Skip to content

Commit 8dfd3d8

Browse files
authored
Merge pull request #190761 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 200d0c2 + dfb5729 commit 8dfd3d8

File tree

96 files changed

+741
-437
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+741
-437
lines changed

articles/active-directory/saas-apps/appsec-flow-sso-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 02/23/2022
12+
ms.date: 03/02/2022
1313
ms.author: jeedes
1414

1515
---
@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Conviso Platform SSO single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.

articles/active-directory/saas-apps/envoy-tutorial.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Envoy | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Envoy'
33
description: Learn how to configure single sign-on between Azure Active Directory and Envoy.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/25/2021
12+
ms.date: 02/23/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Envoy
16+
# Tutorial: Azure AD SSO integration with Envoy
1717

1818
In this tutorial, you'll learn how to integrate Envoy with Azure Active Directory (Azure AD). When you integrate Envoy with Azure AD, you can:
1919

@@ -28,6 +28,9 @@ To get started, you need the following items:
2828
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2929
* Envoy single sign-on (SSO) enabled subscription.
3030

31+
> [!NOTE]
32+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
33+
3134
## Scenario description
3235

3336
In this tutorial, you configure and test Azure AD SSO in a test environment.

articles/active-directory/saas-apps/hoxhunt-tutorial.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Hoxhunt | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Hoxhunt'
33
description: Learn how to configure single sign-on between Azure Active Directory and Hoxhunt.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/31/2021
12+
ms.date: 03/04/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Hoxhunt
17+
# Tutorial: Azure AD SSO integration with Hoxhunt
1818

1919
In this tutorial, you'll learn how to integrate Hoxhunt with Azure Active Directory (Azure AD). When you integrate Hoxhunt with Azure AD, you can:
2020

@@ -36,7 +36,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
3636
* Hoxhunt supports **SP** initiated SSO.
3737
* Hoxhunt supports [Automated user provisioning](hoxhunt-provisioning-tutorial.md).
3838

39-
## Adding Hoxhunt from the gallery
39+
## Add Hoxhunt from the gallery
4040

4141
To configure the integration of Hoxhunt into Azure AD, you need to add Hoxhunt from the gallery to your list of managed SaaS apps.
4242

@@ -47,7 +47,6 @@ To configure the integration of Hoxhunt into Azure AD, you need to add Hoxhunt f
4747
1. In the **Add from the gallery** section, type **Hoxhunt** in the search box.
4848
1. Select **Hoxhunt** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4949

50-
5150
## Configure and test Azure AD SSO for Hoxhunt
5251

5352
Configure and test Azure AD SSO with Hoxhunt using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Hoxhunt.
@@ -71,19 +70,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7170

7271
![Edit Basic SAML Configuration](common/edit-urls.png)
7372

74-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
75-
76-
a. In the **Sign on URL** text box, type the URL:
77-
`https://app.hoxhunt.com/`
73+
1. On the **Basic SAML Configuration** section, perform the following steps:
7874

79-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
75+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
8076
`https://app.hoxhunt.com/saml/consume/<ID>`
8177

82-
c. In the **Reply URL** text box, type a URL using the following pattern:
78+
b. In the **Reply URL** text box, type a URL using the following pattern:
8379
`https://app.hoxhunt.com/saml/consume/<ID>`
8480

81+
c. In the **Sign on URL** text box, type the URL:
82+
`https://game.hoxhunt.com/`
83+
8584
> [!NOTE]
86-
> These values are not real. Update these values with the actual Reply URL and Identifier. Contact [Hoxhunt Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Hoxhunt Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8786

8887
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
8988

@@ -139,4 +138,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
139138

140139
## Next steps
141140

142-
Once you configure Hoxhunt you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
141+
Once you configure Hoxhunt you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/looker-analytics-platform-tutorial.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Looker Analytics Platform | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Looker Analytics Platform'
33
description: Learn how to configure single sign-on between Azure Active Directory and Looker Analytics Platform.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/10/2020
12+
ms.date: 02/23/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Looker Analytics Platform
17+
# Tutorial: Azure AD SSO integration with Looker Analytics Platform
1818

1919
In this tutorial, you'll learn how to integrate Looker Analytics Platform with Azure Active Directory (Azure AD). When you integrate Looker Analytics Platform with Azure AD, you can:
2020

@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Looker Analytics Platform single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.

articles/active-directory/saas-apps/postman-tutorial.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Postman | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Postman'
33
description: Learn how to configure single sign-on between Azure Active Directory and Postman.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/04/2021
12+
ms.date: 02/24/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Postman
17+
# Tutorial: Azure AD SSO integration with Postman
1818

1919
In this tutorial, you'll learn how to integrate Postman with Azure Active Directory (Azure AD). When you integrate Postman with Azure AD, you can:
2020

@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Postman single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.

articles/active-directory/saas-apps/proprofs-knowledge-base-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with ProProfs Knowledge Base | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with ProProfs Knowledge Base'
33
description: Learn how to configure single sign-on between Azure Active Directory and ProProfs Knowledge Base.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/27/2020
12+
ms.date: 02/24/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with ProProfs Knowledge Base
17+
# Tutorial: Azure AD SSO integration with ProProfs Knowledge Base
1818

1919
In this tutorial, you'll learn how to integrate ProProfs Knowledge Base with Azure Active Directory (Azure AD). When you integrate ProProfs Knowledge Base with Azure AD, you can:
2020

@@ -29,12 +29,15 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* ProProfs Knowledge Base single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.
3538

3639

37-
* ProProfs Knowledge Base supports **IDP** initiated SSO
40+
* ProProfs Knowledge Base supports **IDP** initiated SSO.
3841

3942
## Adding ProProfs Knowledge Base from the gallery
4043

articles/active-directory/saas-apps/us-bank-prepaid-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/03/2022
12+
ms.date: 03/04/2022
1313
ms.author: jeedes
1414

1515
---
@@ -79,14 +79,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979
a. In the **Identifier** text box, type the value:
8080
`USBank:SAML2.0:Prepaid_SP`
8181

82-
b. In the **Reply URL** text box, type the URL:
83-
`https://uat-federation.usbank.com/sp/ACS.saml2`
82+
b. In the **Reply URL** text box, type a URL using the following pattern:
83+
`https://<Environment>.usbank.com/sp/ACS.saml2`
8484

8585
c. In the **Sign-on URL** text box, type a URL using the following pattern:
8686
`https://<Environment>.usbank.com/sp/startSSO.ping?PartnerIdpId=<ID>`
8787

8888
> [!NOTE]
89-
> The value is not real. Update this value with the actual Sign-on URL. Contact [U.S. Bank Prepaid Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
> These values are not real. Update these values with the actual Reply URL and Sign-on URL. Contact [U.S. Bank Prepaid Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9090

9191
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
9292

@@ -138,8 +138,8 @@ In this section, you test your Azure AD single sign-on configuration with follow
138138

139139
* Click on **Test this application** in Azure portal and you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO.
140140

141-
You can also use Microsoft My Apps to test the application in any mode. When you click the U.S. Bank Prepaid tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
141+
You can also use Microsoft My Apps to test the application in any mode. When you click the U.S. Bank Prepaid tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
142142

143143
## Next steps
144144

145-
Once you configure U.S. Bank Prepaid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
145+
Once you configure U.S. Bank Prepaid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)