Skip to content

Commit 969bcd8

Browse files
authored
Merge pull request #9163 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents a506edf + b318948 commit 969bcd8

File tree

208 files changed

+5639
-2135
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

208 files changed

+5639
-2135
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -660,16 +660,6 @@
660660
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-nonaad",
661661
"redirect_document_id": true
662662
},
663-
{
664-
"source_path": "articles/active-directory/managed-service-identity/tutorial-vm-windows-access-storage.md",
665-
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-storage",
666-
"redirect_document_id": false
667-
},
668-
{
669-
"source_path": "articles/active-directory/managed-service-identity/tutorial-linux-vm-access-storage.md",
670-
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
671-
"redirect_document_id": true
672-
},
673663
{
674664
"source_path": "articles/active-directory/msi-tutorial-linux-vm-access-storage-sas.md",
675665
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
@@ -4405,6 +4395,21 @@
44054395
"redirect_url": "/azure/data-lake-analytics/data-lake-analytics-u-sql-get-started",
44064396
"redirect_document_id": false
44074397
},
4398+
{
4399+
"source_path": "articles/data-lake-analytics/data-lake-analytics-u-sql-develop-assemblies.md",
4400+
"redirect_url": "/azure/data-lake-analytics/data-lake-analytics-data-lake-tools-for-vscode",
4401+
"redirect_document_id": false
4402+
},
4403+
{
4404+
"source_path": "articles/data-lake-analytics/data-lake-analytics-get-started-rest-api.md",
4405+
"redirect_url": "/rest/api/datalakeanalytics/",
4406+
"redirect_document_id": false
4407+
},
4408+
{
4409+
"source_path": "articles/data-lake-analytics/data-lake-analytics-get-started-java-sdk.md",
4410+
"redirect_url": "/azure/data-lake-analytics/data-lake-analytics-manage-use-java-sdk",
4411+
"redirect_document_id": false
4412+
},
44084413
{
44094414
"source_path": "articles/dotnet/index.md",
44104415
"redirect_url": "/dotnet/azure/",
@@ -21866,11 +21871,19 @@
2186621871
"redirect_document_id": true
2186721872
},
2186821873
{
21869-
"source_path": "articles/application-gateway/application-gateway-ilb.md",
21874+
"source_path": "articles/cosmos-db/table-storage-how-to-use-powershell.md",
21875+
"redirect_url": "/azure/storage/tables/table-storage-how-to-use-powershell",
21876+
"redirect_document_id": true
21877+
},
21878+
{ "source_path": "articles/application-gateway/application-gateway-ilb.md",
2187021879
"redirect_url": "/azure/application-gateway/application-gateway-ilb-arm",
2187121880
"redirect_document_id": false
21872-
}
21873-
,
21881+
},
21882+
{
21883+
"source_path": "articles/application-gateway/create-waf-portal.md",
21884+
"redirect_url": "/azure/application-gateway/application-gateway-web-application-firewall-portal",
21885+
"redirect_document_id": false
21886+
},
2187421887
{
2187521888
"source_path": "articles/active-directory/active-directory-conditional-access-vpn-connectivity-windows10.md",
2187621889
"redirect_url": "https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-vpn-deploy",
@@ -21889,4 +21902,4 @@
2188921902
"redirect_document_id": true
2189021903
}
2189121904
]
21892-
}
21905+
}
Lines changed: 229 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,229 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory integration with ForeSee CX Suite | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and ForeSee CX Suite.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: femila
8+
ms.reviewer: joflore
9+
10+
ms.assetid: 5f4b7830-6186-4d17-b77b-504d4192bfde
11+
ms.service: active-directory
12+
ms.workload: identity
13+
ms.tgt_pltfrm: na
14+
ms.devlang: na
15+
ms.topic: article
16+
ms.date: 05/24/2018
17+
ms.author: jeedes
18+
19+
---
20+
# Tutorial: Azure Active Directory integration with ForeSee CX Suite
21+
22+
In this tutorial, you learn how to integrate ForeSee CX Suite with Azure Active Directory (Azure AD).
23+
24+
Integrating ForeSee CX Suite with Azure AD provides you with the following benefits:
25+
26+
- You can control in Azure AD who has access to ForeSee CX Suite.
27+
- You can enable your users to automatically get signed-on to ForeSee CX Suite (Single Sign-On) with their Azure AD accounts.
28+
- You can manage your accounts in one central location - the Azure portal.
29+
30+
If you want to know more details about SaaS app integration with Azure AD, see [what is application access and single sign-on with Azure Active Directory](active-directory-appssoaccess-whatis.md).
31+
32+
## Prerequisites
33+
34+
To configure Azure AD integration with ForeSee CX Suite, you need the following items:
35+
36+
- An Azure AD subscription
37+
