use.
99
-
100
-
**Prerequisite role:** Requestor
101
-
102
103
## Next steps
103
104
104
105
-[Approve or deny access requests](entitlement-management-request-approve.md)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/helpscout-tutorial.md
+75-76Lines changed: 75 additions & 76 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: tutorial
16
-
ms.date: 02/15/2019
16
+
ms.date: 10/24/2019
17
17
ms.author: jeedes
18
18
19
19
ms.collection: M365-identity-device-management
@@ -34,7 +34,7 @@ If you don't have an Azure subscription, [create a free account](https://azure.m
34
34
35
35
To configure Azure AD integration with Help Scout, you need the following items:
36
36
37
-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get one-month trial [here](https://azure.microsoft.com/pricing/free-trial/)
37
+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38
38
* Help Scout single sign-on enabled subscription
39
39
40
40
## Scenario description
@@ -48,39 +48,28 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
48
48
49
49
To configure the integration of Help Scout into Azure AD, you need to add Help Scout from the gallery to your list of managed SaaS apps.
50
50
51
-
**To add Help Scout from the gallery, perform the following steps:**
52
-
53
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
54
-
55
-

56
-
57
-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
3. To add new application, click **New application** button on the top of dialog.
62
-
63
-

64
-
65
-
4. In the search box, type **Help Scout**, select **Help Scout** from result panel then click **Add** button to add the application.
66
-
67
-

51
+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52
+
1. On the left navigation pane, select the **Azure Active Directory** service.
53
+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54
+
1. To add new application, select **New application**.
55
+
1. In the **Add from the gallery** section, type **Help Scout** in the search box.
56
+
1. Select **Help Scout** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
68
57
69
58
## Configure and test Azure AD single sign-on
70
59
71
-
In this section, you configure and test Azure AD single sign-on with Help Scout based on a test user called **Britta Simon**.
60
+
In this section, you configure and test Azure AD single sign-on with Help Scout based on a test user called **B.Simon**.
72
61
For single sign-on to work, a link relationship between an Azure AD user and the related user in Help Scout needs to be established.
73
62
74
63
To configure and test Azure AD single sign-on with Help Scout, you need to complete the following building blocks:
75
64
76
-
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
77
-
2.**[Configure Help Scout Single Sign-On](#configure-help-scout-single-sign-on)** - to configure the Single Sign-On settings on application side.
78
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
79
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
80
-
5.**[Create Help Scout test user](#create-help-scout-test-user)** - to have a counterpart of Britta Simon in Help Scout that is linked to the Azure AD representation of user.
81
-
6.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
65
+
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66
+
***[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67
+
***[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68
+
1.**[Configure Help Scout SSO](#configure-help-scout-sso)** - to configure the single sign-on settings on application side.
69
+
***[Create Help Scout test user](#create-help-scout-test-user)** - to have a counterpart of B.Simon in Help Scout that is linked to the Azure AD representation of user.
70
+
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
82
71
83
-
### Configure Azure AD single sign-on
72
+
### Configure Azure AD SSO
84
73
85
74
In this section, you enable Azure AD single sign-on in the Azure portal.
86
75
@@ -90,15 +79,15 @@ To configure Azure AD single sign-on with Help Scout, perform the following step
90
79
91
80

92
81
93
-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
82
+
1. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
90
+
1. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
102
91
103
92

104
93
@@ -109,17 +98,17 @@ To configure Azure AD single sign-on with Help Scout, perform the following step
109
98
> [!NOTE]
110
99
> The values in these URLs are for demonstration only. You need to update these values from actual Reply URL and Identifier. You get these values from the **Single Sign-On** tab under Authentication section, which is explained later in the tutorial.
111
100
112
-
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
101
+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
113
102
114
103

115
104
116
105
In the **Sign-on URL** textbox, type a URL as: `https://secure.helpscout.net/members/login/`
117
106
118
-
6. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
107
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
@@ -129,43 +118,9 @@ To configure Azure AD single sign-on with Help Scout, perform the following step
129
118
130
119
c. Logout URL
131
120
132
-
### Configure Help Scout Single Sign-On
133
-
134
-
1. In a different web browser window, log in to your Help Scout company site as an administrator.
135
-
136
-
2. Click on **Manage** from the top menu and then select **Company** from the dropdown menu.
137
-
138
-

139
-
140
-
3. Select **Authentication** from the left navigation pane.
141
-
142
-

143
-
144
-
4. This takes you to the SAML settings section and perform the following steps:
145
-
146
-

147
-
148
-
a. Copy the **Post-back URL (Assertion Consumer Service URL)** value and paste the value in the **Reply URL** text box in the **Basic SAML Configuration** section in the Azure portal.
149
-
150
-
b. Copy the **Audience URI (Service Provider Entity ID)** value and paste the value in the **Identifier** text box in the **Basic SAML Configuration** section in the Azure portal.
151
-
152
-
5. Toggle **Enable SAML** on and perform the following steps:
153
-
154
-

