Skip to content

Commit c3c9801

Browse files
Merge pull request #272115 from limwainstein/sso
SSO setup
2 parents 9a00b5c + 3738c22 commit c3c9801

15 files changed

+143
-6
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,9 @@
249249
displayName: users, user
250250
- name: Audit user activity
251251
href: track-user-activity.md
252+
- name: SSO for sensor console login
253+
href: set-up-sso.md
254+
displayName: users, user
252255
- name: Maintain OT on-premises resources
253256
items:
254257
- name: Enhance device data and detection

articles/defender-for-iot/organizations/legacy-central-management/manage-users-on-premises-management-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Configure an integration between your on-premises management console and Active
122122

123123
For example, use Active Directory when you have a large number of users that you want to assign Read Only access to, and you want to manage those permissions at the group level.
124124

125-
For more information, see [Active Directory support on sensors and on-premises management consoles](../manage-users-overview.md#active-directory-support-on-sensors-and-on-premises-management-consoles).
125+
For more information, see [Microsoft Entra ID support on sensors and on-premises management consoles](../manage-users-overview.md#microsoft-entra-id-support-on-sensors-and-on-premises-management-consoles).
126126

127127
**Prerequisites**: This procedure is available for the *support* and *cyberx* users only, or any user with an **Admin** role.
128128

articles/defender-for-iot/organizations/manage-users-overview.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ Sign into the OT sensors to [define sensor users](manage-users-sensor.md), and s
2727

2828
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
2929

30-
### Active Directory support on sensors and on-premises management consoles
30+
### Microsoft Entra ID support on sensors and on-premises management consoles
3131

32-
You might want to configure an integration between your sensor and Active Directory to allow Active Directory users to sign in to your sensor, or to use Active Directory groups, with collective permissions assigned to all users in the group.
32+
You might want to configure an integration between your sensor and Microsoft Entra ID to allow Microsoft Entra ID users to sign in to your sensor, or to use Microsoft Entra ID groups, with collective permissions assigned to all users in the group.
3333

34-
For example, use Active Directory when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
34+
For example, use Microsoft Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
3535

36-
Defender for IoT's integration with Active Directory supports LDAP v3 and the following types of LDAP-based authentication:
36+
Defender for IoT's integration with Microsoft Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
3737

3838
- **Full authentication**: User details are retrieved from the LDAP server. Examples are the first name, last name, email, and user permissions.
3939

@@ -44,6 +44,10 @@ For more information, see:
4444
- [Configure an Active Directory connection](manage-users-sensor.md#configure-an-active-directory-connection)
4545
- [Other firewall rules for external services (optional)](networking-requirements.md#other-firewall-rules-for-external-services-optional).
4646

47+
### Single sign-on for login to the sensor console
48+
49+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
50+
4751
### On-premises global access groups
4852

4953
Large organizations often have a complex user permissions model based on global organizational structures. To manage your on-premises Defender for IoT users, use a global business topology that's based on business units, regions, and sites, and then define user access permissions around those entities.
273 KB
Loading
305 KB
Loading
18.4 KB
Loading
321 KB
Loading
157 KB
Loading
82.4 KB
Loading
230 KB
Loading

0 commit comments

Comments
 (0)