Skip to content

Commit d6e5e71

Browse files
committed
Update sharepoint-on-premises-tutorial.md
1 parent c9c343b commit d6e5e71

File tree

1 file changed

+32
-32
lines changed

1 file changed

+32
-32
lines changed

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -55,15 +55,16 @@ To add SharePoint on-premises from the gallery, perform the following steps:
5555

5656
4. In the search box, type **SharePoint on-premises**, select **SharePoint on-premises** from result panel.
5757

58-
[!div class="mx-imgBorder"]
59-
![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/search-new-app.png)
58+
> [!div class="mx-imgBorder"]
59+
> ![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/search-new-app.png)
6060
6161
1. Specify a name for your SharePoint OnPrem and click the **Add** button to add the application.
6262

6363
1. In the new Enterprise Application click on Properties and check the value for **User assignment required**
6464

65-
[!div class="mx-imgBorder"]
66-
![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/user-assignment-required.png)
65+
> [!div class="mx-imgBorder"]
66+
> ![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/user-assignment-required.png)
67+
6768
in our scenario this value is set to **No**.
6869

6970
## Configure and test Azure AD
@@ -96,8 +97,8 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
9697

9798
4. On the **Basic SAML Configuration** section, perform the following steps:
9899

99-
[!div class="mx-imgBorder"]
100-
![SharePoint on-premises Domain and URLs single sign-on information](./media/sharepoint-on-premises-tutorial/sp-identifier-reply.png)
100+
> [!div class="mx-imgBorder"]
101+
> ![SharePoint on-premises Domain and URLs single sign-on information](./media/sharepoint-on-premises-tutorial/sp-identifier-reply.png)
101102
102103
1. In the **Identifier** box, type a URL using the following pattern:
103104
`urn:<sharepointFarmName>:<federationName>`
@@ -114,8 +115,8 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
114115

115116
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
116117

117-
[!div class="mx-imgBorder"]
118-
![The Certificate download link](./media/sharepoint-on-premises-tutorial/certificatebase64.png)
118+
> [!div class="mx-imgBorder"]
119+
> ![The Certificate download link](./media/sharepoint-on-premises-tutorial/certificatebase64.png)
119120

120121
6. On the **Set up SharePoint on-premises** section, copy the appropriate URL(s) as per your requirement.
121122

