Skip to content

Commit b7ec1a9

Browse files
authored
Merge pull request #214408 from v-missam/github-issues-2
doc-1
2 parents b174e4e + 13d79c4 commit b7ec1a9

File tree

9 files changed

+15
-24
lines changed

9 files changed

+15
-24
lines changed

articles/active-directory/saas-apps/cato-networks-provisioning-tutorial.md

Lines changed: 14 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -45,20 +45,11 @@ The scenario outlined in this tutorial assumes that you already have the followi
4545
## Step 2. Configure Cato Networks to support provisioning with Azure AD
4646

4747
1. Log in to your account in the [Cato Management Application](https://cc2.catonetworks.com).
48-
1. From the navigation menu, select **Configuration > Global Settings**, and then expand the **VPN Settings** section.
49-
![VPN Settings section](media/cato-networks-provisioning-tutorial/vpn-settings.png)
50-
1. Expand the **SCIM Provisioning** section and enable SCIM provisioning by clicking on **Enable SCIM Provisioning**.
51-
![Enable SCIM Provisioning](media/cato-networks-provisioning-tutorial/scim-settings.png)
52-
1. Copy the Base URL and Bearer Token from the Cato Management Application to the SCIM app in the Azure portal:
53-
1. In the Cato Management Application (from the **SCIM Provisioning** section), copy the Base URL.
54-
1. In the Cato Networks SCIM app in the Azure portal, in the **Provisioning** tab, paste the base URL in the **Tenant URL** field.
55-
![Copy tenant URL](media/cato-networks-provisioning-tutorial/tenant-url.png)
56-
1. In the Cato Management Application (from the **SCIM Provisioning** section), click **Generate Token** and copy the bearer token.
57-
1. In the Cato Networks SCIM app in the Azure portal, paste the bearer token in the **Secret Token** field.
58-
![Copy secret token](media/cato-networks-provisioning-tutorial/secret-token.png)
59-
1. In the Cato Management Application (from the **SCIM Provisioning** section), click **Save**. SCIM Provisioning between your Cato account and Azure AD is configured.
60-
![Save SCIM Configuration](media/cato-networks-provisioning-tutorial/save-CC.png)
61-
1. Test the connection between the Azure SCIM app and the Cato Cloud. In the Cato Networks SCIM apps in the Azure portal, in the **Provisioning** tab, click **Test Connection**.
48+
1. From the navigation menu select **Access > Directory Services** and click the **SCIM** section tab.
49+
![Screenshot of navigate to SCIM setting.](media/cato-networks-provisioning-tutorial/navigate.png)
50+
1. Select **Enable SCIM Provisioning** to set your account to connect to the SCIM app. And then click **Save**.
51+
![Screenshot of Enable SCIM Provisioning.](media/cato-networks-provisioning-tutorial/scim-setting.png)
52+
1. Copy the **Base URL**.Click **Generate Token** and copy the bearer token. Base Url and token will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your Cato Network application in the Azure portal.
6253

6354

6455
## Step 3. Add Cato Networks from the Azure AD application gallery
@@ -82,27 +73,27 @@ This section guides you through the steps to configure the Azure AD provisioning
8273

8374
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
8475

85-
![Enterprise applications blade](common/enterprise-applications.png)
76+
![Screenshot of enterprise applications blade.](common/enterprise-applications.png)
8677

8778
1. In the applications list, select **Cato Networks**.
8879

89-
![The Cato Networks link in the Applications list](common/all-applications.png)
80+
![Screenshot of the Cato Networks link in the Applications list.](common/all-applications.png)
9081

9182
1. Select the **Provisioning** tab.
9283

93-
![Provisioning tab](common/provisioning.png)
84+
![Screenshot of provisioning tab.](common/provisioning.png)
9485

9586
1. Set the **Provisioning Mode** to **Automatic**.
9687

97-
![Provisioning tab automatic](common/provisioning-automatic.png)
88+
![Screenshot of provisioning tab automatic.](common/provisioning-automatic.png)
9889

9990
1. Under the **Admin Credentials** section, input your Cato Networks Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Cato Networks. If the connection fails, ensure your Cato Networks account has Admin permissions and try again.
10091

101-
![Token](common/provisioning-testconnection-tenanturltoken.png)
92+
![Screenshot of token.](common/provisioning-testconnection-tenanturltoken.png)
10293

10394
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
10495

105-
![Notification Email](common/provisioning-notification-email.png)
96+
![Screenshot of notification email.](common/provisioning-notification-email.png)
10697

10798
1. Select **Save**.
10899

@@ -135,15 +126,15 @@ This section guides you through the steps to configure the Azure AD provisioning
135126

136127
1. To enable the Azure AD provisioning service for Cato Networks, change the **Provisioning Status** to **On** in the **Settings** section.
137128

138-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
129+
![Screenshot of provisioning status toggled on.](common/provisioning-toggle-on.png)
139130

140131
1. Define the users and/or groups that you would like to provision to Cato Networks by choosing the desired values in **Scope** in the **Settings** section.
141132

142-
![Provisioning Scope](common/provisioning-scope.png)
133+
![Screenshot of provisioning scope.](common/provisioning-scope.png)
143134

144135
1. When you're ready to provision, click **Save**.
145136

146-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
137+
![Screenshot of saving provisioning configuration.](common/provisioning-configuration-save.png)
147138

148139
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to complete than next cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
149140

articles/active-directory/saas-apps/code42-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.author: thwimmer
1919

2020
# Tutorial: Configure Code42 for automatic user provisioning
2121

22-
This tutorial describes the steps you need to perform in both Code42 and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Code42](https://www.crashplan.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
22+
This tutorial describes the steps you need to perform in both Code42 and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Code42](https://www.code42.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2323

2424

2525
## Capabilities Supported
20 KB
Loading
20.1 KB
Loading

0 commit comments

Comments
 (0)