Skip to content

Commit b47f2d9

Browse files
authored
service-overview COMPLETE
Taking all of Stephen's feedback
2 parents 624528f + 844cec9 commit b47f2d9

File tree

83 files changed

+870
-402
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+870
-402
lines changed

articles/active-directory/enterprise-users/directory-overview-user-model.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,23 +21,23 @@ ms.collection: M365-identity-device-management
2121

2222
This article introduces and administrator for Azure Active Directory (Azure AD), part of Microsoft Entra, to the relationship between top [identity management](../fundamentals/active-directory-whatis.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) tasks for users in terms of their groups, licenses, deployed enterprise apps, and administrator roles. As your organization grows, you can use Azure AD groups and administrator roles to:
2323

24-
* Assign licenses to groups instead of to individually
25-
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles
26-
* Assign enterprise app access to groups
24+
* Assign licenses to groups instead of to individual users.
25+
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles.
26+
* Assign enterprise app access to groups.
2727

2828
## Assign users to groups
2929

3030
You can use groups in Azure AD to assign licenses to large numbers of users, or to assign user access to deployed enterprise apps. You can use groups to assign all administrator roles except for Global Administrator in Azure AD, or you can grant access to resources that are external, such as SaaS applications or SharePoint sites.
3131

32-
For additional flexibility and to reduce the work of managing group membership, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
32+
For additional flexibility and to reduce group membership management work, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
3333

3434
## Assign licenses to groups
3535

3636
Assigning or removing licenses from users individually can demand time and attention. If you [assign licenses to groups](../fundamentals/license-users-groups.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) instead, you can make your large-scale license management easier.
3737

38-
In Azure AD, when users join a licensed group, they're automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
38+
Azure AD users who join a licensed group are automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
3939

40-
If there are not enough available licenses, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
40+
If there aren't enough licenses available, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
4141

4242
## Delegate administrator roles
4343

articles/active-directory/saas-apps/infor-cloudsuite-provisioning-tutorial.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,14 @@ Before configuring and enabling automatic user provisioning, you should decide w
6868
5. To generate the bearer token, copy the **User Identifier** and **SCIM Password**. Paste them in notepad++ separated by a colon. Encode the string value by navigating to **Plugins > MIME Tools > Basic64 Encode**.
6969

7070
:::image type="content" source="media/infor-cloudsuite-provisioning-tutorial/token.png" alt-text="Screenshot of a Notepad++ document. In the Plugins menu, MIME tools is highlighted. In the MIME tools menu, Base64 encode is highlighted." border="false":::
71+
72+
To generate the bearer token using PowerShell instead of Notepad++, use the following commands:
73+
```powershell
74+
$Identifier = "<User Identifier>"
75+
$SCIMPassword = "<SCIM Password>"
76+
$bytes = [System.Text.Encoding]::UTF8.GetBytes($($Identifier):$($SCIMPassword))
77+
[Convert]::ToBase64String($bytes)
78+
```
7179

7280
3. Copy the bearer token. This value will be entered in the Secret Token field in the Provisioning tab of your Infor CloudSuite application in the Azure portal.
7381

articles/active-directory/saas-apps/keylight-tutorial.md

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with LockPath Keylight | Microsoft Docs'
3-
description: Learn how to configure single sign-on between Azure Active Directory and LockPath Keylight.
2+
title: 'Tutorial: Azure Active Directory integration with NAVEX IRM (Lockpath/Keylight) | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and NAVEX IRM (Lockpath/Keylight).
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -9,53 +9,53 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/11/2021
12+
ms.date: 09/09/2022
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with LockPath Keylight
15+
# Tutorial: Azure Active Directory integration with NAVEX IRM (Lockpath/Keylight)
1616

17-
In this tutorial, you'll learn how to integrate LockPath Keylight with Azure Active Directory (Azure AD). When you integrate LockPath Keylight with Azure AD, you can:
17+
In this tutorial, you'll learn how to integrate NAVEX IRM (Lockpath/Keylight) with Azure Active Directory (Azure AD). When you integrate NAVEX IRM (Lockpath/Keylight) with Azure AD, you can:
1818

19-
* Control in Azure AD who has access to LockPath Keylight.
20-
* Enable your users to be automatically signed-in to LockPath Keylight with their Azure AD accounts.
19+
* Control in Azure AD who has access to NAVEX IRM (Lockpath/Keylight).
20+
* Enable your users to be automatically signed-in to NAVEX IRM (Lockpath/Keylight) with their Azure AD accounts.
2121
* Manage your accounts in one central location - the Azure portal.
2222

