Skip to content

Commit ba39177

Browse files
authored
Merge pull request #105143 from Ja-Dunn/two-saas-apps-tutorials
edit pass: two-saas-apps-tutorials
2 parents 7bc9d2b + 050b752 commit ba39177

File tree

2 files changed

+116
-109
lines changed

2 files changed

+116
-109
lines changed

articles/active-directory/saas-apps/ns1-sso-azure-tutorial.md

Lines changed: 62 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ ms.collection: M365-identity-device-management
2424
In this tutorial, you'll learn how to integrate NS1 SSO for Azure with Azure Active Directory (Azure AD). When you integrate NS1 SSO for Azure with Azure AD, you can:
2525

2626
* Control in Azure AD who has access to NS1 SSO for Azure.
27-
* Enable your users to be automatically signed-in to NS1 SSO for Azure with their Azure AD accounts.
28-
* Manage your accounts in one central location - the Azure portal.
27+
* Enable your users to be automatically signed in to NS1 SSO for Azure with their Azure AD accounts.
28+
* Manage your accounts in one central location, the Azure portal.
2929

30-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
30+
To learn more about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
3131

3232
## Prerequisites
3333

@@ -40,138 +40,142 @@ To get started, you need the following items:
4040

4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

43-
* NS1 SSO for Azure supports **SP and IDP** initiated SSO
44-
* Once you configure NS1 SSO for Azure you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
43+
* NS1 SSO for Azure supports SP and IDP initiated SSO.
44+
* After you configure NS1 SSO for Azure, you can enforce session control. This protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4545

4646

47-
## Adding NS1 SSO for Azure from the gallery
47+
## Add NS1 SSO for Azure from the gallery
4848

4949
To configure the integration of NS1 SSO for Azure into Azure AD, you need to add NS1 SSO for Azure from the gallery to your list of managed SaaS apps.
5050

51-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
51+
1. Sign in to the [Azure portal](https://portal.azure.com) by using either a work or school account, or a personal Microsoft account.
5252
1. On the left navigation pane, select the **Azure Active Directory** service.
53-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54-
1. To add new application, select **New application**.
53+
1. Go to **Enterprise Applications**, and then select **All Applications**.
54+
1. To add a new application, select **New application**.
5555
1. In the **Add from the gallery** section, type **NS1 SSO for Azure** in the search box.
56-
1. Select **NS1 SSO for Azure** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
56+
1. Select **NS1 SSO for Azure** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
5757

5858

5959
## Configure and test Azure AD single sign-on for NS1 SSO for Azure
6060

61-
Configure and test Azure AD SSO with NS1 SSO for Azure using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in NS1 SSO for Azure.
61+
Configure and test Azure AD SSO with NS1 SSO for Azure by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in NS1 SSO for Azure.
6262

63-
To configure and test Azure AD SSO with NS1 SSO for Azure, complete the following building blocks:
63+
Here are the general steps to configure and test Azure AD SSO with NS1 SSO for Azure:
6464

65-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68-
1. **[Configure NS1 SSO for Azure SSO](#configure-ns1-sso-for-azure-sso)** - to configure the single sign-on settings on application side.
69-
1. **[Create NS1 SSO for Azure test user](#create-ns1-sso-for-azure-test-user)** - to have a counterpart of B.Simon in NS1 SSO for Azure that is linked to the Azure AD representation of user.
70-
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
65+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
66+
67+
a. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
68+
69+
b. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
70+
1. **[Configure NS1 SSO for Azure SSO](#configure-ns1-sso-for-azure-sso)** to configure the single sign-on settings on the application side.
71+
72+
a. **[Create an NS1 SSO for Azure test user](#create-an-ns1-sso-for-azure-test-user)** to have a counterpart of B.Simon in NS1 SSO for Azure. This counterpart is linked to the Azure AD representation of the user.
73+
1. **[Test SSO](#test-sso)** to verify whether the configuration works.
7174

7275
## Configure Azure AD SSO
7376

7477
Follow these steps to enable Azure AD SSO in the Azure portal.
7578

76-
1. In the [Azure portal](https://portal.azure.com/), on the **NS1 SSO for Azure** application integration page, find the **Manage** section and select **single sign-on**.
79+
1. In the [Azure portal](https://portal.azure.com/), on the **NS1 SSO for Azure** application integration page, find the **Manage** section. Select **single sign-on**.
7780
1. On the **Select a single sign-on method** page, select **SAML**.
78-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
81+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
7982

80-
![Edit Basic SAML Configuration](common/edit-urls.png)
83+
![Screenshot of Set up single sign-on with SAML page, with pencil icon highlighted](common/edit-urls.png)
8184

82-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
85+
1. In the **Basic SAML Configuration** section, if you want to configure the application in **IDP** initiated mode, enter the values for the following fields:
8386

84-
a. In the **Identifier** text box, type the URL:
87+
a. In the **Identifier** text box, type the following URL:
8588
`https://api.nsone.net/saml/metadata`
8689

87-
b. In the **Reply URL** text box, type a URL using the following pattern:
90+
b. In the **Reply URL** text box, type a URL that uses the following pattern:
8891
`https://api.nsone.net/saml/sso/<ssoid>`
8992

90-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
93+
1. Select **Set additional URLs**, and perform the following step if you want to configure the application in **SP** initiated mode:
9194

92-
In the **Sign-on URL** text box, type the URL:
95+
In the **Sign-on URL** text box, type the following URL:
9396
`https://my.nsone.net/#/login/sso`
9497

9598
> [!NOTE]
96-
> The Reply URL value is not real. Update Reply URL value with the actual Reply URL. Contact [NS1 SSO for Azure Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
99+
> The Reply URL value isn't real. Update Reply URL value with the actual Reply URL. Contact the [NS1 SSO for Azure Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
97100

