You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/application-proxy-ping-access-publishing-guide.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Azure Active Directory (Azure AD) Application Proxy has partnered with PingAcces
21
21
22
22
With PingAccess for Azure AD, you can give users access and single sign-on (SSO) to applications that use headers for authentication. Application Proxy treats these applications like any other, using Azure AD to authenticate access and then passing traffic through the connector service. PingAccess sits in front of the applications and translates the access token from Azure AD into a header. The application then receives the authentication in the format it can read.
23
23
24
-
Your users won’t notice anything different when they sign in to use your corporate applications. They can still work from anywhere on any device. The Application Proxy connectors direct remote traffic to all apps without regard to their authentication type, so they’ll still balance loads automatically.
24
+
Your users won't notice anything different when they sign in to use your corporate applications. They can still work from anywhere on any device. The Application Proxy connectors direct remote traffic to all apps without regard to their authentication type, so they'll still balance loads automatically.
25
25
26
26
## How do I get access?
27
27
@@ -31,7 +31,7 @@ For more information, see [Azure Active Directory editions](../fundamentals/what
31
31
32
32
## Publish your application in Azure
33
33
34
-
This article is for people to publish an application with this scenario for the first time. Besides detailing the publishing steps, it guides you in getting started with both Application Proxy and PingAccess. If you’ve already configured both services but want a refresher on the publishing steps, skip to the [Add your application to Azure AD with Application Proxy](#add-your-application-to-azure-ad-with-application-proxy) section.
34
+
This article is for people to publish an application with this scenario for the first time. Besides detailing the publishing steps, it guides you in getting started with both Application Proxy and PingAccess. If you've already configured both services but want a refresher on the publishing steps, skip to the [Add your application to Azure AD with Application Proxy](#add-your-application-to-azure-ad-with-application-proxy) section.
35
35
36
36
> [!NOTE]
37
37
> Since this scenario is a partnership between Azure AD and PingAccess, some of the instructions exist on the Ping Identity site.
@@ -77,7 +77,7 @@ To publish your own on-premises application:
77
77
> [!NOTE]
78
78
> For a more detailed walkthrough of this step, see [Add an on-premises app to Azure AD](../app-proxy/application-proxy-add-on-premises-application.md#add-an-on-premises-app-to-azure-ad).
79
79
80
-
1.**Internal URL**: Normally you provide the URL that takes you to the app’s sign-in page when you’re on the corporate network. For this scenario, the connector needs to treat the PingAccess proxy as the front page of the application. Use this format: `https://<host name of your PingAccess server>:<port>`. The port is 3000 by default, but you can configure it in PingAccess.
80
+
1.**Internal URL**: Normally you provide the URL that takes you to the app's sign-in page when you're on the corporate network. For this scenario, the connector needs to treat the PingAccess proxy as the front page of the application. Use this format: `https://<host name of your PingAccess server>:<port>`. The port is 3000 by default, but you can configure it in PingAccess.
81
81
82
82
> [!WARNING]
83
83
> For this type of single sign-on, the internal URL must use `https` and can't use `http`. Also, there is a constraint when configuring an application that no two apps should have the same internal URL as this allows App Proxy to maintain distinction between applications.
@@ -86,7 +86,7 @@ To publish your own on-premises application:
86
86
1.**Translate URL in Headers**: Choose **No**.
87
87
88
88
> [!NOTE]
89
-
> If this is your first application, use port 3000 to start and come back to update this setting if you change your PingAccess configuration. For subsequent applications, the port will need to match the Listener you’ve configured in PingAccess. Learn more about [listeners in PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_assigning_key_pairs_to_https_listeners).
89
+
> If this is your first application, use port 3000 to start and come back to update this setting if you change your PingAccess configuration. For subsequent applications, the port will need to match the Listener you've configured in PingAccess. Learn more about [listeners in PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_assigning_key_pairs_to_https_listeners).
90
90
91
91
1. Select **Add**. The overview page for the new application appears.
92
92
@@ -121,7 +121,7 @@ In addition to the external URL, an authorize endpoint of Azure Active Directory
121
121
122
122
Finally, set up your on-premises application so that users have read access and other applications have read/write access:
123
123
124
-
1. From the **App registrations** sidebar for your application, select **API permissions** > **Add a permission** > **Microsoft APIs** > **Microsoft Graph**. The **Request API permissions** page for **Microsoft Graph** appears, which contains the APIs for Windows Azure Active Directory.
124
+
1. From the **App registrations** sidebar for your application, select **API permissions** > **Add a permission** > **Microsoft APIs** > **Microsoft Graph**. The **Request API permissions** page for **Microsoft Graph** appears, which contains the permissions for Microsoft Graph.
125
125
126
126

Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-enterprise-integration-as2-message-settings.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: divyaswarnkar
7
7
ms.author: divswa
8
8
ms.reviewer: estfan, azla
9
9
ms.topic: reference
10
-
ms.date: 08/23/2022
10
+
ms.date: 08/15/2023
11
11
---
12
12
13
13
# Reference for AS2 message settings in agreements for Azure Logic Apps
@@ -16,35 +16,34 @@ ms.date: 08/23/2022
16
16
17
17
This reference describes the properties that you can set in an AS2 agreement for specifying how to handle messages between [trading partners](logic-apps-enterprise-integration-partners.md). Set up these properties based on your agreement with the partner that exchanges messages with you.

