Skip to content

Commit daf6bfc

Browse files
authored
Merge pull request #235351 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 4/21
2 parents 8b3c38e + 8bb1a87 commit daf6bfc

File tree

106 files changed

+483
-560
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+483
-560
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 2 additions & 244 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/fcm-hub-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with FCM HUB'
2+
title: 'Tutorial: Azure Active Directory SSO integration with FCM HUB'
33
description: Learn how to configure single sign-on between Azure Active Directory and FCM HUB.
44
services: active-directory
55
author: jeevansd
@@ -9,13 +9,13 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with FCM HUB
16+
# Tutorial: Azure Active Directory SSO integration with FCM HUB
1717

18-
In this tutorial, you'll learn how to integrate FCM HUB with Azure Active Directory (Azure AD). When you integrate FCM HUB with Azure AD, you can:
18+
In this tutorial, you learn how to integrate FCM HUB with Azure Active Directory (Azure AD). When you integrate FCM HUB with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to FCM HUB.
2121
* Enable your users to be automatically signed-in to FCM HUB with their Azure AD accounts.
@@ -91,7 +91,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9191
- **Source Attribute**: PortalID, value provided by FCM
9292

9393
1. In the **SAML Signing Certificate** section, use the edit option to select or enter the following settings, and then select **Save**:
94-
- **Signing Option**: Sign SAML response
94+
- **Signing Option**: Sign SAML response and Assertion
9595
- **Signing Algorithm**: SHA-256
9696

9797
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.

articles/active-directory/saas-apps/hashicorp-cloud-platform-hcp-tutorial.md

Lines changed: 7 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/06/2023
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414

1515
---
1616

1717
# Azure Active Directory SSO integration with HashiCorp Cloud Platform (HCP)
1818

19-
In this article, you learn how to integrate HashiCorp Cloud Platform (HCP) with Azure Active Directory (Azure AD). HashiCorp Cloud platform hosting managed services of the developer tools created by HashiCorp, such Terraform, Vault, Boundary, and Consul. When you integrate HashiCorp Cloud Platform (HCP) with Azure AD, you can:
19+
In this article, you learn how to integrate HashiCorp Cloud Platform (HCP) with Azure Active Directory (Azure AD). HashiCorp Cloud Platform hosting managed services of the developer tools created by HashiCorp, such Terraform, Vault, Boundary, and Consul. When you integrate HashiCorp Cloud Platform (HCP) with Azure AD, you can:
2020

2121
* Control in Azure AD who has access to HashiCorp Cloud Platform (HCP).
2222
* Enable your users to be automatically signed-in to HashiCorp Cloud Platform (HCP) with their Azure AD accounts.
@@ -31,7 +31,7 @@ To integrate Azure Active Directory with HashiCorp Cloud Platform (HCP), you nee
3131
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3232
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3333
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34-
* HashiCorp Cloud Platform (HCP) single sign-on (SSO) enabled subscription.
34+
* HashiCorp Cloud Platform (HCP) single sign-on (SSO) enabled organization.
3535

3636
## Add application and assign a test user
3737

@@ -69,7 +69,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6969
`https://portal.cloud.hashicorp.com/sign-in?conn-id=HCP-SSO-<HCP_ORG_ID>-samlp`
7070

7171
> [!NOTE]
72-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
72+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. These values are also pregenerated for you on the "Setup SAML SSO" page within your Organization settings in HashiCorp Cloud Platform (HCP). For more information SAML documentation is provided on [HashiCorp's Developer site](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad). Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) for any questions about this process. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
7373
7474
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
7575

@@ -81,26 +81,17 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
8181

8282
## Configure HashiCorp Cloud Platform (HCP) SSO
8383

84-
To configure single sign-on on **HashiCorp Cloud Platform (HCP)** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [HashiCorp Cloud Platform (HCP) support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
85-
86-
### Create HashiCorp Cloud Platform (HCP) test user
87-
88-
In this section, you create a user called Britta Simon at HashiCorp Cloud Platform (HCP). Work with [HashiCorp Cloud Platform (HCP) support team](mailto:[email protected]) to add the users in the HashiCorp Cloud Platform (HCP) platform. Users must be created and activated before you use single sign-on.
84+
To configure single sign-on on the **HashiCorp Cloud Platform (HCP)** side, you need to add a verification record TXT to your domain host, add the downloaded **Certificate (Base64)** and **Login URL** copied from Azure portal to your HashiCorp Cloud Platform (HCP) Organization "Setup SAML SSO" page. Please refer to the SAML documentation that is provided on [HashiCorp's Developer site](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad). Contact [HashiCorp Cloud Platform (HCP) Client support team](mailto:[email protected]) for any questions about this process.
8985

