Skip to content

Commit a9f131f

Browse files
authored
Merge pull request #159421 from MicrosoftDocs/master
5/19 AM Publish
2 parents 17345cc + cfda572 commit a9f131f

File tree

132 files changed

+1675
-566
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

132 files changed

+1675
-566
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33718,6 +33718,11 @@
3371833718
"redirect_url": "/azure/service-bus-messaging/security-baseline",
3371933719
"redirect_document_id": false
3372033720
},
33721+
{
33722+
"source_path_from_root": "/articles/service-bus-messaging/service-bus-metrics-azure-monitor.md",
33723+
"redirect_url": "/azure/service-bus-messaging/monitor-service-bus-reference",
33724+
"redirect_document_id": false
33725+
},
3372133726
{
3372233727
"source_path_from_root": "/articles/service-bus-messaging/service-bus-migrate-acs-sas.md",
3372333728
"redirect_url": "/azure/service-bus-messaging/service-bus-sas",

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,8 @@
153153
href: v2-permissions-and-consent.md
154154
- name: Conditional access
155155
href: v2-conditional-access-dev-guide.md
156+
- name: Authentication context
157+
href: developer-guide-conditional-access-authentication-context.md
156158
- name: Automatic user provisioning (SCIM)
157159
href: ../app-provisioning/user-provisioning.md?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
158160
- name: How-to

articles/active-directory/develop/developer-guide-conditional-access-authentication-context.md

Lines changed: 240 additions & 0 deletions
Large diffs are not rendered by default.
Loading
Loading

articles/active-directory/saas-apps/displayr-tutorial.md

Lines changed: 10 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ To learn more about SaaS app integration with Azure AD, see [What is application
2828
To get started, you need the following items:
2929

3030
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
31-
* Displayr single sign-on (SSO) enabled subscription.
31+
* Displayr single sign-on (SSO) enabled company.
3232

3333
## Scenario description
3434

35-
In this tutorial, you configure and test Azure AD SSO in a test environment. Displayr supports **SP** initiated SSO.
35+
In this tutorial, you will learn to configure Azure AD SSO in your Displayr company. Displayr supports **SP** initiated SSO.
3636

3737
## Adding Displayr from the gallery
3838

@@ -45,17 +45,13 @@ To configure the integration of Displayr into Azure AD, you need to add Displayr
4545
1. In the **Add from the gallery** section, type **Displayr** in the search box.
4646
1. Select **Displayr** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4747

48-
## Configure and test Azure AD single sign-on
48+
## Configure Azure AD single sign-on
4949

50-
Configure and test Azure AD SSO with Displayr using a test user called **Britta Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Displayr.
51-
52-
To configure and test Azure AD SSO with Displayr, complete the following building blocks:
50+
To configure Azure AD SSO with Displayr, complete the following building blocks:
5351

5452
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
5553
2. **[Configure Displayr](#configure-displayr)** to configure the SSO settings on application side.
56-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
57-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
58-
5. **[Create Displayr test user](#create-displayr-test-user)** to have a counterpart of Britta Simon in Displayr that is linked to the Azure AD representation of user.
54+
4. **[Restrict access to specific users](#restrict-access-to-specific-users)** to restrict which of your Azure AD users can sign in to Displayr.
5955
6. **[Test SSO](#test-sso)** to verify whether the configuration works.
6056

6157
### Configure Azure AD SSO
@@ -100,10 +96,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
10096

10197
c. Select **Source Attribute** of **Group ID**.
10298

103-
d. Check **Customize the name of the group claim**.
104-
105-
e. Check **Emit groups as role claims**.
106-
10799
f. Click **Save**.
108100

109101
1. On the **Set-up Displayr** section, copy the appropriate URL(s) based on your requirement.
@@ -122,11 +114,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
122114

123115
3. If you want to set up Displayr manually, open a new web browser window and sign into your Displayr company site as an administrator and perform the following steps:
124116

125-
4. Click on **Settings** then navigate to **Account**.
117+
4. Click on the **User** icon, then navigate to **Account settings**.
126118

127119
![Screenshot that shows the "Settings" icon and "Account" selected.](./media/displayr-tutorial/config01.png)
128120

129-
5. Switch to **Settings** from the top menu and scroll down the page for clicking **Configure Single Sign On (SAML)**.
121+
5. Switch to **Settings** from the top menu and scroll down the page to click on **Configure Single Sign On (SAML)**.
130122

131123
![Screenshot that shows the "Settings" tab selected and the "Configure Single Sign On (S A M L)" action selected.](./media/displayr-tutorial/config02.png)
132124

@@ -148,67 +140,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
148140

149141
g. Click **Save**.
150142

151-
### Create an Azure AD test user
152-
153-
In this section, you'll create a test user in the Azure portal called Britta Simon.
154-
155-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
156-
1. Select **New user** at the top of the screen.
157-
1. In the **User** properties, follow these steps:
158-
1. In the **Name** field, enter `Britta Simon`.
159-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
160-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
161-
1. Click **Create**.
162-
163-
### Assign the Azure AD test user
164-
165-
In this section, you'll enable Britta Simon to use Azure single sign-on by granting access to Displayr.
166-
167-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
168-
1. In the applications list, select **Displayr**.
169-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
170-
171-
![The "Users and groups" link](common/users-groups-blade.png)
172-
173-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
174-
175-
![The Add User link](common/add-assign-user.png)
176-
177-
1. In the **Users and groups** dialog, select **Britta Simon** from the Users list, then click the **Select** button at the bottom of the screen.
178-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
179-
1. In the **Add Assignment** dialog, click the **Assign** button.
180-
181-
### Create Displayr test user
143+
### Restrict access to specific users
182144

183-
To enable Azure AD users, sign in to Displayr, they must be provisioned into Displayr. In Displayr, provisioning is a manual task.
184-
185-
**To provision a user account, perform the following steps:**
186-
187-
1. Sign in to Displayr as an Administrator.
188-
189-
2. Click on **Settings** then navigate to **Account**.
190-
191-
![Screenshot that shows the "Settings (cog)" icon with "Account" selected.](./media/displayr-tutorial/config01.png)
192-
193-
3. Switch to **Settings** from the top menu and scroll down the page, until **Users** section then click on **New User**.
194-
195-
![Screenshot that shows the "Settings" tab with "Users" highlighted and the "New User" button selected.](./media/displayr-tutorial/config07.png)
196-
197-
4. On the **New User** page, perform the following steps:
198-
199-
![Displayr Configuration](./media/displayr-tutorial/config06.png)
200-
201-
a. In **Name** text box, enter the name of user like **Brittasimon**.
202-
203-
b. In **Email** text box, enter the email of user like `[email protected]`.
204-
205-
c. Select your appropriate **Group membership**.
206-
207-
d. Click **Save**.
145+
By default, all users in the tenant where you added the Displayr application can log in to Displayr by using SSO. If you want to restrict access to specific users or groups, see [Restrict your Azure AD app to a set of users in an Azure AD tenant](../develop/howto-restrict-your-app-to-a-set-of-users.md).
208146

209147
### Test SSO
210148

211-
When you select the Displayr tile in the Access Panel, you should be automatically signed in to the Displayr for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](../user-help/my-apps-portal-end-user-access.md).
149+
When you select the Displayr tile in the Access Panel, you should be automatically signed in to the Displayr company for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](../user-help/my-apps-portal-end-user-access.md).
212150

213151
## Additional Resources
214152

-2.54 KB
Loading
Binary file not shown.
-6.75 KB
Loading
Binary file not shown.

0 commit comments

Comments
 (0)