You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-sms-signin.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,8 @@ To complete this article, you need the following resources and privileges:
38
38
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39
39
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
40
40
*[Azure AD Premium P1 or P2][azuread-licensing]
41
-
*[Microsoft 365 F1 or F3][m365-firstline-workers-licensing]
41
+
*[Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
42
+
*[Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
42
43
43
44
## Limitations
44
45
@@ -159,3 +160,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
@@ -61,12 +61,6 @@ This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filte
61
61
62
62
> [!IMPORTANT]
63
63
> If you have cloned the **In from AD - Group Join** sync rule and have not cloned the **In from AD - Group Common** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
64
-
> 1. During Upgrade, on the configure page, uncheck the option **Start the synchronization process when configuration completes**.
65
-
> 2. Edit cloned join sync rule and add the following two transformations:
66
-
- direct flow `objectGUID` to `sourceAnchorBinary`
67
-
- expression flow `ConvertToBase64([objectGUID])` to `sourceAnchor`
68
-
> 3. Enable the scheduler using `Set-ADSyncScheduler -SyncCycleEnabled $true`
69
-
> If you use mS-DS-ConsistencyGuid as the source anchor, and you have cloned the **In from AD - Group Join** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
70
64
> 1. During Upgrade, uncheck the option **Start the synchronization process when configuration completes**.
71
65
> 2. Edit the cloned join sync rule and add the following two transformations:
72
66
> - Set direct flow `objectGUID` to `sourceAnchorBinary`.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-wildcard.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,8 +46,6 @@ For example: `http(s)://*.adventure-works.com`.
46
46
47
47
While the internal and external URLs can use different domains, as a best practice, they should be same. When publishing the application, you see an error if one of the URLs doesn't have a wildcard.
48
48
49
-
If you have additional applications with different configuration settings, you must publish these exceptions as separate applications to overwrite the defaults set for the wildcard. Applications without a wildcard do always take precedence over wildcard applications. From the configuration perspective, these are "just" regular applications.
50
-
51
49
Creating a wildcard application is based on the same [application publishing flow](application-proxy-add-on-premises-application.md) that is available for all other applications. The only difference is that you include a wildcard in the URLs and potentially the SSO configuration.
In this tutorial, you'll learn how to integrate Profit.co SAML App with Azure Active Directory (Azure AD). When you integrate Profit.co SAML App with Azure AD, you can:
25
25
26
26
* Control in Azure AD who has access to Profit.co SAML App.
27
-
* Enable your users to be automatically signed-in to Profit.co SAML App with their Azure AD accounts.
28
-
* Manage your accounts in one central location - the Azure portal.
27
+
* Enable your users to be automatically signedin to Profit.co SAML App with their Azure AD accounts.
28
+
* Manage your accounts in one central location, the Azure portal.
29
29
30
-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
30
+
To learn more about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
31
31
32
32
## Prerequisites
33
33
@@ -40,100 +40,99 @@ To get started, you need the following items:
40
40
41
41
In this tutorial, you configure and test Azure AD SSO in a test environment.
*Once you configure Profit.co SAML App you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45
+
*After you configure Profit.co SAML App, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in realtime. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46
46
47
-
## Adding Profit.co SAML App from the gallery
47
+
## Add Profit.co SAML App from the gallery
48
48
49
49
To configure the integration of Profit.co SAML App into Azure AD, you need to add Profit.co SAML App from the gallery to your list of managed SaaS apps.
50
50
51
-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
51
+
1. Sign in to the [Azure portal](https://portal.azure.com)by using either a work or school account, or a personal Microsoft account.
52
52
1. On the left navigation pane, select the **Azure Active Directory** service.
53
-
1.Navigate to **Enterprise Applications** and then select **All Applications**.
54
-
1. To add new application, select **New application**.
53
+
1.Go to **Enterprise Applications**, and then select **All Applications**.
54
+
1. To add a new application, select **New application**.
55
55
1. In the **Add from the gallery** section, type **Profit.co SAML App** in the search box.
56
-
1. Select **Profit.co SAML App** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57
-
56
+
1. Select **Profit.co SAML App** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
58
57
59
58
## Configure and test Azure AD single sign-on for Profit.co SAML App
60
59
61
-
Configure and test Azure AD SSO with Profit.co SAML App using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Profit.co SAML App.
60
+
Configure and test Azure AD SSO with Profit.co SAML App by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co SAML App.
62
61
63
-
To configure and test Azure AD SSO with Profit.co SAML App, complete the following building blocks:
62
+
Here are the general steps to configure and test Azure AD SSO with Profit.co SAML App:
64
63
65
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)**- to enable your users to use this feature.
66
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)**- to test Azure AD single sign-on with B.Simon.
67
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)**- to enable B.Simon to use Azure AD single sign-on.
68
-
1.**[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)**- to configure the single sign-on settings on application side.
69
-
1.**[Create Profit.co SAML App test user](#create-profitco-saml-app-test-user)**- to have a counterpart of B.Simon in Profit.co SAML App that is linked to the Azure AD representation of user.
70
-
1.**[Test SSO](#test-sso)**- to verify whether the configuration works.
64
+
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
65
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
66
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
67
+
1.**[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)** to configure the single sign-on settings on the application side.
68
+
1.**[Create Profit.co SAML App test user](#create-a-profitco-saml-app-test-user)** to have a counterpart of B.Simon in Profit.co SAML App. This counterpart is linked to the Azure AD representation of the user.
69
+
1.**[Test SSO](#test-sso)** to verify whether the configuration works.
71
70
72
71
## Configure Azure AD SSO
73
72
74
73
Follow these steps to enable Azure AD SSO in the Azure portal.
75
74
76
-
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section and select**single sign-on**.
75
+
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section. Select**single sign-on**.
77
76
1. On the **Select a single sign-on method** page, select **SAML**.
78
-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
77
+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.

