Skip to content

Commit d483a10

Browse files
[Microsoft Entra] Bulk SaaS Apps update 2
1 parent 8cde897 commit d483a10

File tree

1,648 files changed

+12115
-12666
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,648 files changed

+12115
-12666
lines changed

articles/active-directory/saas-apps/10000ftplans-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 10,000ft Plans with Azure Active
1818

1919
* Control in Azure AD who has access to 10,000ft Plans.
2020
* Enable your users to be automatically signed-in to 10,000ft Plans with their Azure AD accounts.
21-
* Manage your accounts in one central location - the Azure portal.
21+
* Manage your accounts in one central location.
2222

2323
## Prerequisites
2424

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 10,000ft Plans, perform the following st
6060

6161
## Configure Azure AD SSO
6262

63-
Follow these steps to enable Azure AD SSO in the Azure portal.
63+
Follow these steps to enable Azure AD SSO.
6464

6565
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6666
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans** > **Single sign-on**.
@@ -86,7 +86,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8686

8787
### Create an Azure AD test user
8888

89-
In this section, you'll create a test user in the Azure portal called B.Simon.
89+
In this section, you'll create a test user called B.Simon.
9090

9191
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
9292
1. Browse to **Identity** > **Users** > **All users**.
@@ -100,7 +100,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
100100

101101
### Assign the Azure AD test user
102102

103-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 10,000ft Plans.
103+
In this section, you'll enable B.Simon to use single sign-on by granting access to 10,000ft Plans.
104104

105105
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106106
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans**.
@@ -124,7 +124,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124124

125125
a. Select **Automatic Configuration** in the Setup SSO section.
126126

127-
b. In the **IdP Metadata URL** text box, enter the **App Federation Metadata Url** value which you have copied from the Azure portal.
127+
b. In the **IdP Metadata URL** text box, enter the **App Federation Metadata Url** value which you copied previously.
128128

129129
c. Enable the **Auto-provision authenticated users not in account** checkbox.
130130

@@ -138,7 +138,7 @@ In this section, a user called Britta Simon is created in 10,000ft Plans. 10,000
138138

139139
In this section, you test your Azure AD single sign-on configuration with following options.
140140

141-
* Click on **Test this application** in Azure portal. This will redirect to 10,000ft Plans Sign on URL where you can initiate the login flow.
141+
* Click on **Test this application**, this will redirect to 10,000ft Plans Sign on URL where you can initiate the login flow.
142142

143143
* Go to 10,000ft Plans Sign on URL directly and initiate the login flow from there.
144144

articles/active-directory/saas-apps/123formbuilder-tutorial.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn how to integrate 123FormBuilder SSO with Azure Ac
1919

2020
* Control in Azure AD who has access to 123FormBuilder SSO.
2121
* Enable your users to be automatically signed in to 123FormBuilder SSO with their Azure AD accounts.
22-
* Manage your accounts in one central location - the Azure portal.
22+
* Manage your accounts in one central location.
2323

2424
## Prerequisites
2525

@@ -61,7 +61,7 @@ To configure and test Azure AD SSO with 123FormBuilder SSO, perform the followin
6161

6262
## Configure Azure AD SSO
6363

64-
Follow these steps to enable Azure AD SSO in the Azure portal.
64+
Follow these steps to enable Azure AD SSO.
6565

6666
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6767
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO** > **Single sign-on**.
@@ -94,7 +94,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9494

9595
### Create an Azure AD test user
9696

97-
In this section, you'll create a test user in the Azure portal called B.Simon.
97+
In this section, you'll create a test user called B.Simon.
9898

9999
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100100
1. Browse to **Identity** > **Users** > **All users**.
@@ -108,7 +108,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
108108

109109
### Assign the Azure AD test user
110110

111-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 123FormBuilder SSO.
111+
In this section, you'll enable B.Simon to use single sign-on by granting access to 123FormBuilder SSO.
112112

113113
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
114114
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO**.
@@ -126,19 +126,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126126

127127
a. In the **Email** textbox, type the email of the user like `[email protected]`.
128128

129-
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded from Azure portal.
129+
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded previously.
130130

131131
c. Click **SUBMIT FORM**.
132132

133133
2. On the **Microsoft Azure AD - Single sign-on - Configure App Settings** perform the following steps:
134134

135135
![Configure Single Sign-On](./media/123formbuilder-tutorial/configuration.png)
136136

137-
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section on Azure portal.
137+
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section.
138138

139-
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section on Azure portal.
139+
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section.
140140

141-
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section on Azure portal.
141+
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section.
142142

143143
### Create 123FormBuilder SSO test user
144144

@@ -150,13 +150,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
150150

151151
#### SP initiated:
152152

153-
* Click on **Test this application** in Azure portal. This will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
153+
* Click on **Test this application**, this will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
154154

155155
* Go to 123FormBuilder SSO Sign-on URL directly and initiate the login flow from there.
156156

157157
#### IDP initiated:
158158

159-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
159+
* Click on **Test this application**, and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
160160