9086
## Test SSO
9187

92-
In this section, you test your Azure AD single sign-on configuration with following options.
93-
94-
* Click on **Test this application** in Azure portal. This will redirect to HashiCorp Cloud Platform (HCP) Sign-on URL where you can initiate the login flow.
95-
96-
* Go to HashiCorp Cloud Platform (HCP) Sign-on URL directly and initiate the login flow from there.
97-
98-
* You can use Microsoft My Apps. When you select the HashiCorp Cloud Platform (HCP) tile in the My Apps, this will redirect to HashiCorp Cloud Platform (HCP) Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
88+
In the previous [Create and assign Azure AD test user](#create-and-assign-azure-ad-test-user) section, you created a user called B.Simon and assigned it to the HashiCorp Cloud Platform (HCP) app within the Azure Portal. This can now be used for testing the SSO connection. You may also use any account that is already associated with the HashiCorp Cloud Platform (HCP) app in the Azure Portal.
9989

10090
## Additional resources
10191

10292
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
10393
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
94+
* [HashiCorp Cloud Platform (HCP) | Azure Active Directory SAML SSO Configuration](https://developer.hashicorp.com/hcp/docs/hcp/security/sso/sso-aad).
10495

10596
## Next steps
10697

articles/active-directory/saas-apps/hornbill-tutorial.md

Lines changed: 15 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/19/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Hornbill
@@ -116,37 +116,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
1. In a different web browser window, log in to Hornbill as a Security Administrator.
118118

119-
2. On the Home page, click **System**.
119+
2. On the Home page, click the **Configuration** settings icon at the bottom left of the page.
120120

121-
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/system.png "Hornbill system")
121+
![Screenshot shows the Hornbill system.](./media/hornbill-tutorial/settings.png "Hornbill system")
122122

123-
3. Navigate to **Security**.
123+
3. Navigate to **Platform Configuration**.
124124

125-
![Screenshot shows the Hornbill security.](./media/hornbill-tutorial/security.png "Hornbill security")
125+
![Screenshot shows the Hornbill platform configuration.](./media/hornbill-tutorial/platform-configuration.png "Hornbill security")
126126

127-
4. Click **SSO Profiles**.
127+
4. Click **SSO Profiles** under Security.
128128

129-
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profile.png "Hornbill single")
129+
![Screenshot shows the Hornbill single.](./media/hornbill-tutorial/profiles.png "Hornbill single")
130130

131-
5. On the right side of the page, click on **Add logo**.
131+
5. On the right side of the page, click on **+ Create New Profile**.
132132

133-
![Screenshot shows to add the logo.](./media/hornbill-tutorial/add-logo.png "Hornbill add")
133+
![Screenshot shows to add the logo.](./media/hornbill-tutorial/create-new-profile.png "Hornbill create")
134134

135-
6. On the **Profile Details** bar, click on **Import SAML Meta logo**.
135+
6. On the **Profile Details** bar, click on the **Import IDP Meta Data** button.
136136

137-
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/logo.png "Hornbill logo")
137+
![Screenshot shows Hornbill Meta logo.](./media/hornbill-tutorial/import-metadata.png "Hornbill logo")
138138

139-
7. On the Pop-up page in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
139+
7. On the pop-up, in the **URL** text box, paste the **App Federation Metadata Url**, which you have copied from Azure portal and click **Process**.
140140

141-
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/process.png "Hornbill process")
141+
![Screenshot shows Hornbill process.](./media/hornbill-tutorial/metadata-url.png "Hornbill process")
142142

143143
8. After clicking process the values get auto populated automatically under **Profile Details** section.
144144

145-
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/page.png "Hornbill profile")
146-
147-
![Screenshot shows Hornbill details.](./media/hornbill-tutorial/services.png "Hornbill details")
148-
149-
![Screenshot shows Hornbill certificate.](./media/hornbill-tutorial/details.png "Hornbill certificate")
145+
![Screenshot shows Hornbill profile](./media/hornbill-tutorial/profile-details.png "Hornbill profile")
150146

151147
9. Click **Save Changes**.
152148

@@ -155,7 +151,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
155151
In this section, a user called Britta Simon is created in Hornbill. Hornbill supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Hornbill, a new one is created after authentication.
156152

157153
> [!Note]
158-
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
154+
> If you need to create a user manually, contact [Hornbill Client support team](https://www.hornbill.com/support/?request/).
159155
160156
## Test SSO
161157

60.5 KB
Loading
11.8 KB
Loading
20.1 KB
Loading
59.6 KB
Loading
71.5 KB
Loading
56.1 KB
Loading

0 commit comments

Comments
 (0)