98-
1. NS1 SSO for Azure application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
101+
1. The NS1 SSO for Azure application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes & Claims** section on the application integration page. On the **Set up Single Sign-On with SAML** page, select the pencil icon to open the **User Attributes** dialog box.
99102

100-
![Attribute Section](./media/ns1-sso-for-azure-tutorial/attribute-edit-option.png)
103+
![Screenshot of User Attributes & Claims section, with pencil icon highlighted](./media/ns1-sso-for-azure-tutorial/attribute-edit-option.png)
101104

102-
1. Click on the attribute name to edit the claim.
105+
1. Select the attribute name to edit the claim.
103106

104-
![Attribute Section](./media/ns1-sso-for-azure-tutorial/attribute-claim-edit.png)
107+
![Screenshot of User Attributes & Claims section, with attribute name highlighted](./media/ns1-sso-for-azure-tutorial/attribute-claim-edit.png)
105108

106109
1. Select **Transformation**.
107110

108-
![Attribute Section](./media/ns1-sso-for-azure-tutorial/prefix-edit.png)
111+
![Screenshot of Manage claim section, with Transformation highlighted](./media/ns1-sso-for-azure-tutorial/prefix-edit.png)
109112

110-
1. On the **Manage transformation** section, perform the following steps:
113+
1. In the **Manage transformation** section, perform the following steps:
111114

112-
![Attribute Section](./media/ns1-sso-for-azure-tutorial/prefix-added.png)
115+
![Screenshot of Manage transformation section, with various fields highlighted](./media/ns1-sso-for-azure-tutorial/prefix-added.png)
113116

114117
1. Select **ExactMailPrefix()** as **Transformation**.
115118

116119
1. Select **user.userprincipalname** as **Parameter 1**.
117120

118-
1. Click on **Add**.
121+
1. Select **Add**.
119122

120-
1. Click on **Save**
123+
1. Select **Save**.
121124

122-
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
125+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, select the copy button. This copies the **App Federation Metadata Url** and saves it on your computer.
123126

124-
![The Certificate download link](common/copy-metadataurl.png)
127+
![Screenshot of the SAML Signing Certificate, with the copy button highlighted](common/copy-metadataurl.png)
125128

126129
### Create an Azure AD test user
127130

128-
In this section, you'll create a test user in the Azure portal called B.Simon.
131+
In this section, you create a test user in the Azure portal called B.Simon.
129132

130-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
133+
1. From the left pane in the Azure portal, select **Azure Active Directory** > **Users** > **All users**.
131134
1. Select **New user** at the top of the screen.
132135
1. In the **User** properties, follow these steps:
136+
133137
1. In the **Name** field, enter `B.Simon`.
134138
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
135-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
136-
1. Click **Create**.
139+
1. Select the **Show password** check box, and then write down the value that's shown in the **Password** field.
140+
1. Select **Create**.
137141

138142
### Assign the Azure AD test user
139143

140-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to NS1 SSO for Azure.
144+
In this section, you enable B.Simon to use Azure single sign-on by granting access to NS1 SSO for Azure.
141145

142-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
146+
1. In the Azure portal, select **Enterprise Applications** > **All applications**.
143147
1. In the applications list, select **NS1 SSO for Azure**.
144-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
148+
1. In the app's overview page, find the **Manage** section, and select **Users and groups**.
145149

146-
![The "Users and groups" link](common/users-groups-blade.png)
150+
![Screenshot of the Manage section, with Users and groups highlighted](common/users-groups-blade.png)
147151

148-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
152+
1. Select **Add user**. In the **Add Assignment** dialog box, select **Users and groups**.
149153

150-
![The Add User link](common/add-assign-user.png)
154+
![Screenshot of Users and groups page, with Add user highlighted](common/add-assign-user.png)
151155

152-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
153-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
154-
1. In the **Add Assignment** dialog, click the **Assign** button.
156+
1. In the **Users and groups** dialog box, select **B.Simon** from the users list. Then choose the **Select** button at the bottom of the screen.
157+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Then choose the **Select** button at the bottom of the screen.
158+
1. In the **Add Assignment** dialog box, select **Assign**.
155159

156160
## Configure NS1 SSO for Azure SSO
157161

158-
To configure single sign-on on **NS1 SSO for Azure** side, you need to send the **App Federation Metadata Url** to [NS1 SSO for Azure support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
162+
To configure single sign-on on the NS1 SSO for Azure side, you need to send the App Federation Metadata URL to the [NS1 SSO for Azure support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
159163

160-
### Create NS1 SSO for Azure test user
164+
### Create an NS1 SSO for Azure test user
161165

162-
In this section, you create a user called B.Simon in NS1 SSO for Azure. Work with NS1 SSO for Azure support team to add the users in the NS1 SSO for Azure platform. Users must be created and activated before you use single sign-on.
166+
In this section, you create a user called B.Simon in NS1 SSO for Azure. Work with the NS1 SSO for Azure support team to add the users in the NS1 SSO for Azure platform. You can't use single sign-on until you create and activate users.
163167

164168
## Test SSO
165169

166-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
170+
In this section, you test your Azure AD single sign-on configuration by using Access Panel.
167171

168-
When you click the NS1 SSO for Azure tile in the Access Panel, you should be automatically signed in to the NS1 SSO for Azure for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
172+
When you select the NS1 SSO for Azure tile in Access Panel, you should be automatically signed in to the NS1 SSO for Azure for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
169173

170174
## Additional resources
171175

172-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
176+
- [Tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
173177

174-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
178+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
175179

176180
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
177181

0 commit comments

Comments
 (0)