Skip to content

Commit bfa0fbb

Browse files
committed
Product Backlog Item 989972: SaaS App Tutorial: Trend Micro Web Security(TMWS) Update
1 parent 5cd81e3 commit bfa0fbb

File tree

1 file changed

+36
-2
lines changed

1 file changed

+36
-2
lines changed

articles/active-directory/saas-apps/trend-micro-tutorial.md

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 04/03/2020
16+
ms.date: 04/21/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -172,7 +172,41 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
172172

173173
## Configure Trend Micro Web Security SSO
174174

175-
To configure single sign-on on **Trend Micro Web Security(TMWS)** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Trend Micro Web Security(TMWS) support team](https://success.trendmicro.com/contact-support-north-america). They set this setting to have the SAML SSO connection set properly on both sides.
175+
1. Sign into the TMWS management console, and go to **Administration** > **USERS & AUTHENTICATION** > **Directory Services**.
176+
177+
1. Click here on the upper area of the screen.
178+
179+
1. On the Authentication Method screen that appears, click **Azure AD**.
180+
181+
1. Click **On** or **Off** to decide whether to allow the AD users of your organization to visit websites through TMWS if their data is not synchronized to TMWS.
182+
183+
> [!NOTE]
184+
> Users not synchronized from Azure AD can be authenticated only through known TMWS gateways or the dedicated port for your organization.
185+
186+
1. On the **Identity Provider Settings** section, perform the following steps:
187+
188+
a. In the **Service URL** field, paste the **Login URL** value, which you have copied from Azure portal
189+
190+
b. In the **Logon name attribute** field, paste the User claim name with the **user.onpremisessamaccountname** source attribute from the Azure portal.
191+
192+
c. In the **Public SSL certificate** field, use the downloaded **Certificate (Base64)** from the Azure portal.
193+
194+
1. On the **Synchronization Settings** section, perform the following steps:
195+
196+
a. In the **Tenant** field, use **Directory (tenant) ID** or **Custom domain name** value from the Azure portal.
197+
198+
b. In the **Application ID** field, **Application (client) ID** value from the Azure portal.
199+
200+
c. In the **Client secret** field, use **Client secret** from the Azure portal.
201+
202+
d. In the **Synchronization schedule** field, Select to synchronize with Azure AD manually or according to a schedule. If you choose Manually, whenever there are changes to Active Directory user information, remember to go back to the Directory Services screen and perform manual synchronization so that information in TMWS remains current.
203+
204+
e. Click **Test Connection** to check whether the Azure AD service can be connected successfully.
205+
206+
f. Click **Save**.
207+
208+
> [!NOTE]
209+
> For more information on how to configure Trend Micro Web Security with Azure AD, please refer [this](https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-help/administration_001/directory-services/azure-active-directo/configuring-azure-ad.aspx) document.
176210
177211
## Test SSO
178212

0 commit comments

Comments
 (0)