24
24
25
25
| Property | Required | Description |
26
26
|----------|----------|-------------|
27
27
|**Override message properties**| No | Overrides the properties on incoming messages with your property settings. |
28
-
|**Message should be signed**| No | Specifies whether all incoming messages must be digitally signed. If you require signing, from the **Certificate** list, select an existing guest partner public certificate for validating the signature on the messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
29
-
|**Message should be encrypted**| No | Specifies whether all incoming messages must be encrypted. Non-encrypted messages are rejected. If you require encryption, from the **Certificate** list, select an existing host partner private certificate for decrypting incoming messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
28
+
|**Message should be signed**| No | Specifies whether all incoming messages must be digitally signed. If you require signing, from the **Certificate** list, select an existing guest partner public certificate for validating the signature on the messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
29
+
|**Message should be encrypted**| No | Specifies whether all incoming messages must be encrypted. Non-encrypted messages are rejected. If you require encryption, from the **Certificate** list, select an existing host partner private certificate for decrypting incoming messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
30
30
|**Message should be compressed**| No | Specifies whether all incoming messages must be compressed. Non-compressed messages are rejected. |
31
31
|**Disallow Message ID duplicates**| No | Specifies whether to allow messages with duplicate IDs. If you disallow duplicate IDs, select the number of days between checks. You can also choose whether to suspend duplicates. |
32
32
|**MDN Text**| No | Specifies the default message disposition notification (MDN) that you want sent to the message sender. |
33
-
|**Send MDN**| No | Specifies whether to send synchronous MDNs for received messages. |
33
+
|**Send MDN**| No | Specifies whether to send synchronous MDNs for received messages. |
34
34
|**Send signed MDN**| No | Specifies whether to send signed MDNs for received messages. If you require signing, from the **MIC Algorithm** list, select the algorithm to use for signing messages. |
35
35
|**Send asynchronous MDN**| No | Specifies whether to send MDNs asynchronously. If you select asynchronous MDNs, in the **URL** box, specify the URL for where to send the MDNs. |

43
42
44
43
| Property | Required | Description |
45
44
|----------|----------|-------------|
46
-
|**Enable message signing**| No | Specifies whether all outgoing messages must be digitally signed. If you require signing, select these values: <p>- From the **Signing Algorithm** list, select the algorithm to use for signing messages. <br>- From the **Certificate** list, select an existing host partner private certificate for signing messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
47
-
|**Enable message encryption**| No | Specifies whether all outgoing messages must be encrypted. If you require encryption, select these values: <p>- From the **Encryption Algorithm** list, select the guest partner public certificate algorithm to use for encrypting messages. <br>- From the **Certificate** list, select an existing guest partner public certificate for encrypting outgoing messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
45
+
|**Enable message signing**| No | Specifies whether all outgoing messages must be digitally signed. If you require signing, select these values: <br><br>- From the **Signing Algorithm** list, select the algorithm to use for signing messages. <br>- From the **Certificate** list, select an existing host partner private certificate for signing messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
46
+
|**Enable message encryption**| No | Specifies whether all outgoing messages must be encrypted. If you require encryption, select these values: <br><br>- From the **Encryption Algorithm** list, select the guest partner public certificate algorithm to use for encrypting messages. <br>- From the **Certificate** list, select an existing guest partner public certificate for encrypting outgoing messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
48
47
|**Enable message compression**| No | Specifies whether all outgoing messages must be compressed. |
49
48
|**Unfold HTTP headers**| No | Puts the HTTP `content-type` header onto a single line. |
50
49
|**Transmit file name in MIME header**| No | Specifies whether to include the file name in the MIME header. |
@@ -53,8 +52,7 @@ This reference describes the properties that you can set in an AS2 agreement for
53
52
|**Request asynchronous MDN**| No | Specifies whether to receive MDNs asynchronously. If you select asynchronous MDNs, in the **URL** box, specify the URL for where to send the MDNs. |
54
53
|**Enable NRR**| No | Specifies whether to require non-repudiation receipt (NRR). This communication attribute provides evidence that the data was received as addressed. |
55
54
|**SHA2 Algorithm format**| No | Specifies the MIC algorithm format to use for signing in the headers for the outgoing AS2 messages or MDN |
0 commit comments