Skip to content

Commit de0e44e

Browse files
authored
Merge pull request #101368 from v-hagamp/featuredapp5
Product Backlog Item 897190: SaaS App Tutorial: Description Update fo…
2 parents 867fa20 + 3801ddc commit de0e44e

File tree

2 files changed

+79
-137
lines changed

2 files changed

+79
-137
lines changed

articles/active-directory/saas-apps/github-tutorial.md

Lines changed: 74 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,22 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 02/11/2019
16+
ms.date: 01/16/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
2120
---
22-
# Tutorial: Azure Active Directory integration with GitHub
2321

24-
In this tutorial, you learn how to integrate GitHub with Azure Active Directory (Azure AD).
25-
Integrating GitHub with Azure AD provides you with the following benefits:
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with GitHub
2623

27-
* You can control in Azure AD who has access to GitHub.
28-
* You can enable your users to be automatically signed-in to GitHub (Single Sign-On) with their Azure AD accounts.
29-
* You can manage your accounts in one central location - the Azure portal.
24+
In this tutorial, you'll learn how to integrate GitHub with Azure Active Directory (Azure AD). When you integrate GitHub with Azure AD, you can:
3025

31-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
26+
* Control in Azure AD who has access to GitHub.
27+
* Enable your users to be automatically signed-in to GitHub with their Azure AD accounts.
28+
* Manage your accounts in one central location - the Azure portal.
29+
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3331

3432
## Prerequisites
3533

@@ -45,66 +43,46 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
4543
* GitHub supports **SP** initiated SSO
4644

4745
* GitHub supports [**Automated** user provisioning](github-provisioning-tutorial.md)
46+
* Once you configure the GitHub you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4847

4948
## Adding GitHub from the gallery
5049

5150
To configure the integration of GitHub into Azure AD, you need to add GitHub from the gallery to your list of managed SaaS apps.
5251

53-
**To add GitHub from the gallery, perform the following steps:**
54-
55-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
56-
57-
![The Azure Active Directory button](common/select-azuread.png)
58-
59-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
60-
61-
![The Enterprise applications blade](common/enterprise-applications.png)
62-
63-
3. To add new application, click **New application** button on the top of dialog.
64-
65-
![The New application button](common/add-new-app.png)
66-
67-
4. In the search box, type **GitHub**, select **GitHub.com** from result panel then click **Add** button to add the application.
68-
69-
![GitHub in the results list](common/search-new-app.png)
70-
71-
## Configure and test Azure AD single sign-on
72-
73-
In this section, you configure and test Azure AD single sign-on with GitHub based on a test user called **Britta Simon**.
74-
For single sign-on to work, a link relationship between an Azure AD user and the related user in GitHub needs to be established.
75-
76-
To configure and test Azure AD single sign-on with GitHub, you need to complete the following building blocks:
77-
78-
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
79-
2. **[Configure GitHub Single Sign-On](#configure-github-single-sign-on)** - to configure the Single Sign-On settings on application side.
80-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
81-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
82-
5. **[Create GitHub test user](#create-github-test-user)** - to have a counterpart of Britta Simon in GitHub that is linked to the Azure AD representation of user.
83-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
84-
85-
### Configure Azure AD single sign-on
52+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
53+
1. On the left navigation pane, select the **Azure Active Directory** service.
54+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
55+
1. To add new application, select **New application**.
56+
1. In the **Add from the gallery** section, type **GitHub** in the search box.
57+
1. Select **GitHub** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
8658

87-
In this section, you enable Azure AD single sign-on in the Azure portal.
8859

89-
To configure Azure AD single sign-on with GitHub, perform the following steps:
60+
## Configure and test Azure AD single sign-on for GitHub
9061

91-
1. In the [Azure portal](https://portal.azure.com/), on the **GitHub** application integration page, select **Single sign-on**.
62+
Configure and test Azure AD SSO with GitHub using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in GitHub.
9263

93-
![Configure single sign-on link](common/select-sso.png)
64+
To configure and test Azure AD SSO with GitHub, complete the following building blocks:
9465

95-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
66+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
67+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
69+
1. **[Configure GitHub SSO](#configure-github-sso)** - to configure the single sign-on settings on application side.
70+
* **[Create GitHub test user](#create-github-test-user)** - to have a counterpart of B.Simon in GitHub that is linked to the Azure AD representation of user.
71+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
9672

97-
![Single sign-on select mode](common/select-saml-option.png)
73+
## Configure Azure AD SSO
9874

99-
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
75+
Follow these steps to enable Azure AD SSO in the Azure portal.
10076

