You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,11 +126,13 @@ There are two required installers for Azure AD password protection. They're avai
126
126
The result should show a **Status** of "Running."
127
127
128
128
1. Register the proxy.
129
-
* After step 3 is completed, the proxy service is running on the machine. But the service doesn't yet have the necessary credentials to communicate with Azure AD. Registration with Azure AD is required:
129
+
* After step 3 is completed, the proxy service is running on the machine, but does not yet have the necessary credentials to communicate with Azure AD. Registration with Azure AD is required:
130
130
131
131
`Register-AzureADPasswordProtectionProxy`
132
132
133
-
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. After this command succeeds once for a proxy service, additional invocations of it will succeed but are unnecessary.
133
+
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. You must also run this cmdlet using an account with local administrator privileges.
134
+
135
+
After this command succeeds once for a proxy service, additional invocations of it will succeed but are unnecessary.
134
136
135
137
The `Register-AzureADPasswordProtectionProxy` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
136
138
@@ -174,7 +176,9 @@ There are two required installers for Azure AD password protection. They're avai
174
176
> There might be a noticeable delay before completion the first time that this cmdlet is run for a specific Azure tenant. Unless a failure is reported, don't worry about this delay.
175
177
176
178
1. Register the forest.
177
-
* You must initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet. The cmdlet requires global administrator credentials for your Azure tenant. It also requires on-premises Active Directory Enterprise Administrator privileges. This step is run once per forest.
179
+
* You must initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
180
+
181
+
The cmdlet requires global administrator credentials for your Azure tenant. You must also run this cmdlet using an account with local administrator privileges. It also requires on-premises Active Directory Enterprise Administrator privileges. This step is run once per forest.
178
182
179
183
The `Register-AzureADPasswordProtectionForest` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,7 +201,7 @@ require multi-factor authentication as a grant access control.
201
201
## Log in using Azure AD credentials to a Windows VM
202
202
203
203
> [!IMPORTANT]
204
-
> Remote connection to VMs joined to Azure AD is only allowed from Windows 10 PCs that are Azure AD joined or hybrid Azure AD joined to the **same** directory as the VM. Additionally, to RDP using Azure AD credentials, the user must belong to one of the two RBAC roles, Virtual Machine Administrator Login or Virtual Machine User Login.
204
+
> Remote connection to VMs joined to Azure AD is only allowed from Windows 10 PCs that are Azure AD joined or hybrid Azure AD joined to the **same** directory as the VM. Additionally, to RDP using Azure AD credentials, the user must belong to one of the two RBAC roles, Virtual Machine Administrator Login or Virtual Machine User Login. At this time, Azure Bastion cannot be used to login using Azure Active Directory authentication with the AADLoginForWindows extension. Only direct RDP is supported.
205
205
206
206
To login in to your Windows Server 2019 virtual machine using Azure AD:
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/salesforce-tutorial.md
+37-36Lines changed: 37 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,25 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory Single sign-on (SSO) integration with Salesforce | Microsoft Docs'
2
+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Salesforce | Microsoft Docs'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and Salesforce.
4
4
services: active-directory
5
5
documentationCenter: na
6
6
author: jeevansd
7
-
manager: daveba
7
+
manager: mtillman
8
8
ms.reviewer: barbkess
9
9
10
10
ms.assetid: d2d7d420-dc91-41b8-a6b3-59579e043b35
11
11
ms.service: active-directory
12
12
ms.subservice: saas-app-tutorial
13
13
ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
-
ms.devlang: na
16
15
ms.topic: tutorial
17
-
ms.date: 08/13/2019
16
+
ms.date: 12/23/2019
18
17
ms.author: jeedes
19
18
20
19
ms.collection: M365-identity-device-management
21
20
---
22
-
# Tutorial: Azure Active Directory Single sign-on (SSO) integration with Salesforce
21
+
22
+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Salesforce
23
23
24
24
In this tutorial, you'll learn how to integrate Salesforce with Azure Active Directory (Azure AD). When you integrate Salesforce with Azure AD, you can:
25
25
@@ -66,27 +66,23 @@ Configure and test Azure AD SSO with Salesforce using a test user called **B.Sim
66
66
To configure and test Azure AD SSO with Salesforce, complete the following building blocks:
67
67
68
68
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
69
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
70
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
71
-
2.**[Configure Salesforce SSO](#configure-salesforce-sso)** - to configure the Single Sign-On settings on application side.
72
-
1.**[Create Salesforce test user](#create-salesforce-test-user)** - to have a counterpart of B.Simon in Salesforce that is linked to the Azure AD representation of user.
73
-
3.**[Test SSO](#test-sso)** - to verify whether the configuration works.
69
+
***[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
70
+
***[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
71
+
1.**[Configure Salesforce SSO](#configure-salesforce-sso)** - to configure the single sign-on settings on application side.
72
+
***[Create Salesforce test user](#create-salesforce-test-user)** - to have a counterpart of B.Simon in Salesforce that is linked to the Azure AD representation of user.
73
+
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
74
74
75
75
## Configure Azure AD SSO
76
76
77
-
In this section, you enable Azure AD single sign-on in the Azure portal.
78
-
79
-
To configure Azure AD single sign-on with Salesforce, perform the following steps:
80
-
81
77
Follow these steps to enable Azure AD SSO in the Azure portal.
82
78
83
-
1. In the [Azure portal](https://portal.azure.com/), on the **Salesforce** application integration page, find the **Manage** section and select **Single sign-on**.
84
-
1. On the **Select a Single sign-on method** page, select **SAML**.
85
-
1. On the **Set up Single Sign-On with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
79
+
1. In the [Azure portal](https://portal.azure.com/), on the **Salesforce** application integration page, find the **Manage** section and select **single sign-on**.
80
+
1. On the **Select a single sign-on method** page, select **SAML**.
81
+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
1. On the **Basic SAML Configuration** section, perform the following steps:
85
+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
90
86
91
87
a. In the **Sign-on URL** textbox, type the value using the following pattern:
92
88
@@ -103,11 +99,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
103
99
> [!NOTE]
104
100
> These values are not real. Update these values with the actual Sign-on URL and Identifier. Contact [Salesforce Client support team](https://help.salesforce.com/support) to get these values.
105
101
106
-
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML**from the given options as per your requirement and save it on your computer.
102
+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML**and select **Download** to download the certificate and save it on your computer.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
124
120
1. Click **Create**.
125
-
126
-
> [!NOTE]
127
-
> Salesforce user attributes are case sensitive for SAML validation.
128
121
129
122
### Assign the Azure AD test user
130
123
@@ -146,48 +139,56 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
146
139
147
140
## Configure Salesforce SSO
148
141
149
-
1. Open a new tab in your browser and sign in to your Salesforce administrator account.
142
+
1. To automate the configuration within Salesforce, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
1. After adding extension to the browser, click on **Set up Salesforce** will direct you to the Salesforce Single Sign-On application. From there, provide the admin credentials to sign into Salesforce Single Sign-On. The browser extension will automatically configure the application for you and automate steps 3-13.
147
+
148
+