2323
## Prerequisites
2424

25-
To configure Azure AD integration with LockPath Keylight, you need the following items:
25+
To configure Azure AD integration with NAVEX IRM (Lockpath/Keylight), you need the following items:
2626

2727
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
28-
* LockPath Keylight single sign-on enabled subscription.
28+
* NAVEX IRM (Lockpath/Keylight) single sign-on enabled subscription.
2929

3030
## Scenario description
3131

3232
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
3333

34-
* LockPath Keylight supports **SP** initiated SSO.
35-
* LockPath Keylight supports **Just In Time** user provisioning.
34+
* NAVEX IRM (Lockpath/Keylight) supports **SP** initiated SSO.
35+
* NAVEX IRM (Lockpath/Keylight) supports **Just In Time** user provisioning.
3636

37-
## Add LockPath Keylight from the gallery
37+
## Add NAVEX IRM (Lockpath/Keylight) from the gallery
3838

39-
To configure the integration of LockPath Keylight into Azure AD, you need to add LockPath Keylight from the gallery to your list of managed SaaS apps.
39+
To configure the integration of NAVEX IRM (Lockpath/Keylight) into Azure AD, you need to add NAVEX IRM (Lockpath/Keylight) from the gallery to your list of managed SaaS apps.
4040

4141
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4242
1. On the left navigation pane, select the **Azure Active Directory** service.
4343
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4444
1. To add new application, select **New application**.
45-
1. In the **Add from the gallery** section, type **LockPath Keylight** in the search box.
46-
1. Select **LockPath Keylight** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
45+
1. In the **Add from the gallery** section, type **NAVEX IRM (Lockpath/Keylight)** in the search box.
46+
1. Select **NAVEX IRM (Lockpath/Keylight)** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4747

48-
## Configure and test Azure AD SSO for LockPath Keylight
48+
## Configure and test Azure AD SSO for NAVEX IRM (Lockpath/Keylight)
4949

50-
Configure and test Azure AD SSO with LockPath Keylight using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in LockPath Keylight.
50+
Configure and test Azure AD SSO with NAVEX IRM (Lockpath/Keylight) using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in NAVEX IRM (Lockpath/Keylight).
5151

52-
To configure and test Azure AD SSO with LockPath Keylight, perform the following steps:
52+
To configure and test Azure AD SSO with NAVEX IRM (Lockpath/Keylight), perform the following steps:
5353

5454
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5555
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
5656
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
57-
1. **[Configure LockPath Keylight SSO](#configure-lockpath-keylight-sso)** - to configure the single sign-on settings on application side.
58-
1. **[Create LockPath Keylight test user](#create-lockpath-keylight-test-user)** - to have a counterpart of B.Simon in LockPath Keylight that is linked to the Azure AD representation of user.
57+
1. **[Configure NAVEX IRM (Lockpath/Keylight) SSO](#configure-navex-irm-lockpathkeylight-sso)** - to configure the single sign-on settings on application side.
58+
1. **[Create NAVEX IRM (Lockpath/Keylight) test user](#create-navex-irm-lockpathkeylight-test-user)** - to have a counterpart of B.Simon in NAVEX IRM (Lockpath/Keylight) that is linked to the Azure AD representation of user.
5959
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6060

6161
## Configure Azure AD SSO
@@ -64,7 +64,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal.
6464

6565
Follow these steps to enable Azure AD SSO in the Azure portal.
6666

67-
1. In the Azure portal, on the **LockPath Keylight** application integration page, find the **Manage** section and select **single sign-on**.
67+
1. In the Azure portal, on the **NAVEX IRM (Lockpath/Keylight)** application integration page, find the **Manage** section and select **single sign-on**.
6868
1. On the **Select a single sign-on method** page, select **SAML**.
6969
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7070

@@ -81,13 +81,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
`https://<COMPANY_NAME>.keylightgrc.com/`
8282

8383
> [!NOTE]
84-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [LockPath Keylight Client support team](https://www.lockpath.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
84+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [NAVEX IRM (Lockpath/Keylight) Client support team](https://www.lockpath.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8585

8686
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Raw)** from the given options as per your requirement and save it on your computer.
8787

8888
![The Certificate download link](common/certificateraw.png)
8989

90-
6. On the **Set up LockPath Keylight** section, copy the appropriate URL(s) as per your requirement.
90+
6. On the **Set up NAVEX IRM (Lockpath/Keylight)** section, copy the appropriate URL(s) as per your requirement.
9191

9292
![Copy configuration URLs](common/copy-configuration-urls.png)
9393

@@ -105,29 +105,29 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
105105

106106
### Assign the Azure AD test user
107107

108-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to LockPath Keylight.
108+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to NAVEX IRM (Lockpath/Keylight).
109109

