You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/10000ftplans-tutorial.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 10,000ft Plans with Azure Active
18
18
19
19
* Control in Azure AD who has access to 10,000ft Plans.
20
20
* Enable your users to be automatically signed-in to 10,000ft Plans with their Azure AD accounts.
21
-
* Manage your accounts in one central location - the Azure portal.
21
+
* Manage your accounts in one central location.
22
22
23
23
## Prerequisites
24
24
@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 10,000ft Plans, perform the following st
60
60
61
61
## Configure Azure AD SSO
62
62
63
-
Follow these steps to enable Azure AD SSO in the Azure portal.
63
+
Follow these steps to enable Azure AD SSO.
64
64
65
65
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -86,7 +86,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
86
86
87
87
### Create an Azure AD test user
88
88
89
-
In this section, you'll create a test user in the Azure portal called B.Simon.
89
+
In this section, you'll create a test user called B.Simon.
90
90
91
91
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
92
92
1. Browse to **Identity** > **Users** > **All users**.
@@ -100,7 +100,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
100
100
101
101
### Assign the Azure AD test user
102
102
103
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 10,000ft Plans.
103
+
In this section, you'll enable B.Simon to use single sign-on by granting access to 10,000ft Plans.
104
104
105
105
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/123formbuilder-tutorial.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn how to integrate 123FormBuilder SSO with Azure Ac
19
19
20
20
* Control in Azure AD who has access to 123FormBuilder SSO.
21
21
* Enable your users to be automatically signed in to 123FormBuilder SSO with their Azure AD accounts.
22
-
* Manage your accounts in one central location - the Azure portal.
22
+
* Manage your accounts in one central location.
23
23
24
24
## Prerequisites
25
25
@@ -61,7 +61,7 @@ To configure and test Azure AD SSO with 123FormBuilder SSO, perform the followin
61
61
62
62
## Configure Azure AD SSO
63
63
64
-
Follow these steps to enable Azure AD SSO in the Azure portal.
64
+
Follow these steps to enable Azure AD SSO.
65
65
66
66
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -94,7 +94,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
94
94
95
95
### Create an Azure AD test user
96
96
97
-
In this section, you'll create a test user in the Azure portal called B.Simon.
97
+
In this section, you'll create a test user called B.Simon.
98
98
99
99
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100
100
1. Browse to **Identity** > **Users** > **All users**.
@@ -108,7 +108,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
108
108
109
109
### Assign the Azure AD test user
110
110
111
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 123FormBuilder SSO.
111
+
In this section, you'll enable B.Simon to use single sign-on by granting access to 123FormBuilder SSO.
112
112
113
113
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -126,19 +126,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126
126
127
127
a. In the **Email** textbox, type the email of the user like `[email protected]`.
128
128
129
-
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded from Azure portal.
129
+
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded previously.
130
130
131
131
c. Click **SUBMIT FORM**.
132
132
133
133
2. On the **Microsoft Azure AD - Single sign-on - Configure App Settings** perform the following steps:
134
134
135
135

136
136
137
-
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section on Azure portal.
137
+
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section.
138
138
139
-
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section on Azure portal.
139
+
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section.
140
140
141
-
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section on Azure portal.
141
+
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section.
142
142
143
143
### Create 123FormBuilder SSO test user
144
144
@@ -150,13 +150,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
150
150
151
151
#### SP initiated:
152
152
153
-
* Click on **Test this application** in Azure portal. This will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
153
+
* Click on **Test this application**, this will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
154
154
155
155
* Go to 123FormBuilder SSO Sign-on URL directly and initiate the login flow from there.
156
156
157
157
#### IDP initiated:
158
158
159
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
159
+
* Click on **Test this application**, and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
160
160
161
161
You can also use Microsoft My Apps to test the application in any mode. When you click the 123FormBuilder SSO tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/15five-provisioning-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ Before configuring 15Five for automatic user provisioning with Azure AD, you wil
58
58
59
59
:::image type="content" source="media/15five-provisioning-tutorial/image02.png" alt-text="Screenshot of the S C I M integration page in the 15Five admin console. Generate OAuth token is highlighted." border="false":::
60
60
61
-
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application in the Azure portal.
61
+
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application.