81
80
82
-
1.On the **Basic SAML Configuration** section, the application is pre-configured and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
81
+
1.In the **Basic SAML Configuration** section, the application is preconfigured and the necessary URLs are already prepopulated in Azure. Users need to save the configuration by selecting the **Save** button.
83
82
84
-
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
83
+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, select the **Copy**button. This copies the **App Federation Metadata Url** and saves it on your computer.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password**box.
98
-
1.Click**Create**.
96
+
1. Select the **Show password** check box, and then write down the value that's shown in the **Password**field.
97
+
1.Select**Create**.
99
98
100
99
### Assign the Azure AD test user
101
100
102
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
101
+
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
103
102
104
-
1. In the Azure portal, select **Enterprise Applications**, and then select**All applications**.
103
+
1. In the Azure portal, select **Enterprise Applications** >**All applications**.
105
104
1. In the applications list, select **Profit.co SAML App**.
106
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
105
+
1. In the app's overview page, find the **Manage** section, and select **Users and groups**.
107
106
108
-

107
+

109
108
110
-
1. Select **Add user**, then select**Users and groups**in the **Add Assignment** dialog.
109
+
1. Select **Add user**. In the**Add Assignment**dialog box, select **Users and groups**.
111
110
112
-

111
+

113
112
114
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
115
-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
116
-
1. In the **Add Assignment** dialog, click the **Assign** button.
113
+
1. In the **Users and groups** dialog box, select **B.Simon** from the users list. Then choose the **Select** button at the bottom of the screen.
114
+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Then choose the **Select** button at the bottom of the screen.
115
+
1. In the **Add Assignment** dialog box, select **Assign**.
117
116
118
117
## Configure Profit.co SAML App SSO
119
118
120
-
To configure single sign-on on **Profit.co SAML App** side, you need to send the **App Federation Metadata Url** to [Profit.co SAML App support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119
+
To configure single sign-on on the Profit.co SAML App side, you need to send the App Federation Metadata URL to the [Profit.co SAML App support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
121
120
122
-
### Create Profit.co SAML App test user
121
+
### Create a Profit.co SAML App test user
123
122
124
-
In this section, you create a user called Britta Simon in Profit.co SAML App. Work with [Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. Users must be created and activated before you use single sign-on.
123
+
In this section, you create a user called B.Simon in Profit.co SAML App. Work with the[Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. You can't use single sign-on until you create and activate users.
125
124
126
-
## Test SSO
125
+
## Test SSO
127
126
128
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
127
+
In this section, you test your Azure AD single sign-on configuration by using Access Panel.
129
128
130
-
When you click the Profit.co SAML App tile in the Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
129
+
When you select the Profit.co SAML App tile in Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
131
130
132
131
## Additional resources
133
132
134
-
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
133
+
-[Tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
135
134
136
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
135
+
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
137
136
138
137
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
139
138
@@ -142,4 +141,3 @@ When you click the Profit.co SAML App tile in the Access Panel, you should be au
142
141
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
143
142
144
143
-[How to protect Profit.co SAML App with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
Copy file name to clipboardExpand all lines: articles/active-directory/user-help/my-staff-team-manager.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Managing your team members in My Staff is simple. To start, [go to My Staff](htt
25
25
26
26
If you manage more than one location, when you go to My Staff you must select a location to see the team member who are assigned to the location.
27
27
28
-
If you don't yet have sufficient permissions to access My Staff, you'll see the following message "Oops, seem you're not authorized to see My Staff at this time. Please contact your admin for more information."
28
+
If you don't yet have sufficient permissions to access My Staff, you'll see the following message "Oops, seems you're not authorized to see My Staff at this time. Please contact your admin for more information."
0 commit comments