110110
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
111-
1. In the applications list, select **LockPath Keylight**.
111+
1. In the applications list, select **NAVEX IRM (Lockpath/Keylight)**.
112112
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
113113
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
114114
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
115115
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
116116
1. In the **Add Assignment** dialog, click the **Assign** button.
117117

118-
## Configure LockPath Keylight SSO
118+
## Configure NAVEX IRM (Lockpath/Keylight) SSO
119119

120-
1. To enable SSO in LockPath Keylight, perform the following steps:
120+
1. To enable SSO in NAVEX IRM (Lockpath/Keylight), perform the following steps:
121121

122-
a. Sign-on to your LockPath Keylight account as administrator.
122+
a. Sign-on to your NAVEX IRM (Lockpath/Keylight) account as administrator.
123123

124-
b. In the menu on the top, click **Person**, and select **Keylight Setup**.
124+
b. In the menu on the top, click **User Icon**, and select **Setup**.
125125

126126
![Screenshot that shows the "Person" icon selected, and "Keylight Setup" selected from the drop-down.](./media/keylight-tutorial/setup-icon.png)
127127

128128
c. In the treeview on the left, click **SAML**.
129129

130-
![Screenshot that shows "S A M L" selected in the tree view.](./media/keylight-tutorial/treeview.png)
130+
![Screenshot that shows "S A M L" selected in the tree view.](./media/keylight-tutorial/tree-view.png)
131131

132132
d. On the **SAML Settings** dialog, click **Edit**.
133133

@@ -143,11 +143,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143143

144144
c. In the **Identity Provider Logout URL** textbox, paste the **Logout URL** value which you have copied from the Azure portal.
145145

146-
d. Click **Choose File** to select your downloaded LockPath Keylight certificate, and then click **Open** to upload the certificate.
146+
d. Click **Choose File** to select your downloaded NAVEX IRM (Lockpath/Keylight) certificate, and then click **Open** to upload the certificate.
147147

148148
e. Set **SAML User Id location** to **NameIdentifier element of the subject statement**.
149149

150-
f. Provide the **Keylight Service Provider** using the following pattern: `https://<CompanyName>.keylightgrc.com`.
150+
f. Provide the **Service Provider Entity Id** using the following pattern: `https://<CompanyName>.keylightgrc.com`.
151151

152152
g. Set **Auto-provision users** to **Active**.
153153

@@ -165,20 +165,20 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
165165

166166
n. Click **Save**.
167167

168-
### Create LockPath Keylight test user
168+
### Create NAVEX IRM (Lockpath/Keylight) test user
169169

170-
In this section, a user called Britta Simon is created in LockPath Keylight. LockPath Keylight supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in LockPath Keylight, a new one is created after authentication. If you need to create a user manually, you need to contact the [LockPath Keylight Client support team](https://www.lockpath.com/contact/).
170+
In this section, a user called Britta Simon is created in NAVEX IRM (Lockpath/Keylight). NAVEX IRM (Lockpath/Keylight) supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in NAVEX IRM (Lockpath/Keylight), a new one is created after authentication. If you need to create a user manually, you need to contact the [NAVEX IRM (Lockpath/Keylight) Customer support team](https://www.lockpath.com/contact/).
171171

172172
## Test SSO
173173

174174
In this section, you test your Azure AD single sign-on configuration with following options.
175175

176-
* Click on **Test this application** in Azure portal. This will redirect to LockPath Keylight Sign-on URL where you can initiate the login flow.
176+
* Click on **Test this application** in Azure portal. This will redirect to NAVEX IRM (Lockpath/Keylight) Sign-on URL where you can initiate the login flow.
177177

178-
* Go to LockPath Keylight Sign-on URL directly and initiate the login flow from there.
178+
* Go to NAVEX IRM (Lockpath/Keylight) Sign-on URL directly and initiate the login flow from there.
179179

180-
* You can use Microsoft My Apps. When you click the LockPath Keylight tile in the My Apps, this will redirect to LockPath Keylight Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
180+
* You can use Microsoft My Apps. When you click the NAVEX IRM (Lockpath/Keylight) tile in the My Apps, this will redirect to NAVEX IRM (Lockpath/Keylight) Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
181181

182182
## Next steps
183183

184-
Once you configure LockPath Keylight you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
184+
Once you configure NAVEX IRM (Lockpath/Keylight) you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
-875 Bytes
Loading
-4.67 KB
Loading
8.02 KB
Loading
8.15 KB
Loading

0 commit comments

Comments
 (0)