You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/trend-micro-tutorial.md
+31-31Lines changed: 31 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ You'll complete these basic steps to configure and test Azure AD SSO with Trend
62
62
63
63
1.[Configure Azure AD SSO](#configure-azure-ad-sso) to enable the feature for your users.
64
64
1.[Create an Azure AD user](#create-an-azure-ad-test-user) to test Azure AD single sign-on.
65
-
1.[Assign the Azure AD test user](#assign-the-azure-ad-test-user)to enable the user for Azure AD single sign-on.
65
+
1.[Grant the Azure AD test user](#grant-the-azure-ad-test-user-access-to-trend-micro-web-security) access to Trend Micro Web Security.
66
66
1.[Configure user and group synchronization settings in Azure AD](#configure-user-and-group-synchronization-settings-in-azure-ad).
67
67
1.[Configure Trend Micro Web Security SSO](#configure-trend-micro-web-security-sso) on the application side.
68
68
1.[Test SSO](#test-sso) to verify the configuration.
@@ -71,7 +71,7 @@ You'll complete these basic steps to configure and test Azure AD SSO with Trend
71
71
72
72
Complete these steps to enable Azure AD SSO in the Azure portal.
73
73
74
-
1. In the [Azure portal](https://portal.azure.com/), on the **Trend Micro Web Security (TMWS)** application integration page, find the **Manage** section and select **single sign-on**.
74
+
1. In the [Azure portal](https://portal.azure.com/), on the **Trend Micro Web Security (TMWS)** application integration page, in the **Manage** section, select **single sign-on**.
75
75
1. On the **Select a single sign-on method** page, select **SAML**.
76
76
1. On the **Set up Single Sign-On with SAML** page, select the pen button for **Basic SAML Configuration** to edit the settings:
77
77
@@ -111,62 +111,62 @@ Complete these steps to enable Azure AD SSO in the Azure portal.
111
111
112
112
### Create an Azure AD test user
113
113
114
-
In this section, you'll create a test user in the Azure portal called B.Simon.
114
+
In this section, you'll create a test user called B.Simon in the Azure portal.
115
115
116
-
1.From the left pane in the Azure portal, select **Azure Active Directory**, select**Users**, and then select **All users**.
116
+
1.In the left pane in the Azure portal, select **Azure Active Directory**. Select**Users**, and then select **All users**.
117
117
1. Select **New user** at the top of the screen.
118
118
1. In the **User** properties, follow these steps:
119
-
1. In the **Name**field, enter `B.Simon`.
120
-
1. In the **User name**field, enter the username@companydomain.extension. For example, `[email protected]`.
121
-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
122
-
1.Click**Create**.
119
+
1. In the **Name**box, enter `B.Simon`.
120
+
1. In the **User name**box, enter **\<username>@\<companydomain>.\<extension>**. For example, `[email protected]`.
121
+
1. Select **Show password**, and then write down the value that's displayed in the **Password** box.
122
+
1.Select**Create**.
123
123
124
-
### Assign the Azure AD test user
124
+
### Grant the Azure AD test user access to Trend Micro Web Security
125
125
126
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Trend Micro Web Security(TMWS).
126
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Trend Micro Web Security.
127
127
128
-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
129
-
1. In the applications list, select **Trend Micro Web Security(TMWS)**.
130
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
128
+
1. In the Azure portal, select **Enterprise applications**, and then select **All applications**.
129
+
1. In the applications list, select **Trend Micro Web Security(TMWS)**.
130
+
1. In the app's overview page, in the **Manage** section, select **Users and groups**:
131
131
132
-

132
+

133
133
134
-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
134
+
1. Select **Add user**, and then select **Users and groups** in the **Add Assignment** dialog box:
135
135
136
-

136
+

137
137
138
-
1. In the **Users and groups** dialog, select **B.Simon**from the Users list, then click the **Select** button at the bottom of the screen.
139
-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140
-
1. In the **Add Assignment** dialog, click the **Assign** button.
138
+
1. In the **Users and groups** dialog box, select **B.Simon**in the Users list, and then click the **Select** button at the bottom of the screen.
139
+
1. If you expect a role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140
+
1. In the **Add Assignment** dialog box, select **Assign**.
141
141
142
142
### Configure user and group synchronization settings in Azure AD
143
143
144
-
1.From the left navigation, click**Azure Active Directory**.
144
+
1.In the left pane, select**Azure Active Directory**.
145
145
146
-
1. Under **Manage**, click**App registrations** and then click your new enterprise application under the **All applications** area.
146
+
1. Under **Manage**, select**App registrations**, and then select your new enterprise application under **All applications**.
147
147
148
-
1. Under **Manage**, click**Certificates & secrets**.
148
+
1. Under **Manage**, select**Certificates & secrets**.
149
149
150
-
1.Under the Client secrets area that appears, click**New client secret**.
150
+
1.In the **Client secrets** area, select**New client secret**.
151
151
152
-
1. On the Add a client secret screen that appears, optionally add a description and select an expiration period for this client secret, and then click**Add**. The newly added client secret appears under the Client secrets area.
152
+
1. On the **Add a client secret screen**, optionally add a description and select an expiration period for the client secret, and then select**Add**. The new client secret appears in the **Client secrets** area.
153
153
154
-
1. Record the value. Later, you will type the information into TMWS.
154
+
1. Record the client secret value. Later, you'll enter it into Trend Micro Web Security.
155
155
156
-
1. Under **Manage**, click**API permissions**.
156
+
1. Under **Manage**, select**API permissions**.
157
157
158
-
1.On the API permissions screen that appears, click**Add a permission**.
158
+
1.In the **API permissions** window, select**Add a permission**.
159
159
160
-
1. On the Microsoft APIs tab of the Request API permissions screen that appears, click**Microsoft Graph** and then **Application permissions**.
160
+
1. On the **Microsoft APIs** tab of the **Request API permissions** window, select**Microsoft Graph** and then **Application permissions**.
161
161
162
-
1. Locate and add the following permissions:
162
+
1. Locate and add these permissions:
163
163
164
164
* Group.Read.All
165
165
* User.Read.All
166
166
167
-
1.Click**Add permissions**. A message appears to confirm that your settings were saved successfully. The newly added permissions appear on the API permissions screen.
167
+
1.Select**Add permissions**. A message appears to confirm that your settings were saved. The new permissions appear in the **API permissions** window.
168
168
169
-
1.Under the Grant consent area, click**Grant admin consent for < your administrator account> (Default Directory)** and then **Yes**. A message appears to confirm that the admin consent for the requested permissions was successfully granted.
169
+
1.In the **Grant consent** area, select**Grant admin consent for \<your administrator account> (Default Directory)** and then **Yes**. A message appears to confirm that the admin consent for the requested permissions was successfully granted.
0 commit comments