Skip to content

Commit bcd6a26

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into connector-azure-database-for-postgresql
2 parents 24e43dc + a63d4b4 commit bcd6a26

18 files changed

+305
-138
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41885,6 +41885,11 @@
4188541885
"source_path": "articles/mysql/reference-data-in-stored-procedures.md",
4188641886
"redirect_url": "/azure/mysql/reference-stored-procedures",
4188741887
"redirect_document_id": false
41888+
},
41889+
{
41890+
"source_path": "articles/mariadb/reference-data-in-stored-procedures.md",
41891+
"redirect_url": "/azure/mariadb/reference-stored-procedures",
41892+
"redirect_document_id": false
4188841893
}
4188941894
]
4189041895
}

articles/active-directory/saas-apps/amazon-web-service-tutorial.md

Lines changed: 78 additions & 93 deletions
Large diffs are not rendered by default.
Lines changed: 151 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,151 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with BIS | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and BIS.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 419849ac-8398-4e8b-9509-a90158824e03
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 09/17/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with BIS
24+
25+
In this tutorial, you'll learn how to integrate BIS with Azure Active Directory (Azure AD). When you integrate BIS with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to BIS.
28+
* Enable your users to be automatically signed-in to BIS with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* BIS single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* BIS supports **SP** initiated SSO
45+
46+
* BIS supports **Just In Time** user provisioning
47+
48+
> [!NOTE]
49+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
50+
51+
## Adding BIS from the gallery
52+
53+
To configure the integration of BIS into Azure AD, you need to add BIS from the gallery to your list of managed SaaS apps.
54+
55+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
56+
1. On the left navigation pane, select the **Azure Active Directory** service.
57+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
58+
1. To add new application, select **New application**.
59+
1. In the **Add from the gallery** section, type **BIS** in the search box.
60+
1. Select **BIS** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
61+
62+
## Configure and test Azure AD single sign-on for BIS
63+
64+
Configure and test Azure AD SSO with BIS using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in BIS.
65+
66+
To configure and test Azure AD SSO with BIS, complete the following building blocks:
67+
68+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
69+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
70+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
71+
1. **[Configure BIS SSO](#configure-bis-sso)** - to configure the single sign-on settings on application side.
72+
1. **[Create BIS test user](#create-bis-test-user)** - to have a counterpart of B.Simon in BIS that is linked to the Azure AD representation of user.
73+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
74+
75+
## Configure Azure AD SSO
76+
77+
Follow these steps to enable Azure AD SSO in the Azure portal.
78+
79+
1. In the [Azure portal](https://portal.azure.com/), on the **BIS** application integration page, find the **Manage** section and select **single sign-on**.
80+
1. On the **Select a single sign-on method** page, select **SAML**.
81+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
82+
83+
![Edit Basic SAML Configuration](common/edit-urls.png)
84+
85+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
86+
87+
In the **Sign-on URL** text box, type a URL:
88+
`https://www.bistrainer.com/sso/biscr.cfm`
89+
90+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
91+
92+
![The Certificate download link](common/metadataxml.png)
93+
94+
1. On the **Set up BIS** section, copy the appropriate URL(s) based on your requirement.
95+
96+
![Copy configuration URLs](common/copy-configuration-urls.png)
97+
98+
### Create an Azure AD test user
99+
100+
In this section, you'll create a test user in the Azure portal called B.Simon.
101+
102+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
103+
1. Select **New user** at the top of the screen.
104+
1. In the **User** properties, follow these steps:
105+
1. In the **Name** field, enter `B.Simon`.
106+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
107+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
108+
1. Click **Create**.
109+
110+
### Assign the Azure AD test user
111+
112+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to BIS.
113+
114+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
115+
1. In the applications list, select **BIS**.
116+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
117+
118+
![The "Users and groups" link](common/users-groups-blade.png)
119+
120+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
121+
122+
![The Add User link](common/add-assign-user.png)
123+
124+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
125+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
126+
1. In the **Add Assignment** dialog, click the **Assign** button.
127+
128+
## Configure BIS SSO
129+
130+
To configure single sign-on on **BIS** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [BIS support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
131+
132+
### Create BIS test user
133+
134+
In this section, a user called B.Simon is created in BIS. BIS supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in BIS, a new one is created after authentication.
135+
136+
## Test SSO
137+
138+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
139+
140+
When you click the BIS tile in the Access Panel, you should be automatically signed in to the BIS for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
141+
142+
## Additional resources
143+
144+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
145+
146+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
147+
148+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
149+
150+
- [Try BIS with Azure AD](https://aad.portal.azure.com/)
151+

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,8 @@
173173
href: bime-tutorial.md
174174
- name: Birst Agile Business Analytics
175175
href: birst-tutorial.md
176+
- name: BIS
177+
href: bis-tutorial.md
176178
- name: BitaBIZ
177179
href: bitabiz-tutorial.md
178180
- name: Blackboard Learn

articles/aks/load-balancer-standard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -338,7 +338,7 @@ az aks update \
338338
```
339339

340340
> [!IMPORTANT]
341-
> The public IPs and IP prefixes must be in the same region and part of the same subscription as your AKS cluster.
341+
> The public IPs and IP prefixes must be in the same region and part of the same subscription as your AKS cluster.
342342

343343
### Define your own public IP or prefixes at cluster create time
344344

articles/aks/use-multiple-node-pools.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ The following limitations apply when you create and manage AKS clusters that sup
7575
* You can't delete the default (first) node pool.
7676
* The HTTP application routing add-on can't be used.
7777
* You can't add or delete node pools using an existing Resource Manager template as with most operations. Instead, [use a separate Resource Manager template](#manage-node-pools-using-a-resource-manager-template) to make changes to node pools in an AKS cluster.
78+
* The name of a node pool must start with a lowercase letter and can only contain alphanumeric characters. For Linux node pools the length must be between 1 and 12 characters, for Windows node pools the length must be between 1 and 6 characters.
7879

7980
While this feature is in preview, the following additional limitations apply:
8081

@@ -127,6 +128,9 @@ az aks nodepool add \
127128
--kubernetes-version 1.12.7
128129
```
129130