62
62
63
63
:::image type="content" source="media/15five-provisioning-tutorial/image03.png" alt-text="Screen shot of the S C I M integration page. In the Token table, the values next to S C I M 2.0 base U R L and Access token are highlighted." border="false":::
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/15five-tutorial.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 15Five with Azure Active Directo
18
18
19
19
* Control in Azure AD who has access to 15Five.
20
20
* Enable your users to be automatically signed-in to 15Five with their Azure AD accounts.
21
-
* Manage your accounts in one central location - the Azure portal.
21
+
* Manage your accounts in one central location.
22
22
23
23
## Prerequisites
24
24
@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 15Five, perform the following steps:
60
60
61
61
## Configure Azure AD SSO
62
62
63
-
Follow these steps to enable Azure AD SSO in the Azure portal.
63
+
Follow these steps to enable Azure AD SSO.
64
64
65
65
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81
+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
82
82
83
83
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
84
84
@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
90
90
91
91
### Create an Azure AD test user
92
92
93
-
In this section, you'll create a test user in the Azure portal called B.Simon.
93
+
In this section, you'll create a test user called B.Simon.
94
94
95
95
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
96
96
1. Browse to **Identity** > **Users** > **All users**.
@@ -104,7 +104,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
104
104
105
105
### Assign the Azure AD test user
106
106
107
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 15Five.
107
+
In this section, you'll enable B.Simon to use single sign-on by granting access to 15Five.
108
108
109
109
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -116,7 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116
116
117
117
## Configure 15Five SSO
118
118
119
-
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
119
+
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
120
120
121
121
### Create 15Five test user
122
122
@@ -149,7 +149,7 @@ To enable Azure AD users to log in to 15Five, they must be provisioned into 15Fi
149
149
150
150
In this section, you test your Azure AD single sign-on configuration with following options.
151
151
152
-
* Click on **Test this application** in Azure portal. This will redirect to 15Five Sign-on URL where you can initiate the login flow.
152
+
* Click on **Test this application**, this will redirect to 15Five Sign-on URL where you can initiate the login flow.
153
153
154
154
* Go to 15Five Sign-on URL directly and initiate the login flow from there.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/23video-tutorial.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn how to integrate 23 Video with Azure Active Direc
19
19
20
20
* Control in Azure AD who has access to 23 Video.
21
21
* Enable your users to be automatically signed-in to 23 Video with their Azure AD accounts.
22
-
* Manage your accounts in one central location - the Azure portal.
22
+
* Manage your accounts in one central location.
23
23
24
24
## Prerequisites
25
25
@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 23 Video, perform the following steps:
60
60
61
61
## Configure Azure AD SSO
62
62
63
-
Follow these steps to enable Azure AD SSO in the Azure portal.
63
+
Follow these steps to enable Azure AD SSO.
64
64
65
65
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
66
66
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **23 Video** application integration page, find the **Manage** section and select **Single sign-on**.
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
78
78
`https://<subdomain>.23video.com`
79
79
80
80
> [!NOTE]
81
-
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [23 Video Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81
+
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [23 Video Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
82
82
83
83
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
84
84
@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
90
90
91
91
### Create an Azure AD test user
92
92
93
-
In this section, you'll create a test user in the Azure portal called B.Simon.
93
+
In this section, you'll create a test user called B.Simon.
94
94
95
95
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
96
96
1. Browse to **Identity** > **Users** > **All users**.
@@ -104,7 +104,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
104
104
105
105
### Assign the Azure AD test user
106
106
107
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 23 Video.
107
+
In this section, you'll enable B.Simon to use single sign-on by granting access to 23 Video.
108
108
109
109
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -116,7 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116
116
117
117
## Configure 23 Video SSO
118
118
119
-
To configure single sign-on on **23 Video** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [23 Video support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119
+
To configure single sign-on on **23 Video** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from the application configuration to [23 Video support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
120
120
121
121
### Create 23 Video test user
122
122
@@ -148,7 +148,7 @@ The objective of this section is to create a user called B.Simon in 23 Video.
148
148
149
149
In this section, you test your Azure AD single sign-on configuration with following options.
150
150
151
-
* Click on **Test this application** in Azure portal. This will redirect to 23 Video Sign-on URL where you can initiate the login flow.
151
+
* Click on **Test this application**, this will redirect to 23 Video Sign-on URL where you can initiate the login flow.
152
152
153
153
* Go to 23 Video Sign-on URL directly and initiate the login flow from there.
0 commit comments