Skip to content

Commit 9fa5009

Browse files
committed
trend-micro-tutorial
1 parent 797f7de commit 9fa5009

File tree

1 file changed

+31
-31
lines changed

1 file changed

+31
-31
lines changed

articles/active-directory/saas-apps/trend-micro-tutorial.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ You'll complete these basic steps to configure and test Azure AD SSO with Trend
6262

6363
1. [Configure Azure AD SSO](#configure-azure-ad-sso) to enable the feature for your users.
6464
1. [Create an Azure AD user](#create-an-azure-ad-test-user) to test Azure AD single sign-on.
65-
1. [Assign the Azure AD test user](#assign-the-azure-ad-test-user) to enable the user for Azure AD single sign-on.
65+
1. [Grant the Azure AD test user](#grant-the-azure-ad-test-user-access-to-trend-micro-web-security) access to Trend Micro Web Security.
6666
1. [Configure user and group synchronization settings in Azure AD](#configure-user-and-group-synchronization-settings-in-azure-ad).
6767
1. [Configure Trend Micro Web Security SSO](#configure-trend-micro-web-security-sso) on the application side.
6868
1. [Test SSO](#test-sso) to verify the configuration.
@@ -71,7 +71,7 @@ You'll complete these basic steps to configure and test Azure AD SSO with Trend
7171

7272
Complete these steps to enable Azure AD SSO in the Azure portal.
7373

74-
1. In the [Azure portal](https://portal.azure.com/), on the **Trend Micro Web Security (TMWS)** application integration page, find the **Manage** section and select **single sign-on**.
74+
1. In the [Azure portal](https://portal.azure.com/), on the **Trend Micro Web Security (TMWS)** application integration page, in the **Manage** section, select **single sign-on**.
7575
1. On the **Select a single sign-on method** page, select **SAML**.
7676
1. On the **Set up Single Sign-On with SAML** page, select the pen button for **Basic SAML Configuration** to edit the settings:
7777

@@ -111,62 +111,62 @@ Complete these steps to enable Azure AD SSO in the Azure portal.
111111

112112
### Create an Azure AD test user
113113

114-
In this section, you'll create a test user in the Azure portal called B.Simon.
114+
In this section, you'll create a test user called B.Simon in the Azure portal.
115115

116-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
116+
1. In the left pane in the Azure portal, select **Azure Active Directory**. Select **Users**, and then select **All users**.
117117
1. Select **New user** at the top of the screen.
118118
1. In the **User** properties, follow these steps:
119-
1. In the **Name** field, enter `B.Simon`.
120-
1. In the **User name** field, enter the username@companydomain.extension. For example, `[email protected]`.
121-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
122-
1. Click **Create**.
119+
1. In the **Name** box, enter `B.Simon`.
120+
1. In the **User name** box, enter **\<username>@\<companydomain>.\<extension>**. For example, `[email protected]`.
121+
1. Select **Show password**, and then write down the value that's displayed in the **Password** box.
122+
1. Select **Create**.
123123

124-
### Assign the Azure AD test user
124+
### Grant the Azure AD test user access to Trend Micro Web Security
125125

126-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Trend Micro Web Security(TMWS).
126+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Trend Micro Web Security.
127127

128-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
129-
1. In the applications list, select **Trend Micro Web Security(TMWS)**.
130-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
128+
1. In the Azure portal, select **Enterprise applications**, and then select **All applications**.
129+
1. In the applications list, select **Trend Micro Web Security (TMWS)**.
130+
1. In the app's overview page, in the **Manage** section, select **Users and groups**:
131131

132-
![The "Users and groups" link](common/users-groups-blade.png)
132+
![Select Users and groups](common/users-groups-blade.png)
133133

134-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
134+
1. Select **Add user**, and then select **Users and groups** in the **Add Assignment** dialog box:
135135

136-
![The Add User link](common/add-assign-user.png)
136+
![Select Add user](common/add-assign-user.png)
137137

138-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
139-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140-
1. In the **Add Assignment** dialog, click the **Assign** button.
138+
1. In the **Users and groups** dialog box, select **B.Simon** in the Users list, and then click the **Select** button at the bottom of the screen.
139+
1. If you expect a role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140+
1. In the **Add Assignment** dialog box, select **Assign**.
141141

142142
### Configure user and group synchronization settings in Azure AD
143143

144-
1. From the left navigation, click **Azure Active Directory**.
144+
1. In the left pane, select **Azure Active Directory**.
145145

146-
1. Under **Manage**, click **App registrations** and then click your new enterprise application under the **All applications** area.
146+
1. Under **Manage**, select **App registrations**, and then select your new enterprise application under **All applications**.
147147

148-
1. Under **Manage**, click **Certificates & secrets**.
148+
1. Under **Manage**, select **Certificates & secrets**.
149149

150-
1. Under the Client secrets area that appears, click **New client secret**.
150+
1. In the **Client secrets** area, select **New client secret**.
151151

152-
1. On the Add a client secret screen that appears, optionally add a description and select an expiration period for this client secret, and then click **Add**. The newly added client secret appears under the Client secrets area.
152+
1. On the **Add a client secret screen**, optionally add a description and select an expiration period for the client secret, and then select **Add**. The new client secret appears in the **Client secrets** area.
153153

154-
1. Record the value. Later, you will type the information into TMWS.
154+
1. Record the client secret value. Later, you'll enter it into Trend Micro Web Security.
155155

156-
1. Under **Manage**, click **API permissions**.
156+
1. Under **Manage**, select **API permissions**.
157157

158-
1. On the API permissions screen that appears, click **Add a permission**.
158+
1. In the **API permissions** window, select **Add a permission**.
159159

160-
1. On the Microsoft APIs tab of the Request API permissions screen that appears, click **Microsoft Graph** and then **Application permissions**.
160+
1. On the **Microsoft APIs** tab of the **Request API permissions** window, select **Microsoft Graph** and then **Application permissions**.
161161

162-
1. Locate and add the following permissions:
162+
1. Locate and add these permissions:
163163

164164
* Group.Read.All
165165
* User.Read.All
166166

167-
1. Click **Add permissions**. A message appears to confirm that your settings were saved successfully. The newly added permissions appear on the API permissions screen.
167+
1. Select **Add permissions**. A message appears to confirm that your settings were saved. The new permissions appear in the **API permissions** window.
168168

169-
1. Under the Grant consent area, click **Grant admin consent for < your administrator account > (Default Directory)** and then **Yes**. A message appears to confirm that the admin consent for the requested permissions was successfully granted.
169+
1. In the **Grant consent** area, select **Grant admin consent for \<your administrator account> (Default Directory)** and then **Yes**. A message appears to confirm that the admin consent for the requested permissions was successfully granted.
170170

171171
1. Click **Overview**.
172172

0 commit comments

Comments
 (0)