@@ -163,8 +164,8 @@ To configure Azure AD single sign-on with SharePoint on-premises, perform the fo
163164
164165
d. Click **OK**.
165166
166-
[!div class="mx-imgBorder"]
167-
![Configuring your authentication provider](./media/sharepoint-on-premises-tutorial/config-auth-provider.png)
167+
> [!div class="mx-imgBorder"]
168+
> ![Configuring your authentication provider](./media/sharepoint-on-premises-tutorial/config-auth-provider.png)
168169
169170
### Create an Azure AD test user in the Azure portal
170171
@@ -182,8 +183,8 @@ The objective of this section is to create a test user in the Azure portal.
182183
b. In the **User name** field type `[email protected]`
183184
For example, [email protected]
184185
185-
[!div class="mx-imgBorder"]
186-
![The User dialog box](./media/sharepoint-on-premises-tutorial/user-properties.png)
186+
> [!div class="mx-imgBorder"]
187+
> ![The User dialog box](./media/sharepoint-on-premises-tutorial/user-properties.png)
187188
188189
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
189190
@@ -199,25 +200,24 @@ The objective of this section is to create a test user in the Azure portal.
199200
200201
3. Fill in **Group type**, **Group name**, **Group description**, **Membership type**. Click on the arrow to select members, then search for or click on the member you will like to add to the group. Click on **Select** to add the selected members, then click on **Create**.
201202
202-
[!div class="mx-imgBorder"]
203-
![Create an Azure AD Security Group](./media/sharepoint-on-premises-tutorial/new-group.png)
203+
> [!div class="mx-imgBorder"]
204+
> ![Create an Azure AD Security Group](./media/sharepoint-on-premises-tutorial/new-group.png)
204205
205206
### Grant permissions to Azure Active Directory account in SharePoint on-premises
206207
207208
To Grant access to the Azure Active Directory User in the on-premise SharePoint you need to share the site collection or add the Azure Active Directory User to one of the site collection's group.Users can now sign into SharePoint 201x using identities from Azure AD, but there are still opportunities for improvement to the user experience. For instance, searching for a user presents multiple search results in the people picker. There is a search result for each of the claims types that are created in the claim mapping. To choose a user using the people picker, you must type their user name exactly and choose the **name** claim result.
208209
209-
[!div class="mx-imgBorder"]
210-
![Claims search results](./media/sharepoint-on-premises-tutorial/claims-search-results.png)
210+
> [!div class="mx-imgBorder"]
211+
> ![Claims search results](./media/sharepoint-on-premises-tutorial/claims-search-results.png)
211212
212213
There is no validation on the values you search for, which can lead to misspellings or users accidentally choosing the wrong claim type. This can prevent users from successfully accessing resources.
213214
214215
**To fix the people picker** with this scenario, there is an open-source solution called [AzureCP](https://yvand.github.io/AzureCP/) that provides a custom claims provider for SharePoint 2013, 2016 and 2019. It will use the Microsoft Graph API to resolve what users enter and perform validation. Learn more at [AzureCP](https://yvand.github.io/AzureCP/).
215216
216217
> [!NOTE]
217-
> without AzureCP you can add Groups by adding the Azure AD group's ID but this is not user's friendly and reliable.
218-
There is how it looks:
219-
[!div class="mx-imgBorder"]
220-
![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/adding-group-by-id.png)
218+
> without AzureCP you can add Groups by adding the Azure AD group's ID but this is not user's friendly and reliable. There is how it looks:
219+
> [!div class="mx-imgBorder"]
220+
> ![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/adding-group-by-id.png)
221221
222222
### Grant permissions to Azure AD group in SharePoint on-premises
223223
@@ -240,8 +240,8 @@ To grant access to the Azure Active Directory Security Group in the on-premise S
240240
241241
1. Browse to the SharePoint Site Collection, under Site Settings for the Site Collection, click on "People and groups". Select the SharePoint group then click on New, "Add Users to this Group" and start to type the name of your group the People Picker will display the Azure Active Directory Security Group.
242242
243-
[!div class="mx-imgBorder"]
244-
![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/permission-azure-ad-group.png)
243+
> [!div class="mx-imgBorder"]
244+
>![Add AAD group to Sharepoint Group](./media/sharepoint-on-premises-tutorial/permission-azure-ad-group.png)
245245
246246
### Grant access to a Guest account to SharePoint on-premises in the Azure portal
247247
@@ -255,13 +255,13 @@ it's now possible to grant access to your SharePoint Site to a Guest Account in
255255
256256
1. Change the **Source Attribute** Property to the value **user.localuserprincipalname** and **save**.
257257
258-
[!div class="mx-imgBorder"]
259-
![User Attributes & Claims initial](./media/sharepoint-on-premises-tutorial/manage-claim.png)
258+
> [!div class="mx-imgBorder"]
259+
>![User Attributes & Claims initial](./media/sharepoint-on-premises-tutorial/manage-claim.png)
260260
261261
1. Using ribbon go back to **SAML-based Sign-on** now the **User Attributes & Claims** section would look like this :
262262
263-
[!div class="mx-imgBorder"]
264-
![User Attributes & Claims final](./media/sharepoint-on-premises-tutorial/user-attributes-claims-final.png)
263+
> [!div class="mx-imgBorder"]
264+
>![User Attributes & Claims final](./media/sharepoint-on-premises-tutorial/user-attributes-claims-final.png)
265265
266266
> [!NOTE]
267267
> Surname and Given name are not required in this setup.
@@ -274,8 +274,8 @@ it's now possible to grant access to your SharePoint Site to a Guest Account in
274274
275275
1. You can now share the site with [email protected] and permit this user to access it.
276276
277-
[!div class="mx-imgBorder"]
278-
![Sharing Site with Guest Account](./media/sharepoint-on-premises-tutorial/sharing-guest-account.png)
277+
> [!div class="mx-imgBorder"]
278+
>![Sharing Site with Guest Account](./media/sharepoint-on-premises-tutorial/sharing-guest-account.png)
279279
280280
### Configuring the trusted identity provider for multiple web applications
281281
@@ -285,13 +285,13 @@ The configuration works for a single web application, but needs additional confi
285285
286286
2. In the page **Set up Single Sign-On with SAM**, edit the **Basic SAML Configuration**.
287287
288-
[!div class="mx-imgBorder"]
289-
![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/add-reply-url.png)
288+
> [!div class="mx-imgBorder"]
289+
>![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/add-reply-url.png)
290290
291291
3. In **Reply URL (Assertion Consumer Service URL)** add the URL for the additional web applications and click **Save**.
292292
293-
[!div class="mx-imgBorder"]
294-
![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/reply-url-for-web-application.png)
293+
> [!div class="mx-imgBorder"]
294+
>![edit Basic SAML Configuration](./media/sharepoint-on-premises-tutorial/reply-url-for-web-application.png)
295295
296296
4. On the SharePoint server, open the **SharePoint 201x Management Shell** and execute the following commands, using the name of the trusted identity token issuer that you used previously.
297297
```

0 commit comments

Comments
 (0)