Skip to content

Commit ba9a0cc

Browse files
authored
Merge pull request #191531 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 890818d + 223919e commit ba9a0cc

File tree

894 files changed

+6233
-2668
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

894 files changed

+6233
-2668
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -830,6 +830,18 @@
830830
"url": "https://github.com/Azure-Samples/msdocs-nodejs-mongodb-azure-sample-app",
831831
"branch": "main",
832832
"branch_mapping": {}
833+
},
834+
{
835+
"path_to_root": "msdocs-django-postgresql-sample-app",
836+
"url": "https://github.com/Azure-Samples/msdocs-django-postgresql-sample-app",
837+
"branch": "main",
838+
"branch_mapping": {}
839+
},
840+
{
841+
"path_to_root": "msdocs-flask-postgresql-sample-app",
842+
"url": "https://github.com/Azure-Samples/msdocs-flask-postgresql-sample-app",
843+
"branch": "main",
844+
"branch_mapping": {}
833845
}
834846
],
835847
"branch_target_mapping": {

articles/active-directory/saas-apps/amazon-web-service-tutorial.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 02/28/2022
12+
ms.date: 03/08/2022
1313
ms.author: jeedes
1414
---
1515

@@ -112,7 +112,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
112112

113113
1. In the Azure portal, on the **AWS Single-Account Access** application integration page, find the **Manage** section and select **single sign-on**.
114114
1. On the **Select a single sign-on method** page, select **SAML**.
115-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
115+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
116116

117117
![Edit Basic SAML Configuration](common/edit-urls.png)
118118

@@ -388,14 +388,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
388388

389389
#### IDP initiated:
390390

391-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single-Account Access for which you set up the SSO
391+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single-Account Access for which you set up the SSO.
392392

393393
You can also use Microsoft My Apps to test the application in any mode. When you click the AWS Single-Account Access tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the AWS Single-Account Access for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
394394

395-
396395
## Known issues
397396

398-
* AWS Single-Account Access provisioning integration can be used only to connect to AWS public cloud endpoints. AWS Single-Account Access provisioning integration can't be used to access AWS Government environments.
397+
* AWS Single-Account Access provisioning integration can be used only to connect to AWS public cloud endpoints. AWS Single-Account Access provisioning integration can't be used to access AWS Government environments, or the AWS China regions.
399398

400399
* In the **Provisioning** section, the **Mappings** subsection shows a "Loading..." message, and never displays the attribute mappings. The only provisioning workflow supported today is the import of roles from AWS into Azure AD for selection during a user or group assignment. The attribute mappings for this are predetermined, and aren't configurable.
401400

articles/active-directory/saas-apps/aws-single-sign-on-tutorial.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/26/2021
12+
ms.date: 03/10/2022
1313
ms.author: jeedes
1414

1515
---
@@ -37,7 +37,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
3737

3838
* AWS Single Sign-on supports [**Automated user provisioning**](./aws-single-sign-on-provisioning-tutorial.md).
3939

40-
## Adding AWS Single Sign-on from the gallery
40+
## Add AWS Single Sign-on from the gallery
4141

4242
To configure the integration of AWS Single Sign-on into Azure AD, you need to add AWS Single Sign-on from the gallery to your list of managed SaaS apps.
4343

@@ -48,7 +48,6 @@ To configure the integration of AWS Single Sign-on into Azure AD, you need to ad
4848
1. In the **Add from the gallery** section, type **AWS Single Sign-on** in the search box.
4949
1. Select **AWS Single Sign-on** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5050

51-
5251
## Configure and test Azure AD SSO for AWS Single Sign-on
5352

5453
Configure and test Azure AD SSO with AWS Single Sign-on using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in AWS Single Sign-on.
@@ -80,14 +79,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8079

8180
![image2](common/browse-upload-metadata.png)
8281

83-
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section:
84-
85-
![image3](common/idp-intiated.png)
82+
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
8683

8784
> [!Note]
8885
> If the **Identifier** and **Reply URL** values are not getting auto populated, then fill in the values manually according to your requirement.
8986

90-
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
87+
> [!Note]
88+
> When changing identity provider in AWS (i.e. from AD to external provider such as Azure AD) the AWS metadata will change and need to be reuploaded to Azure for SSO to function correctly.
89+
90+
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
9191

9292
a. In the **Identifier** text box, type a URL using the following pattern:
9393
`https://<REGION>.signin.aws.amazon.com/platform/saml/<ID>`
@@ -107,7 +107,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
107107

108108
![image](common/edit-attribute.png)
109109

110-
111110
> [!NOTE]
112111
> If ABAC is enabled in AWS SSO, the additional attributes may be passed as session tags directly into AWS accounts.
113112

@@ -210,8 +209,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210209
g. Choose **Next: Groups**.
211210

212211
> [!NOTE]
213-
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This
214-
will you help avoid any authentication problems.
212+
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This will you help avoid any authentication problems.
215213
216214
5. Choose **Add user**.
217215
6. Next, you will assign the user to your AWS account. To do so, in the left navigation pane of the
@@ -244,11 +242,10 @@ In this section, you test your Azure AD single sign-on configuration with follow
244242

245243
#### IDP initiated:
246244

247-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO
245+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO.
248246

249247
You can also use Microsoft My Apps to test the application in any mode. When you click the AWS Single Sign-on tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
250248