- A ForeSee CX Suite single sign-on enabled subscription
38+
39+
> [!NOTE]
40+
> To test the steps in this tutorial, we do not recommend using a production environment.
41+
42+
To test the steps in this tutorial, you should follow these recommendations:
43+
44+
- Do not use your production environment, unless it is necessary.
45+
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
46+
47+
## Scenario description
48+
In this tutorial, you test Azure AD single sign-on in a test environment.
49+
The scenario outlined in this tutorial consists of two main building blocks:
50+
51+
1. Adding ForeSee CX Suite from the gallery
52+
2. Configuring and testing Azure AD single sign-on
53+
54+
## Adding ForeSee CX Suite from the gallery
55+
To configure the integration of ForeSee CX Suite into Azure AD, you need to add ForeSee CX Suite from the gallery to your list of managed SaaS apps.
56+
57+
**To add ForeSee CX Suite from the gallery, perform the following steps:**
58+
59+
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
60+
61+
![The Azure Active Directory button][1]
62+
63+
2. Navigate to **Enterprise applications**. Then go to **All applications**.
64+
65+
![The Enterprise applications blade][2]
66+
67+
3. To add new application, click **New application** button on the top of dialog.
68+
69+
![The New application button][3]
70+
71+
4. In the search box, type **ForeSee CX Suite**, select **ForeSee CX Suite** from result panel then click **Add** button to add the application.
72+
73+
![ForeSee CX Suite in the results list](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseecxsuite_addfromgallery.png)
74+
75+
## Configure and test Azure AD single sign-on
76+
77+
In this section, you configure and test Azure AD single sign-on with ForeSee CX Suite based on a test user called "Britta Simon".
78+
79+
For single sign-on to work, Azure AD needs to know what the counterpart user in ForeSee CX Suite is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in ForeSee CX Suite needs to be established.
80+
81+
To configure and test Azure AD single sign-on with ForeSee CX Suite, you need to complete the following building blocks:
82+
83+
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
84+
2. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
85+
3. **[Create a ForeSee CX Suite test user](#create-a-foresee-cx-suite-test-user)** - to have a counterpart of Britta Simon in ForeSee CX Suite that is linked to the Azure AD representation of user.
86+
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
87+
5. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
88+
89+
### Configure Azure AD single sign-on
90+
91+
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your ForeSee CX Suite application.
92+
93+
**To configure Azure AD single sign-on with ForeSee CX Suite, perform the following steps:**
94+
95+
1. In the Azure portal, on the **ForeSee CX Suite** application integration page, click **Single sign-on**.
96+
97+
![Configure single sign-on link][4]
98+
99+
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
100+
101+
![Single sign-on dialog box](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseecxsuite_samlbase.png)
102+
103+
3. On the **ForeSee CX Suite Domain and URLs** section, if you have **Service Provider metadata file**, perform the following steps:
104+
105+
![ForeSee CX Suite Domain and URLs single sign-on information](./media/active-directory-saas-foreseecxsuite-tutorial/upload.png)
106+
107+
a. Click **Upload metadata file**.
108+
109+
![ForeSee CX Suite Domain and URLs single sign-on information](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseen_uploadconfig.png)
110+
111+
b. Click on **folder logo** to select the metadata file and click **Upload**.
112+
113+
c. After successfull completion of uploading **Service Provider metadata file** the **Identifier** value get auto populated in **ForeSee CX Suite Domain and URLs** section textbox as shown below:
114+
115+
![ForeSee CX Suite Domain and URLs single sign-on information](./media/active-directory-saas-foreseecxsuite-tutorial/urlupload.png)
116+
117+
4. If you dont have **Service Provider metadata file**, perform the following steps:
118+
119+
![ForeSee CX Suite Domain and URLs single sign-on information](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseecxsuite_url.png)
120+
121+
a. In the **Sign-on URL** textbox, type the URL: `https://cxsuite.foresee.com/`
122+
123+
b. In the **Identifier** textbox, type a URL using the following pattern: `https://www.okta.com/saml2/service-provider/<UniqueID>`
124+
125+
> [!NOTE]
126+
> The Identifier value is not real. Update this value with the actual Identifier. Contact [ForeSee CX Suite Client support team](mailto:[email protected]) to get this value.
127+
128+
5. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer.
