Skip to content

Commit b21d17e

Browse files
authored
Merge pull request #237149 from MicrosoftDocs/main
5/05 PM Publish
2 parents 6470b78 + 4cd5261 commit b21d17e

File tree

123 files changed

+2123
-956
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

123 files changed

+2123
-956
lines changed

articles/active-directory/fundamentals/8-secure-access-sensitivity-labels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ As you plan the governance of external access to your content, consider content,
6363

6464
To define High, Medium, or Low Business Impact (HBI, MBI, LBI) for data, sites, and groups, consider the effect on your organization if the wrong content types are shared.
6565

66-
* Credit card, passport, national-ID numbers
66+
* Credit card, passport, national/regional ID numbers
6767
* [Apply a sensitivity label to content automatically](/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide&preserve-view=true)
6868
* Content created by corporate officers: compliance, finance, executive, etc.
6969
* Strategic or financial data in libraries or sites.
Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,121 @@
1+
---
2+
title: Azure Active Directory SSO integration with Cisco Unity Connection
3+
description: Learn how to configure single sign-on between Azure Active Directory and Cisco Unity Connection.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 05/05/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with Cisco Unity Connection
18+
19+
In this article, you learn how to integrate Cisco Unity Connection with Azure Active Directory (Azure AD). Cisco Unity Connection is a robust unified messaging and voicemail solution that provides users with flexible message access options including support for voice commands, STT transcriptions etc. When you integrate Cisco Unity Connection with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Cisco Unity Connection.
22+
* Enable your users to be automatically signed-in to Cisco Unity Connection with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You configure and test Azure AD single sign-on for Cisco Unity Connection in a test environment. Cisco Unity Connection supports **SP** initiated single sign-on.
26+
27+
## Prerequisites
28+
29+
To integrate Azure Active Directory with Cisco Unity Connection, you need:
30+
31+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34+
* Cisco Unity Connection single sign-on (SSO) enabled subscription.
35+
36+
## Add application and assign a test user
37+
38+
Before you begin the process of configuring single sign-on, you need to add the Cisco Unity Connection application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
39+
40+
### Add Cisco Unity Connection from the Azure AD gallery
41+
42+
Add Cisco Unity Connection from the Azure AD application gallery to configure single sign-on with Cisco Unity Connection. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
43+
44+
### Create and assign Azure AD test user
45+
46+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
47+
48+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
49+
50+
## Configure Azure AD SSO
51+
52+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
53+
54+
1. In the Azure portal, on the **Cisco Unity Connection** application integration page, find the **Manage** section and select **single sign-on**.
55+
1. On the **Select a single sign-on method** page, select **SAML**.
56+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
57+
58+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
59+
60+
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** then perform the following steps:
61+
62+
a. Click **Upload metadata file**.
63+
64+
![Screenshot shows how to upload metadata file.](common/upload-metadata.png "File")
65+
66+
b. Click on **folder logo** to select the metadata file and click **Upload**.
67+
68+
![Screenshot shows to choose and browse metadata file.](common/browse-upload-metadata.png "Folder")
69+
70+
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
71+
72+
d. In the **Sign on URL** textbox, type a URL using the following pattern:
73+
`https://<FQDN_CUC_node>`
74+
75+
> [!Note]
76+
> You will get the **Service Provider metadata file** from the [Cisco Unity Connection support team](mailto:[email protected]). If the **Identifier** and **Reply URL** values do not get auto populated, then fill the values manually according to your requirement.
77+
78+
1. Cisco Unity Connection application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
79+
80+
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Image")
81+
82+
1. In addition to above, Cisco Unity Connection application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
83+
84+
| Name | Source Attribute|
85+
| ---------------| --------- |
86+
| uid | user.onpremisessamaccountname |
87+
88+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
89+
90+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
91+
92+
1. On the **Set up Cisco Unity Connection** section, copy the appropriate URL(s) based on your requirement.
93+
94+
![Screenshot shows how to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
95+
96+
## Configure Cisco Unity Connection SSO
97+
98+
To configure single sign-on on **Cisco Unity Connection** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Cisco Unity Connection support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
99+
100+
### Create Cisco Unity Connection test user
101+
102+
In this section, you create a user called Britta Simon in Cisco Unity Connection. Work with [Cisco Unity Connection support team](mailto:[email protected]) to add the users in the Cisco Unity Connection platform. Users must be created and activated before you use single sign-on.
103+
104+
## Test SSO
105+
106+
In this section, you test your Azure AD single sign-on configuration with following options.
107+
108+
* Click on **Test this application** in Azure portal. This will redirect to Cisco Unity Connection Sign-on URL where you can initiate the login flow.
109+
110+
* Go to Cisco Unity Connection Sign-on URL directly and initiate the login flow from there.
111+
112+
* You can use Microsoft My Apps. When you click the Cisco Unity Connection tile in the My Apps, this will redirect to Cisco Unity Connection Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
113+
114+
## Additional resources
115+
116+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
117+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
118+
119+
## Next steps
120+
121+
Once you configure Cisco Unity Connection you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -468,6 +468,8 @@
468468
href: cisco-intersight-tutorial.md
469469
- name: Cisco Webex
470470
href: cisco-spark-tutorial.md
471+
- name: Cisco Unity Connection
472+
href: cisco-unity-connection-tutorial.md
471473
- name: Cisco Umbrella
472474
href: cisco-umbrella-tutorial.md
473475
- name: Cisco Unified Communications Manager

