Skip to content

Commit 8d2884d

Browse files
authored
Merge pull request #107964 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 391a296 + 3601281 commit 8d2884d

File tree

232 files changed

+5965
-1089
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+5965
-1089
lines changed

.openpublishing.redirection.json

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2170,6 +2170,11 @@
21702170
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
21712171
"redirect_document_id": false
21722172
},
2173+
{
2174+
"source_path": "articles/cosmos-db/cosmos-db-security-controls.md",
2175+
"redirect_url": "/azure/cosmos-db/security-baseline",
2176+
"redirect_document_id": false
2177+
},
21732178
{
21742179
"source_path": "articles/cosmos-db/powershell-samples.md",
21752180
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -13604,6 +13609,11 @@
1360413609
"redirect_url": "/azure/event-hubs/authorize-access-azure-active-directory",
1360513610
"redirect_document_id": false
1360613611
},
13612+
{
13613+
"source_path": "articles/event-hubs/event-hubs-tutorial-virtual-networks-firewalls.md",
13614+
"redirect_url": "/azure/event-hubs/event-hubs-service-endpoints",
13615+
"redirect_document_id": false
13616+
},
1360713617
{
1360813618
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
1360913619
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -15786,7 +15796,12 @@
1578615796
},
1578715797
{
1578815798
"source_path": "articles/machine-learning/machine-learning-dedicated-capacity-for-bes-jobs.md",
15789-
"redirect_url": "/azure/machine-learning/studio/dedicated-capacity-for-bes-jobs",
15799+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
15800+
"redirect_document_id": false
15801+
},
15802+
{
15803+
"source_path": "articles/machine-learning/studio/dedicated-capacity-for-bes-jobs.md",
15804+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
1579015805
"redirect_document_id": false
1579115806
},
1579215807
{
@@ -49284,6 +49299,11 @@
4928449299
"redirect_url": "/azure/azure-monitor/overview",
4928549300
"redirect_document_id": false
4928649301
},
49302+
{
49303+
"source_path": "articles/cli/index.yml",
49304+
"redirect_url": "/cli/azure",
49305+
"redirect_document_id": false
49306+
},
4928749307
{
4928849308
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
4928949309
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",

articles/active-directory/app-provisioning/application-provisioning-configure-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Content-type: application/json
171171

172172
### Retrieve the template for the provisioning connector
173173

174-
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http).
174+
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http). Note that you will need to provide the ID. The ID refers to the preceding resource, which in this case is the ServicePrincipal.
175175

176176
#### *Request*
177177

@@ -263,10 +263,10 @@ Content-type: application/json
263263

264264
### Test the connection to the application
265265

266-
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
266+
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Applications often use BaseAddress in place of ClientSecret. To determine what credentials your app requires, navigate to the provisioning configuration page for your application and in developer mode click test connection. The network traffic will show the parameters used for credentials. The full list of credentials can be found [here](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http).
267267

268268
#### *Request*
269-
```http
269+
```msgraph-interactive
270270
POST https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/jobs/{id}/validateCredentials
271271
{
272272
credentials: [
@@ -290,7 +290,7 @@ HTTP/1.1 204 No Content
290290
Configuring provisioning requires establishing a trust between Azure AD and the application. Authorize access to the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
291291

292292
#### *Request*
293-
```json
293+
```msgraph-interactive
294294
PUT https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/secrets
295295
296296
{

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: develop
1212
ms.topic: conceptual
1313
ms.workload: identity
14-
ms.date: 02/19/2020
14+
ms.date: 03/17/2020
1515
ms.author: ryanwi
1616
ms.reviewer: jmprieur, lenalepa, sureshja, kkrishna
1717
ms.custom: aaddev
@@ -172,7 +172,7 @@ In this article, you learned how to build an application that can sign in a user
172172

173173
## Related content
174174

175-
* [Multi-tenant application sample](https://github.com/mspnp/multitenant-saas-guidance)
175+
* [Multi-tenant application sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-3-Multi-Tenant/README.md)
176176
* [Branding guidelines for applications][AAD-App-Branding]
177177
* [Application objects and service principal objects][AAD-App-SP-Objects]
178178
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]

articles/active-directory/fundamentals/active-directory-data-storage-australia-newzealand.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,20 @@ ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Identity data storage for Australian customers in Azure Active Directory
18+
# Identity data storage for Australian and New Zealand customers in Azure Active Directory
1919

2020
Identity data is stored by Azure AD in a geographical location based on the address provided by your organization when subscribing for a Microsoft Online service such as Office 365 and Azure. For information on where your Identity Customer Data is stored, you can use the [Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located) section of the Microsoft Trust Center.
2121

2222
> [!NOTE]
2323
> Services and applications that integrate with Azure AD have access to Identity Customer Data. Evaluate each service and application you use to determine how Identity Customer Data is processed by that specific service and application, and whether they meet your company's data storage requirements. For more information about Microsoft services' data residency, see the Where is your data located? section of the Microsoft Trust Center.
2424
25-
For customers who provided an address in Australia, Azure AD keeps identity data for these services within Australian datacenters:
26-
- Azure AD Directory Management
27-
- Authentication
25+
For customers who provided an address in Australia and New Zealand and uses Azure AD free edition, Azure AD keeps PII data at rest within Australian datacenters.
2826