129+
130+
![The Certificate download link](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseecxsuite_certificate.png)
131+
132+
6. Click **Save** button.
133+
134+
![Configure Single Sign-On Save button](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_400.png)
135+
136+
7. To configure single sign-on on **ForeSee CX Suite** side, you need to send the downloaded **Metadata XML** to [ForeSee CX Suite support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
137+
138+
### Create an Azure AD test user
139+
140+
The objective of this section is to create a test user in the Azure portal called Britta Simon.
141+
142+
![Create an Azure AD test user][100]
143+
144+
**To create a test user in Azure AD, perform the following steps:**
145+
146+
1. In the Azure portal, in the left pane, click the **Azure Active Directory** button.
147+
148+
![The Azure Active Directory button](./media/active-directory-saas-foreseecxsuite-tutorial/create_aaduser_01.png)
149+
150+
2. To display the list of users, go to **Users and groups**, and then click **All users**.
151+
152+
![The "Users and groups" and "All users" links](./media/active-directory-saas-foreseecxsuite-tutorial/create_aaduser_02.png)
153+
154+
3. To open the **User** dialog box, click **Add** at the top of the **All Users** dialog box.
155+
156+
![The Add button](./media/active-directory-saas-foreseecxsuite-tutorial/create_aaduser_03.png)
157+
158+
4. In the **User** dialog box, perform the following steps:
159+
160+
![The User dialog box](./media/active-directory-saas-foreseecxsuite-tutorial/create_aaduser_04.png)
161+
162+
a. In the **Name** box, type **BrittaSimon**.
163+
164+
b. In the **User name** box, type the email address of user Britta Simon.
165+
166+
c. Select the **Show Password** check box, and then write down the value that's displayed in the **Password** box.
167+
168+
d. Click **Create**.
169+
170+
### Create a ForeSee CX Suite test user
171+
172+
In this section, you create a user called Britta Simon in ForeSee CX Suite. Work with [ForeSee CX Suite support team](mailto:[email protected]) to add the users or the domain which is needed to be whitelisted in the ForeSee CX Suite platform. If the domain is added by the team, users will get automatically provisioned to the ForeSee CX Suite platform. Users must be created and activated before you use single sign-on.
173+
174+
### Assign the Azure AD test user
175+
176+
In this section, you enable Britta Simon to use Azure single sign-on by granting access to ForeSee CX Suite.
177+
178+
![Assign the user role][200]
179+
180+
**To assign Britta Simon to ForeSee CX Suite, perform the following steps:**
181+
182+
1. In the Azure portal, open the applications view, and then navigate to the directory view and go to **Enterprise applications** then click **All applications**.
183+
184+
![Assign User][201]
185+
186+
2. In the applications list, select **ForeSee CX Suite**.
187+
188+
![The ForeSee CX Suite link in the Applications list](./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_foreseecxsuite_app.png)
189+
190+
3. In the menu on the left, click **Users and groups**.
191+
192+
![The "Users and groups" link][202]
193+
194+
4. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
195+
196+
![The Add Assignment pane][203]
197+
198+
5. On **Users and groups** dialog, select **Britta Simon** in the Users list.
199+
200+
6. Click **Select** button on **Users and groups** dialog.
201+
202+
7. Click **Assign** button on **Add Assignment** dialog.
203+
204+
### Test single sign-on
205+
206+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
207+
208+
When you click the ForeSee CX Suite tile in the Access Panel, you should get automatically signed-on to your ForeSee CX Suite application.
209+
For more information about the Access Panel, see [Introduction to the Access Panel](active-directory-saas-access-panel-introduction.md).
210+
211+
## Additional resources
212+
213+
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
214+
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)
215+
216+
<!--Image references-->
217+
218+
[1]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_01.png
219+
[2]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_02.png
220+
[3]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_03.png
221+
[4]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_04.png
222+
223+
[100]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_100.png
224+
225+
[200]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_200.png
226+
[201]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_201.png
227+
[202]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_202.png
228+
[203]: ./media/active-directory-saas-foreseecxsuite-tutorial/tutorial_general_203.png
229+