131+
> [!NOTE]
132+
> The name of a node pool must start with a lowercase letter and can only contain alphanumeric characters. For Linux node pools the length must be between 1 and 12 characters, for Windows node pools the length must be between 1 and 6 characters.
133+
130134
To see the status of your node pools, use the [az aks node pool list][az-aks-nodepool-list] command and specify your resource group and cluster name:
131135

132136
```azurecli-interactive
@@ -576,8 +580,8 @@ It may take a few minutes to update your AKS cluster depending on the node pool
576580

577581
## Assign a public IP per node in a node pool
578582

579-
> [!NOTE]
580-
> During the preview of assigning a public IP per node, it cannot be used with the *Standard Load Balancer SKU in AKS* due to possible load balancer rules conflicting with VM provisioning. While in preview use the *Basic Load Balancer SKU* if you need to assign a public IP per node.
583+
> [!WARNING]
584+
> During the preview of assigning a public IP per node, it cannot be used with the *Standard Load Balancer SKU in AKS* due to possible load balancer rules conflicting with VM provisioning. While in preview you must use the *Basic Load Balancer SKU* if you need to assign a public IP per node.
581585

582586
AKS nodes do not require their own public IP addresses for communication. However, some scenarios may require nodes in a node pool to have their own public IP addresses. An example is gaming, where a console needs to make a direct connection to a cloud virtual machine to minimize hops. This can be achieved by registering for a separate preview feature, Node Public IP (preview).
583587

articles/azure-functions/functions-bindings-storage-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -524,7 +524,7 @@ The Table storage input binding supports the following scenarios:
524524
525525
* **Read one or more rows in JavaScript**
526526

527-
Set the `filter` and `take` properties. Don't set `partitionKey` or `rowKey`. Access the input table entity (or entities) using `context.bindings.<name>`. The deserialized objects have `RowKey` and `PartitionKey` properties.
527+
Set the `filter` and `take` properties. Don't set `partitionKey` or `rowKey`. Access the input table entity (or entities) using `context.bindings.<BINDING_NAME>`. The deserialized objects have `RowKey` and `PartitionKey` properties.
528528

529529
## Output
530530

@@ -781,7 +781,7 @@ The Table storage output binding supports the following scenarios:
781781

782782
* **Write one or more rows in JavaScript**
783783

784-
In JavaScript functions, access the table output using `context.bindings.<name>`.
784+
In JavaScript functions, access the table output using `context.bindings.<BINDING_NAME>`.
785785

786786
## Exceptions and return codes
787787

articles/dms/tutorial-rds-mysql-server-azure-db-for-mysql-online.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: dms
1010
ms.workload: data-services
1111
ms.custom: mvc, tutorial
1212
ms.topic: article
13-
ms.date: 07/31/2019
13+
ms.date: 09/21/2019
1414
---
1515

1616
# Tutorial: Migrate RDS MySQL to Azure Database for MySQL online using DMS
@@ -104,15 +104,15 @@ To complete this tutorial, you need to:
104104
FROM
105105
(SELECT
106106
KCU.REFERENCED_TABLE_SCHEMA as SchemaName,
107-
KCU.TABLE_NAME,
108-
KCU.COLUMN_NAME,
109-
CONCAT('ALTER TABLE ', KCU.TABLE_NAME, ' DROP FOREIGN KEY ', KCU.CONSTRAINT_NAME) AS DropQuery,
107+
KCU.TABLE_NAME,
108+
KCU.COLUMN_NAME,
109+
CONCAT('ALTER TABLE ', KCU.TABLE_NAME, ' DROP FOREIGN KEY ', KCU.CONSTRAINT_NAME) AS DropQuery,
110110
CONCAT('ALTER TABLE ', KCU.TABLE_NAME, ' ADD CONSTRAINT ', KCU.CONSTRAINT_NAME, ' FOREIGN KEY (`', KCU.COLUMN_NAME, '`) REFERENCES `', KCU.REFERENCED_TABLE_NAME, '` (`', KCU.REFERENCED_COLUMN_NAME, '`) ON UPDATE ',RC.UPDATE_RULE, ' ON DELETE ',RC.DELETE_RULE) AS AddQuery
111-
FROM INFORMATION_SCHEMA.KEY_COLUMN_USAGE KCU, information_schema.REFERENTIAL_CONSTRAINTS RC
112-
WHERE
113-
KCU.CONSTRAINT_NAME = RC.CONSTRAINT_NAME
114-
AND KCU.REFERENCED_TABLE_SCHEMA = RC.UNIQUE_CONSTRAINT_SCHEMA
115-
AND KCU.REFERENCED_TABLE_SCHEMA = ('SchemaName') Queries
111+
FROM INFORMATION_SCHEMA.KEY_COLUMN_USAGE KCU, information_schema.REFERENTIAL_CONSTRAINTS RC
112+
WHERE
113+
KCU.CONSTRAINT_NAME = RC.CONSTRAINT_NAME
114+
AND KCU.REFERENCED_TABLE_SCHEMA = RC.UNIQUE_CONSTRAINT_SCHEMA
115+
AND KCU.REFERENCED_TABLE_SCHEMA = 'SchemaName') Queries
116116
GROUP BY SchemaName;
117117
```
118118
152 KB
Loading
162 KB
Loading

0 commit comments

Comments
 (0)