You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/legacy-central-management/manage-users-on-premises-management-console.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ Configure an integration between your on-premises management console and Active
122
122
123
123
For example, use Active Directory when you have a large number of users that you want to assign Read Only access to, and you want to manage those permissions at the group level.
124
124
125
-
For more information, see [Active Directory support on sensors and on-premises management consoles](../manage-users-overview.md#active-directory-support-on-sensors-and-on-premises-management-consoles).
125
+
For more information, see [Microsoft Entra ID support on sensors and on-premises management consoles](../manage-users-overview.md#microsoft-entra-id-support-on-sensors-and-on-premises-management-consoles).
126
126
127
127
**Prerequisites**: This procedure is available for the *support* and *cyberx* users only, or any user with an **Admin** role.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/manage-users-overview.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,13 @@ Sign into the OT sensors to [define sensor users](manage-users-sensor.md), and s
27
27
28
28
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
29
29
30
-
### Active Directory support on sensors and on-premises management consoles
30
+
### Microsoft Entra ID support on sensors and on-premises management consoles
31
31
32
-
You might want to configure an integration between your sensor and Active Directory to allow Active Directory users to sign in to your sensor, or to use Active Directory groups, with collective permissions assigned to all users in the group.
32
+
You might want to configure an integration between your sensor and Microsoft Entra ID to allow Microsoft Entra ID users to sign in to your sensor, or to use Microsoft Entra ID groups, with collective permissions assigned to all users in the group.
33
33
34
-
For example, use Active Directory when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
34
+
For example, use Microsoft Entra ID when you have a large number of users that you want to assign **Read Only** access to, and you want to manage those permissions at the group level.
35
35
36
-
Defender for IoT's integration with Active Directory supports LDAP v3 and the following types of LDAP-based authentication:
36
+
Defender for IoT's integration with Microsoft Entra ID supports LDAP v3 and the following types of LDAP-based authentication:
37
37
38
38
-**Full authentication**: User details are retrieved from the LDAP server. Examples are the first name, last name, email, and user permissions.
39
39
@@ -44,6 +44,10 @@ For more information, see:
44
44
-[Configure an Active Directory connection](manage-users-sensor.md#configure-an-active-directory-connection)
45
45
-[Other firewall rules for external services (optional)](networking-requirements.md#other-firewall-rules-for-external-services-optional).
46
46
47
+
### Single sign-on for login to the sensor console
48
+
49
+
You can set up single sign-on (SSO) for the Defender for IoT sensor console using Microsoft Entra ID. With SSO, your organization's users can simply sign into the sensor console, and don't need multiple login credentials across different sensors and sites. For more information, see [Set up single sign-on for the sensor console](set-up-sso.md).
50
+
47
51
### On-premises global access groups
48
52
49
53
Large organizations often have a complex user permissions model based on global organizational structures. To manage your on-premises Defender for IoT users, use a global business topology that's based on business units, regions, and sites, and then define user access permissions around those entities.
0 commit comments