29-
All other Azure AD services store customer data in global datacenters. To locate the datacenter for a service, see [Azure Active Directory – Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located)
27+
All other Azure AD premium services store customer data in global datacenters. To locate the datacenter for a service, see [Azure Active Directory – Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located)
3028

3129
## Microsoft Azure multi-factor authentication (MFA)
3230

33-
MFA stores Identity Customer Data in global datacenters. To learn more about the user information collected and stored by cloud-based Azure MFA and Azure MFA Server, see [Azure Multi-Factor Authentication user data collection](https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-data-residency).
31+
MFA service in Azure AD stores Identity Customer Data in global datacenters at rest. To learn more about the user information collected and stored by cloud-based Azure MFA and Azure MFA Server, see [Azure Multi-Factor Authentication user data collection](https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-data-residency). If customers use MFA their data will be stored outside of Australia datacenters at rest.
3432

3533
## Next steps
3634
For more information about any of the features and functionality described above, see these articles:
Lines changed: 157 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,157 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Datadog | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Datadog.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: b7845bdd-7bcd-4888-84fd-2551345054ee
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.topic: tutorial
16+
ms.date: 03/12/2020
17+
ms.author: jeedes
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Datadog
23+
24+
In this tutorial, you'll learn how to integrate Datadog with Azure Active Directory (Azure AD). When you integrate Datadog with Azure AD, you can:
25+
26+
* Control in Azure AD who has access to Datadog.
27+
* Enable your users to be automatically signed-in to Datadog with their Azure AD accounts.
28+
* Manage your accounts in one central location - the Azure portal.
29+
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
31+
32+
## Prerequisites
33+
34+
To get started, you need the following items:
35+
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* Datadog single sign-on (SSO) enabled subscription.
38+
39+
## Scenario description
40+
41+
In this tutorial, you configure and test Azure AD SSO in a test environment.
42+
43+
* Datadog supports **SP and IDP** initiated SSO
44+
* Once you configure Datadog you can enforce Session Control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session Control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
45+
46+
47+
## Adding Datadog from the gallery
48+
49+
To configure the integration of Datadog into Azure AD, you need to add Datadog from the gallery to your list of managed SaaS apps.
50+
51+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52+
1. On the left navigation pane, select the **Azure Active Directory** service.
53+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54+
1. To add new application, select **New application**.
55+
1. In the **Add from the gallery** section, type **Datadog** in the search box.
56+
1. Select **Datadog** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57+
58+
59+
## Configure and test Azure AD single sign-on for Datadog
60+
61+
Configure and test Azure AD SSO with Datadog using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Datadog.
62+
63+
To configure and test Azure AD SSO with Datadog, complete the following building blocks:
64+
65+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
1. **[Configure Datadog SSO](#configure-datadog-sso)** - to configure the single sign-on settings on application side.
69+
1. **[Create Datadog test user](#create-datadog-test-user)** - to have a counterpart of B.Simon in Datadog that is linked to the Azure AD representation of user.
70+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
71+
72+
## Configure Azure AD SSO
73+
74+
Follow these steps to enable Azure AD SSO in the Azure portal.
75+
76+
1. In the [Azure portal](https://portal.azure.com/), on the **Datadog** application integration page, find the **Manage** section and select **single sign-on**.
77+
1. On the **Select a single sign-on method** page, select **SAML**.
78+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
79+
80+
![Edit Basic SAML Configuration](common/edit-urls.png)
81+
82+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
83+
84+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
85+
86+
In the **Sign-on URL** text box, type a URL using the following pattern:
87+
`https://app.datadoghq.com/account/login/id/<CUSTOM_IDENTIFIER>`
88+
89+
> [!NOTE]
90+
> The value is not real. Update the value with the actual Sign-on URL. Contact [Datadog Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
91+
92+
1. Click **Save**.
93+
94+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
95+
96+
![The Certificate download link](common/metadataxml.png)
97+
98+
1. On the **Set up Datadog** section, copy the appropriate URL(s) based on your requirement.
99+
100+
![Copy configuration URLs](common/copy-configuration-urls.png)
101+
102+
### Create an Azure AD test user
103+
104+
In this section, you'll create a test user in the Azure portal called B.Simon.
105+
106+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
107+
1. Select **New user** at the top of the screen.
108+
1. In the **User** properties, follow these steps:
109+
1. In the **Name** field, enter `B.Simon`.
110+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
111+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
112+
1. Click **Create**.
113+
114+
### Assign the Azure AD test user
115+
116+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Datadog.
117+
118+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
119+
1. In the applications list, select **Datadog**.
120+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
121+
122+
![The "Users and groups" link](common/users-groups-blade.png)
123+
124+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
125+
126+
![The Add User link](common/add-assign-user.png)
127+
128+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
129+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
130+
1. In the **Add Assignment** dialog, click the **Assign** button.
131+
132+
133+
## Configure Datadog SSO
134+
135+
To configure single sign-on on **Datadog** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Datadog support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
136+
137+
### Create Datadog test user
138+
139+
In this section, you create a user called B.Simon in Datadog. Work with [Datadog support team](mailto:[email protected]) to add the users in the Datadog platform.
140+
141+
## Test SSO
142+
143+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
144+
145+
When you click the Datadog tile in the Access Panel, you should be automatically signed in to the Datadog for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
146+
147+
## Additional resources
148+
149+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
150+
151+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
152+
153+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
154+
155+
- [Try Datadog with Azure AD](https://aad.portal.azure.com/)
156+
157+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)