155
-
156
-
a. In **Single Sign-On URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
157
-
158
-
b. Click **Upload Certificate** to upload the **Certificate(Base64)** downloaded from Azure portal.
159
-
160
-
c. Enter your organization's email domain(s) e.x.- `contoso.com` in the **Email Domains** textbox. You can separate multiple domains with a comma. Anytime a Help Scout User or Administrator who enters that specific domain on the [Help Scout log-in page](https://secure.helpscout.net/members/login/) will be routed to Identity Provider to authenticate with their credentials.
161
-
162
-
d. Lastly, you can toggle **Force SAML Sign-on** if you want Users to only log in to Help Scout via through this method. If you'd still like to leave the option for them to sign in with their Help Scout credentials, you can leave it toggled off. Even if this is enabled, an Account Owner will always be able to log in to Help Scout with their account password.
163
-
164
-
e. Click **Save**.
165
-
166
121
### Create an Azure AD test user
167
122
168
-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
123
+
The objective of this section is to create a test user in the Azure portal called B.Simon.
169
124
170
125
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
171
126
@@ -179,18 +134,18 @@ The objective of this section is to create a test user in the Azure portal calle
179
134
180
135

181
136
182
-
a. In the **Name** field enter **BrittaSimon**.
137
+
a. In the **Name** field enter **B.Simon**.
183
138
184
-
b. In the **User name** field type **brittasimon\@yourcompanydomain.extension**
185
-
For example, BrittaSimon@contoso.com
139
+
b. In the **User name** field type **B.Simon\@yourcompanydomain.extension**
140
+
For example, B.Simon@contoso.com
186
141
187
142
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
188
143
189
144
d. Click **Create**.
190
145
191
146
### Assign the Azure AD test user
192
147
193
-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Help Scout.
148
+
In this section, you enable B.Simon to use Azure single sign-on by granting access to Help Scout.
194
149
195
150
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **Help Scout**.
196
151
@@ -208,17 +163,59 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
166
+
5. In the **Users and groups** dialog select **B.Simon** in the Users list, then click the **Select** button at the bottom of the screen.
212
167
213
168
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
214
169
215
170
7. In the **Add Assignment** dialog click the **Assign** button.
216
171
172
+
## Configure Help Scout SSO
173
+
174
+
1. To automate the configuration within Help Scout, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
1. After adding extension to the browser, click on **Set up Help Scout** will direct you to the Help Scout application. From there, provide the admin credentials to sign into Help Scout. The browser extension will automatically configure the application for you and automate steps 3-7.
179
+
180
+

181
+
182
+
1. If you want to setup Help Scout manually, open a new web browser window and sign into your Help Scout company site as an administrator and perform the following steps:
183
+
184
+
1. Click on **Manage** from the top menu and then select **Company** from the dropdown menu.
185
+
186
+

187
+
188
+
1. Select **Authentication** from the left navigation pane.
189
+
190
+

191
+
192
+
1. This takes you to the SAML settings section and perform the following steps:
193
+
194
+

195
+
196
+
a. Copy the **Post-back URL (Assertion Consumer Service URL)** value and paste the value in the **Reply URL** text box in the **Basic SAML Configuration** section in the Azure portal.
197
+
198
+
b. Copy the **Audience URI (Service Provider Entity ID)** value and paste the value in the **Identifier** text box in the **Basic SAML Configuration** section in the Azure portal.
199
+
200
+
1. Toggle **Enable SAML** on and perform the following steps:
201
+
202
+

203
+
204
+
a. In **Single Sign-On URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
205
+
206
+
b. Click **Upload Certificate** to upload the **Certificate(Base64)** downloaded from Azure portal.
207
+
208
+
c. Enter your organization's email domain(s) e.x.- `contoso.com` in the **Email Domains** textbox. You can separate multiple domains with a comma. Anytime a Help Scout User or Administrator who enters that specific domain on the [Help Scout log-in page](https://secure.helpscout.net/members/login/) will be routed to Identity Provider to authenticate with their credentials.
209
+
210
+
d. Lastly, you can toggle **Force SAML Sign-on** if you want Users to only log in to Help Scout via through this method. If you'd still like to leave the option for them to sign in with their Help Scout credentials, you can leave it toggled off. Even if this is enabled, an Account Owner will always be able to log in to Help Scout with their account password.
211
+
212
+
e. Click **Save**.
213
+
217
214
### Create Help Scout test user
218
215
219
-
In this section, a user called Britta Simon is created in Help Scout. Help Scout supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Help Scout, a new one is created after authentication.
216
+
In this section, a user called B.Simon is created in Help Scout. Help Scout supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Help Scout, a new one is created after authentication.
220
217
221
-
### Test single sign-on
218
+
### Test SSO
222
219
223
220
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
224
221
@@ -230,4 +227,6 @@ When you click the Help Scout tile in the Access Panel, you should be automatica
230
227
231
228
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
232
229
233
-
-[What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
230
+
-[What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
231
+
232
+
-[Try Help Scout with Azure AD](https://aad.portal.azure.com/)
0 commit comments