articles/aks/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -290,6 +290,7 @@
290290
href: use-tags.md
291291
- name: Use labels
292292
href: use-labels.md
293+
- name: Enforce best practices with Guardrails
293294
- name: Security and authentication
294295
items:
295296
- name: Overview of Defender for Containers

articles/aks/custom-node-configuration.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Customizing your node configuration allows you to adjust operating system (OS) s
2020

2121
Before you begin, make sure you have an Azure account with an active subscription. If you don't have one, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). You also need to register the feature flag using the following steps:
2222

23+
2324
1. Install the aks-preview extension using the [`az extension add`][az-extension-add] command.
2425

2526
```azurecli
@@ -192,7 +193,7 @@ Kubelet custom configuration is supported for Linux and Windows node pools. Supp
192193
| `imageGcLowThreshold` | 0-100, no higher than `imageGcHighThreshold` | 80 | The percent of disk usage before which image garbage collection is never run. Minimum disk usage that **can** trigger garbage collection. |
193194
| `topologyManagerPolicy` | none, best-effort, restricted, single-numa-node | none | Optimize NUMA node alignment, see more [here](https://kubernetes.io/docs/tasks/administer-cluster/topology-manager/). |
194195
| `allowedUnsafeSysctls` | `kernel.shm*`, `kernel.msg*`, `kernel.sem`, `fs.mqueue.*`, `net.*` | None | Allowed list of unsafe sysctls or unsafe sysctl patterns. |
195-
| `containerLogMaxSizeMB` | Size in megabytes (MB) | 10 | The maximum size (for example, 10 MB) of a container log file before it's rotated. |
196+
| `containerLogMaxSizeMB` | Size in megabytes (MB) | 50 | The maximum size (for example, 10 MB) of a container log file before it's rotated. |
196197
| `containerLogMaxFiles` | ≥ 2 | 5 | The maximum number of container log files that can be present for a container. |
197198
| `podMaxPids` | -1 to kernel PID limit | -1 (∞)| The maximum amount of process IDs that can be running in a Pod |
198199

@@ -234,7 +235,7 @@ For agent nodes, which are expected to handle very large numbers of concurrent s
234235
| `net.ipv4.tcp_fin_timeout` | 5 - 120 | 60 | The length of time an orphaned (no longer referenced by any application) connection will remain in the FIN_WAIT_2 state before it's aborted at the local end. |
235236
| `net.ipv4.tcp_keepalive_time` | 30 - 432000 | 7200 | How often TCP sends out `keepalive` messages when `keepalive` is enabled. |
236237
| `net.ipv4.tcp_keepalive_probes` | 1 - 15 | 9 | How many `keepalive` probes TCP sends out, until it decides that the connection is broken. |
237-
| `net.ipv4.tcp_keepalive_intvl` | 1 - 75 | 75 | How frequently the probes are sent out. Multiplied by `tcp_keepalive_probes` it makes up the time to kill a connection that isn't responding, after probes started. |
238+
| `net.ipv4.tcp_keepalive_intvl` | 10 - 75 | 75 | How frequently the probes are sent out. Multiplied by `tcp_keepalive_probes` it makes up the time to kill a connection that isn't responding, after probes started. |
238239
| `net.ipv4.tcp_tw_reuse` | 0 or 1 | 0 | Allow to reuse `TIME-WAIT` sockets for new connections when it's safe from protocol viewpoint. |
239240
| `net.ipv4.ip_local_port_range` | First: 1024 - 60999 and Last: 32768 - 65000] | First: 32768 and Last: 60999 | The local port range that is used by TCP and UDP traffic to choose the local port. Comprised of two numbers: The first number is the first local port allowed for TCP and UDP traffic on the agent node, the second is the last local port number. |
240241
| `net.ipv4.neigh.default.gc_thresh1`| 128 - 80000 | 4096 | Minimum number of entries that may be in the ARP cache. Garbage collection won't be triggered if the number of entries is below this setting. |

0 commit comments

Comments
 (0)