Skip to content

Commit acfe957

Browse files
committed
Merge branch 'main' into front-door-logs
2 parents 1ea2c03 + 04a0763 commit acfe957

File tree

67 files changed

+796
-972
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+796
-972
lines changed

articles/active-directory-b2c/page-layout.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,35 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5959

6060
## Self-asserted page (selfasserted)
6161

62+
**2.1.20**
63+
- Fixed an XSS issue on input from textbox
64+
65+
**2.1.19**
66+
- Fixed accessibility bugs
67+
- Handle Undefined Error message for existing user sign up
68+
- Move Password Mismatch Error to Inline instead of Page Level
69+
- Accessibility changes related to High Contrast button display and anchor focus improvements
70+
71+
**2.1.18**
72+
- Add asterisk for required fields
73+
- TOTP Store Icons position fixes for Classic Template
74+
- Activate input items only when verification code is verified
75+
- Add Alt Text for Background Image
76+
- Added customization for server errors by TOTP verification
77+
78+
**2.1.17**
79+
- Add descriptive error message and fixed forgotPassword link
80+
- Make checkbox as group
81+
- Enforce Validation Error Update on control change and enable continue on email verified
82+
- Added additional field to error code to validation failure response
83+
84+
**2.1.16**
85+
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86+
- Hide error message on validation succeeds and send code to verify
87+
88+
**2.1.15**
89+
- Fixed QR code generation bug due to QR text length
90+
6291
**2.1.14**
6392
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
6493

@@ -158,6 +187,12 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
158187
> [!TIP]
159188
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
160189
190+
**2.1.9**
191+
- Fix accessibility bugs
192+
- Accessibility changes related to High Contrast button display and anchor focus improvements
193+
194+
**2.1.8**
195+
- Add descriptive error message and fixed forgotPassword link!
161196

162197
**2.1.7**
163198

articles/active-directory/devices/troubleshoot-mac-sso-extension-plugin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ Work with your MDM administrator (or Device Management team) to ensure that the
9393
9494
The following table provides specific MDM installation guidance depending on which OS you're deploying the extension to:
9595

96-
- [**iOS/iPadOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-macos-with-intune)
97-
- [**macOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune)
96+
- [**iOS/iPadOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune)
97+
- [**macOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-macos-with-intune)
9898

9999
> [!IMPORTANT]
100100
> Although, any MDM is supported for deploying the SSO Extension, many organizations implement [**device-based conditional access polices**](../conditional-access/concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant) by way of evaluating MDM compliance policies. If a third-party MDM is being used, ensure that the MDM vendor supports [**Intune Partner Compliance**](/mem/intune/protect/device-compliance-partners) if you would like to use device-based Conditional Access policies. When the SSO Extension is deployed via Intune or an MDM provider that supports Intune Partner Compliance, the extension can pass the device certificate to Azure AD so that device authentication can be completed.

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ If you have already installed Azure AD Connect by using the [express installatio
9999

100100
Follow these instructions to verify that you have enabled Pass-through Authentication correctly:
101101

102-
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with the Hybrid Identity Administratoristrator credentials for your tenant.
102+
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with the Hybrid Identity Administrator credentials for your tenant.
103103
2. Select **Azure Active Directory** in the left pane.
104104
3. Select **Azure AD Connect**.
105105
4. Verify that the **Pass-through authentication** feature appears as **Enabled**.

articles/active-directory/saas-apps/alertops-tutorial.md

Lines changed: 27 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with AlertOps | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with AlertOps'
33
description: Learn how to configure single sign-on between Azure Active Directory and AlertOps.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 02/07/2023
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Integrate AlertOps with Azure Active Directory
16+
# Tutorial: Azure AD SSO integration with AlertOps
1717

1818
In this tutorial, you'll learn how to integrate AlertOps with Azure Active Directory (Azure AD). When you integrate AlertOps with Azure AD, you can:
1919

@@ -73,18 +73,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
7474

7575
1. In the **Identifier** text box, type a URL using the following pattern:
76-
`https://<SUBDOMAIN>.alertops.com`
76+
`https://app.alertops.com/<SUBDOMAIN>`
7777

7878
1. In the **Reply URL** text box, type a URL using the following pattern:
79-
`https://<SUBDOMAIN>.alertops.com/login.aspx`
79+
`https://api.alertops.com/api/v2/saml/<SUBDOMAIN>`
8080