articles/active-directory/develop/active-directory-token-and-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ eyJ0eXAiOiJKV1QiLCJhbGciOiJub25lIn0.eyJhdWQiOiIyZDRkMTFhMi1mODE0LTQ2YTctODkwYS0y
5252
| JWT Claim | Name | Description |
5353
| --- | --- | --- |
5454
| `aud` |Audience |The intended recipient of the token. The application that receives the token must verify that the audience value is correct and reject any tokens intended for a different audience. <br><br> **Example SAML Value**: <br> `<AudienceRestriction>`<br>`<Audience>`<br>`https://contoso.com`<br>`</Audience>`<br>`</AudienceRestriction>` <br><br> **Example JWT Value**: <br> `"aud":"https://contoso.com"` |
55-
| `appidacr` |Application Authentication Context Class Reference |Indicates how the client was authenticated. For a public client, the value is 0. If client ID and client secret are used, the value is 1. <br><br> **Example JWT Value**: <br> `"appidacr": "0"` |
55+
| `appidacr` |Application Authentication Context Class Reference |Indicates how the client was authenticated. For a public client, the value is 0. If client ID and client secret are used, the value is 1. If a client certificate was used for authentication, the value is 2. <br><br> **Example JWT Value**: <br> `"appidacr": "0"` |
5656
| `acr` |Authentication Context Class Reference |Indicates how the subject was authenticated, as opposed to the client in the Application Authentication Context Class Reference claim. A value of "0" indicates the end-user authentication did not meet the requirements of ISO/IEC 29115. <br><br> **Example JWT Value**: <br> `"acr": "0"` |
5757
| Authentication Instant |Records the date and time when authentication occurred. <br><br> **Example SAML Value**: <br> `<AuthnStatement AuthnInstant="2011-12-29T05:35:22.000Z">` | |
5858
| `amr` |Authentication Method |Identifies how the subject of the token was authenticated. <br><br> **Example SAML Value**: <br> `<AuthnContextClassRef>`<br>`http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod/password`<br>`</AuthnContextClassRef>` <br><br> **Example JWT Value**: `“amr”: ["pwd"]` |

articles/active-directory/managed-service-identity/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@
1818
items:
1919
- name: Access Azure Data Lake Store
2020
href: tutorial-windows-vm-access-datalake.md
21+
- name: Access Azure Storage
22+
href: tutorial-vm-windows-access-storage.md
2123
- name: Access Azure Storage using an access key
2224
href: tutorial-windows-vm-access-storage.md
2325
- name: Access Azure Storage using SAS
@@ -34,6 +36,8 @@
3436
items:
3537
- name: Access Azure Data Lake Store
3638
href: tutorial-linux-vm-access-datalake.md
39+
- name: Access Azure Storage
40+
href: tutorial-linux-vm-access-storage.md
3741
- name: Access Azure Storage using an access key
3842
href: tutorial-linux-vm-access-storage-access-key.md
3943
- name: Access Azure Storage using SAS

0 commit comments

Comments
 (0)