161161
You can also use Microsoft My Apps to test the application in any mode. When you click the 123FormBuilder SSO tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
162162

articles/active-directory/saas-apps/15five-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Before configuring 15Five for automatic user provisioning with Azure AD, you wil
5858

5959
:::image type="content" source="media/15five-provisioning-tutorial/image02.png" alt-text="Screenshot of the S C I M integration page in the 15Five admin console. Generate OAuth token is highlighted." border="false":::
6060

61-
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application in the Azure portal.
61+
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application.
6262

6363
:::image type="content" source="media/15five-provisioning-tutorial/image03.png" alt-text="Screen shot of the S C I M integration page. In the Token table, the values next to S C I M 2.0 base U R L and Access token are highlighted." border="false":::
6464

articles/active-directory/saas-apps/15five-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 15Five with Azure Active Directo
1818

1919
* Control in Azure AD who has access to 15Five.
2020
* Enable your users to be automatically signed-in to 15Five with their Azure AD accounts.
21-
* Manage your accounts in one central location - the Azure portal.
21+
* Manage your accounts in one central location.
2222

2323
## Prerequisites
2424

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 15Five, perform the following steps:
6060

6161
## Configure Azure AD SSO
6262

63-
Follow these steps to enable Azure AD SSO in the Azure portal.
63+
Follow these steps to enable Azure AD SSO.
6464

6565
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6666
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five** > **Single sign-on**.
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878
`https://<COMPANY_NAME>.15five.com/saml2/metadata/`
7979

8080
> [!NOTE]
81-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
8282
8383
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
8484

@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9090

9191
### Create an Azure AD test user
9292

93-
In this section, you'll create a test user in the Azure portal called B.Simon.
93+
In this section, you'll create a test user called B.Simon.
9494

9595
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
9696
1. Browse to **Identity** > **Users** > **All users**.
@@ -104,7 +104,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
104104

105105
### Assign the Azure AD test user
106106

107-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 15Five.
107+
In this section, you'll enable B.Simon to use single sign-on by granting access to 15Five.
108108

109109
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
110110
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five**.
@@ -116,7 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
## Configure 15Five SSO
118118

119-
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
119+
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
120120

121121
### Create 15Five test user
122122

@@ -149,7 +149,7 @@ To enable Azure AD users to log in to 15Five, they must be provisioned into 15Fi
149149

150150
In this section, you test your Azure AD single sign-on configuration with following options.
151151

152-
* Click on **Test this application** in Azure portal. This will redirect to 15Five Sign-on URL where you can initiate the login flow.
152+
* Click on **Test this application**, this will redirect to 15Five Sign-on URL where you can initiate the login flow.
153153

154154
* Go to 15Five Sign-on URL directly and initiate the login flow from there.
155155

articles/active-directory/saas-apps/23video-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn how to integrate 23 Video with Azure Active Direc
1919

2020
* Control in Azure AD who has access to 23 Video.
2121
* Enable your users to be automatically signed-in to 23 Video with their Azure AD accounts.
22-
* Manage your accounts in one central location - the Azure portal.
22+
* Manage your accounts in one central location.
2323

2424
## Prerequisites
2525

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 23 Video, perform the following steps:
6060

6161
## Configure Azure AD SSO
6262

63-
Follow these steps to enable Azure AD SSO in the Azure portal.
63+
Follow these steps to enable Azure AD SSO.
6464

6565
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6666
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **23 Video** application integration page, find the **Manage** section and select **Single sign-on**.
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878
`https://<subdomain>.23video.com`
7979

8080
> [!NOTE]
81-
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [23 Video Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81+
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [23 Video Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
8282

8383
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
8484

@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9090

9191
### Create an Azure AD test user
9292

93-
In this section, you'll create a test user in the Azure portal called B.Simon.
93+
In this section, you'll create a test user called B.Simon.
9494

9595
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
9696
1. Browse to **Identity** > **Users** > **All users**.
@@ -104,7 +104,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
104104

105105
### Assign the Azure AD test user
106106

107-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 23 Video.
107+
In this section, you'll enable B.Simon to use single sign-on by granting access to 23 Video.
108108

109109
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
110110
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **23 Video**.
@@ -116,7 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
## Configure 23 Video SSO
118118

119-
To configure single sign-on on **23 Video** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [23 Video support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119+
To configure single sign-on on **23 Video** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from the application configuration to [23 Video support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
120120

121121
### Create 23 Video test user
122122

@@ -148,7 +148,7 @@ The objective of this section is to create a user called B.Simon in 23 Video.
148148

149149
In this section, you test your Azure AD single sign-on configuration with following options.
150150

151-
* Click on **Test this application** in Azure portal. This will redirect to 23 Video Sign-on URL where you can initiate the login flow.
151+
* Click on **Test this application**, this will redirect to 23 Video Sign-on URL where you can initiate the login flow.
152152

153153
* Go to 23 Video Sign-on URL directly and initiate the login flow from there.
154154

0 commit comments

Comments
 (0)