81-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
82-
83-
In the **Sign-on URL** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.alertops.com/login.aspx`
81+
1. In the **Logout Url (Optional)** text box, type a URL using the following pattern:
82+
`https://app.alertops.com/<SUBDOMAIN>`
8583

8684
> [!NOTE]
87-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [AlertOps Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85+
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout Url. Contact [AlertOps Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8886

8987
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
9088

@@ -130,33 +128,35 @@ In this section, you'll enable Britta Simon to use Azure single sign-on by grant
130128

131129
3. If you want to setup AlertOps manually, open a new web browser window and sign into your AlertOps company site as an administrator and perform the following steps:
132130

133-
4. Click on the **Account settings** from the left navigation panel.
131+
4. Click on the **Account settings** from the user profile.
134132

135133
![Screenshot shows the AlertOps menu with Account Settings called out.](./media/alertops-tutorial/settings.png)
136134

137-
5. On the **Subscription Settings** page select **SSO** and perform the following steps:
135+
5. On the **Account Settings** page, click **Update SSO** and select **Use single sign-on (SSO)**
138136

139-
![Screenshot shows the Subscription Settings window for S S O with values entered as described in this step.](./media/alertops-tutorial/configuration.png)
137+
![Screenshot shows the Subscription Settings window for update sso as described in this step.](./media/alertops-tutorial/update-sso.png)
140138

141-
a. Select **Use Single Sign-On(SSO)** checkbox.
139+
1. In **SSO** section, perform the following steps:
142140

143-
b. Select **Azure Active Directory** as an **SSO Provider** from the dropdown.
141+
![Screenshot shows the Subscription Settings window for S S O with values entered as described in this step.](./media/alertops-tutorial/configuration.png)
144142

145-
c. In the **Issuer URL** textbox, use the identifier value, which you have used in the **Basic SAML Configuration** section in the Azure portal.
143+
a. In the **Issuer URL** textbox, use the identifier value, which you have used in the **Basic SAML Configuration** section in the Azure portal.
146144

147-
d. In the **SAML endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
145+
b. In the **SAML endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
148146

149-
e. In the **SLO endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
147+
c. In the **SLO endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
150148

151-
f. Select **SHA256** as a **SAML Signature Algorithm** from the dropdown.
149+
d. Select **SHA256** as a **SAML Signature Algorithm** from the dropdown.
152150

153-
g. Open your downloaded Certificate(Base64) file in Notepad. Copy the content of it into your clipboard, and then paste it to the X.509 Certificate text box.
151+
e. Open your downloaded **Certificate(Base64)** file in Notepad. Copy the content of it into your clipboard, and then paste it to the **X.509 Certificate** text box.
152+
153+
f. Enable **Allow username/password login**.
154154

155155
### Create AlertOps test user
156156

157157
1. In a different browser window, sign in to your AlertOps company site as administrator.
158158

159-
2. Click on the **Users** from the left navigation panel.
159+
2. Click on the **Configuration** and then **Users** from navigation panel.
160160

161161
![Screenshot shows the AlertOps menu with Users called out.](./media/alertops-tutorial/user.png)
162162

@@ -168,19 +168,17 @@ In this section, you'll enable Britta Simon to use Azure single sign-on by grant
168168

169169
![Screenshot shows the Add Users pane with values entered as described in this step.](./media/alertops-tutorial/add-values.png)
170170

171-
a. In the **Login User Name** textbox, enter the user name of the user like **Brittasimon**.
172-
173-
b. In the **Official Email** textbox, enter the email address of the user like **Brittasimon\@contoso.com**.
171+
a. In the **User Name** textbox, enter the user name of the user like **Brittasimon**.
174172

175-
c. In the **First Name** textbox, enter the first name of user like **Britta**.
173+
b. In the **First Name** textbox, enter the first name of user like **Britta**.
176174

177-
d. In the **Last Name** textbox, enter the first name of user like **Simon**.
175+
c. In the **Last Name** textbox, enter the first name of user like **Simon**.
178176

179-
e. Select the **Type** value from the dropdown as per your organization.
177+
d. In the **Email** textbox, enter the email address of the user like `[email protected]`.
180178

181-
f. Select the **Role** of the user from the dropdown as per your organization.
179+
f. Select the **User Role** of the user from the dropdown as per your organization.
182180

183-
g. Select **Add**.
181+
g. Select **Submit**.
184182

185183
## Test SSO
186184

4.24 KB
Loading
14.6 KB
Loading
-4 KB
Loading
2.89 KB
Loading
13.8 KB
Loading
20.4 KB
Loading

0 commit comments

Comments
 (0)