149
+
150
+
1. If you want to setup Salesforce manually, open a new web browser window and sign into your Salesforce company site as an administrator and perform the following steps:
150
151
151
-
2. Click on the **Setup** under **settings icon** on the top right corner of the page.
152
+
1. Click on the **Setup** under **settings icon** on the top right corner of the page.
152
153
153
154

154
155
155
-
3. Scroll down to the **SETTINGS** in the navigation pane, click **Identity** to expand the related section. Then click **Single Sign-On Settings**.
156
+
1. Scroll down to the **SETTINGS** in the navigation pane, click **Identity** to expand the related section. Then click **Single Sign-On Settings**.
156
157
157
158

158
159
159
-
4. On the **Single Sign-On Settings** page, click the **Edit** button.
160
+
1. On the **Single Sign-On Settings** page, click the **Edit** button.
160
161
161
162

162
163
163
164
> [!NOTE]
164
165
> If you are unable to enable Single Sign-On settings for your Salesforce account, you may need to contact [Salesforce Client support team](https://help.salesforce.com/support).
165
166
166
-
5. Select **SAML Enabled**, and then click **Save**.
167
+
1. Select **SAML Enabled**, and then click **Save**.
167
168
168
-

169
+

169
170
170
-
6. To configure your SAML single sign-on settings, click **New from Metadata File**.
171
+
1. To configure your SAML single sign-on settings, click **New from Metadata File**.
171
172
172
173

173
174
174
-
7. Click **Choose File** to upload the metadata XML file which you have downloaded from the Azure portal and click **Create**.
175
+
1. Click **Choose File** to upload the metadata XML file which you have downloaded from the Azure portal and click **Create**.
175
176
176
177

177
178
178
-
8. On the **SAML Single Sign-On Settings** page, fields populate automatically and click save.
179
+
1. On the **SAML Single Sign-On Settings** page, fields populate automatically and click save.
179
180
180
181

181
182
182
-
9. On the left navigation pane in Salesforce, click **Company Settings** to expand the related section, and then click **My Domain**.
183
+
1. On the left navigation pane in Salesforce, click **Company Settings** to expand the related section, and then click **My Domain**.
183
184
184
185

185
186
186
-
10. Scroll down to the **Authentication Configuration** section, and click the **Edit** button.
187
+
1. Scroll down to the **Authentication Configuration** section, and click the **Edit** button.
187
188
188
189

189
190
190
-
11. In the **Authentication Configuration** section, Check the **AzureSSO** as **Authentication Service** of your SAML SSO configuration, and then click **Save**.
191
+
1. In the **Authentication Configuration** section, Check the **AzureSSO** as **Authentication Service** of your SAML SSO configuration, and then click **Save**.
191
192
192
193

193
194
@@ -237,4 +238,4 @@ When you click the Salesforce tile in the Access Panel, you should be automatica
237
238
238
239
-[Configure User Provisioning](salesforce-provisioning-tutorial.md)
239
240
240
-
-[Try Salesforce with Azure AD](https://aad.portal.azure.com)
241
+
-[Try Salesforce with Azure AD](https://aad.portal.azure.com)
0 commit comments