251-
252249
## Next steps
253250

254-
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
251+
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/fortiweb-web-application-firewall-tutorial.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with FortiWeb Web Application Firewall | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with FortiWeb Web Application Firewall'
33
description: Learn how to configure single sign-on between Azure Active Directory and FortiWeb Web Application Firewall.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/24/2020
12+
ms.date: 03/11/2020
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with FortiWeb Web Application Firewall
17+
# Tutorial: Azure AD SSO integration with FortiWeb Web Application Firewall
1818

1919
In this tutorial, you'll learn how to integrate FortiWeb Web Application Firewall with Azure Active Directory (Azure AD). When you integrate FortiWeb Web Application Firewall with Azure AD, you can:
2020

@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* FortiWeb Web Application Firewall single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.

articles/active-directory/saas-apps/tribeloo-tutorial.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Tribeloo | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Tribeloo'
33
description: Learn how to configure single sign-on between Azure Active Directory and Tribeloo.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/02/2021
12+
ms.date: 03/11/2021
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Tribeloo
17+
# Tutorial: Azure AD SSO integration with Tribeloo
1818

1919
In this tutorial, you'll learn how to integrate Tribeloo with Azure Active Directory (Azure AD). When you integrate Tribeloo with Azure AD, you can:
2020

@@ -29,6 +29,9 @@ To get started, you need the following items:
2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* Tribeloo single sign-on (SSO) enabled subscription.
3131

32+
> [!NOTE]
33+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
34+
3235
## Scenario description
3336

3437
In this tutorial, you configure and test Azure AD SSO in a test environment.
Lines changed: 56 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,56 @@
1-
### YamlMime:Landing
2-
3-
title: Azure Active Directory configuring to standards documentation
4-
summary: Azure and Azure Active Directory enable you to leverage their compliance certifications and configure your environment to meet governmental and industry standards.
5-
6-
metadata:
7-
title: Azure Active Directory configuring to standards documentation
8-
description: "Learn to configure Azure and Azure Active directory to meet governmental and industry standards."
9-
manager: mtillman
10-
ms.author: baselden
11-
ms.collection: na
12-
ms.date: 04/26/2021
13-
ms.service: active-directory
14-
ms.subservice: na
15-
ms.topic: landing-page
16-
services: active-directory
17-
18-
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
19-
20-
landingContent:
21-
# Card
22-
- title: Standards overviews
23-
linkLists:
24-
- linkListType: overview
25-
links:
26-
- text: Configure to identity standards
27-
url: standards-overview.md
28-
- text: NIST AAL overview
29-
url: nist-overview.md
30-
- text: FedRAMP High impact overview
31-
url: configure-azure-active-directory-for-fedramp-high-impact.md
32-
33-
# Card
34-
- title: Configure NIST AALs
35-
linkLists:
36-
- linkListType: how-to-guide
37-
links:
38-
- text: Achieve NIST AAL 1
39-
url: nist-authenticator-assurance-level-1.md
40-
- text: Achieve NIST AAL 2
41-
url: nist-authenticator-assurance-level-2.md
42-
- text: Achieve NIST AAL 3
43-
url: nist-authenticator-assurance-level-3.md
44-
45-
# Card
46-
- title: Configure FedRAMP controls
47-
linkLists:
48-
- linkListType: how-to-guide
49-
links:
50-
- text: Configure access controls
51-
url: fedramp-access-controls.md
52-
- text: Configure identification and authentication controls
53-
url: fedramp-identification-and-authentication-controls.md
54-
- text: Configure additional controls
55-
url: fedramp-other-controls.md
56-
1+
### YamlMime:Landing
2+
3+
title: Azure Active Directory configuring to standards documentation
4+
summary: Azure and Azure Active Directory enable you to leverage their compliance certifications and configure your environment to meet governmental and industry standards.
5+
6+
metadata:
7+
title: Azure Active Directory configuring to standards documentation
8+
description: "Learn to configure Azure and Azure Active directory to meet governmental and industry standards."
9+
manager: mtillman
10+
ms.author: baselden
11+
ms.collection: na
12+
ms.date: 04/26/2021
13+
ms.service: active-directory
14+
ms.subservice: na
15+
ms.topic: landing-page
16+
services: active-directory
17+
18+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
19+
20+
landingContent:
21+
# Card
22+
- title: Standards overviews
23+
linkLists:
24+
- linkListType: overview
25+
links:
26+
- text: Configure to identity standards
27+
url: standards-overview.md
28+
- text: NIST AAL overview
29+
url: nist-overview.md
30+
- text: FedRAMP High impact overview
31+
url: configure-azure-active-directory-for-fedramp-high-impact.md
32+
33+
# Card
34+
- title: Configure NIST AALs
35+
linkLists:
36+
- linkListType: how-to-guide
37+
links:
38+
- text: Achieve NIST AAL 1
39+
url: nist-authenticator-assurance-level-1.md
40+
- text: Achieve NIST AAL 2
41+
url: nist-authenticator-assurance-level-2.md
42+
- text: Achieve NIST AAL 3
43+
url: nist-authenticator-assurance-level-3.md
44+
45+
# Card
46+
- title: Configure FedRAMP controls
47+
linkLists:
48+
- linkListType: how-to-guide
49+
links:
50+
- text: Configure access controls
51+
url: fedramp-access-controls.md
52+
- text: Configure identification and authentication controls
53+
url: fedramp-identification-and-authentication-controls.md
54+
- text: Configure additional controls
55+
url: fedramp-other-controls.md
56+
1002 Bytes
Loading

0 commit comments

Comments
 (0)