101-
![Edit Basic SAML Configuration](common/edit-urls.png)
77+
1. In the [Azure portal](https://portal.azure.com/), on the **GitHub** application integration page, find the **Manage** section and select **single sign-on**.
78+
1. On the **Select a single sign-on method** page, select **SAML**.
79+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
10280

103-
4. On the **Basic SAML Configuration** section, perform the following steps:
81+
![Edit Basic SAML Configuration](common/edit-urls.png)
10482

105-
![GitHub Domain and URLs single sign-on information](common/sp-identifier.png)
83+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
10684

107-
a. In the **Sign on URL** text box, type a URL using the following pattern:
85+
a. In the **Sign on URL** text box, type a URL using the following pattern:
10886
`https://github.com/orgs/<entity-id>/sso`
10987

11088
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
@@ -131,7 +109,37 @@ To configure Azure AD single sign-on with GitHub, perform the following steps:
131109

132110
c. Logout URL
133111

134-
### Configure GitHub Single Sign-On
112+
### Create an Azure AD test user
113+
114+
In this section, you'll create a test user in the Azure portal called B.Simon.
115+
116+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
117+
1. Select **New user** at the top of the screen.
118+
1. In the **User** properties, follow these steps:
119+
1. In the **Name** field, enter `B.Simon`.
120+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
121+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
122+
1. Click **Create**.
123+
124+
### Assign the Azure AD test user
125+
126+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to GitHub.
127+
128+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
129+
1. In the applications list, select **GitHub**.
130+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
131+
132+
![The "Users and groups" link](common/users-groups-blade.png)
133+
134+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
135+
136+
![The Add User link](common/add-assign-user.png)
137+
138+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
139+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140+
1. In the **Add Assignment** dialog, click the **Assign** button.
141+
142+
## Configure GitHub SSO
135143

136144
1. In a different web browser window, log into your GitHub organization site as an administrator.
137145

@@ -166,57 +174,6 @@ To configure Azure AD single sign-on with GitHub, perform the following steps:
166174
> [!NOTE]
167175
> Single sign-on in GitHub authenticates to a specific organization in GitHub and does not replace the authentication of GitHub itself. Therefore, if the user's github.com session has expired, you may be asked to authenticate with GitHub's ID/password during the single sign-on process.
168176
169-
### Create an Azure AD test user
170-
171-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
172-
173-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
174-
175-
![The "Users and groups" and "All users" links](common/users.png)
176-
177-
2. Select **New user** at the top of the screen.
178-
179-
![New user Button](common/new-user.png)
180-
181-
3. In the User properties, perform the following steps.
182-
183-
![The User dialog box](common/user-properties.png)
184-
185-
a. In the **Name** field enter **BrittaSimon**.
186-
187-
b. In the **User name** field type **brittasimon\@yourcompanydomain.extension**
188-
For example, [email protected]
189-
190-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
191-
192-
d. Click **Create**.
193-
194-
### Assign the Azure AD test user
195-
196-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to GitHub.
197-
198-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **GitHub**.
199-
200-
![Enterprise applications blade](common/enterprise-applications.png)
201-
202-
2. In the applications list, select **GitHub**.
203-
204-
![The GitHub link in the Applications list](common/all-applications.png)
205-
206-
3. In the menu on the left, select **Users and groups**.
207-
208-
![The "Users and groups" link](common/users-groups-blade.png)
209-
210-
4. Click the **Add user** button, then select **Users and groups** in the **Add Assignment** dialog.
211-
212-
![The Add Assignment pane](common/add-assign-user.png)
213-
214-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
215-
216-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
217-
218-
7. In the **Add Assignment** dialog click the **Assign** button.
219-
220177
### Create GitHub test user
221178

222179
The objective of this section is to create a user called Britta Simon in GitHub. GitHub supports automatic user provisioning, which is by default enabled. You can find more details [here](github-provisioning-tutorial.md) on how to configure automatic user provisioning.
@@ -246,16 +203,22 @@ The objective of this section is to create a user called Britta Simon in GitHub.
246203
> [!NOTE]
247204
> The Azure Active Directory account holder will receive an email and follow a link to confirm their account before it becomes active.
248205
249-
### Test single sign-on
206+
## Test SSO
250207

251208
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
252209

253210
When you click the GitHub tile in the Access Panel, you should be automatically signed in to the GitHub for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
254211

255-
## Additional Resources
212+
## Additional resources
213+
214+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
215+
216+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
217+
218+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
256219

257-
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
220+
- [Try GitHub with Azure AD](https://aad.portal.azure.com/)
258221

259-
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
222+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
260223

261-
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
224+
- [How to protect GitHub with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/google-apps-tutorial.md

Lines changed: 5 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 09/23/2019
16+
ms.date: 01/16/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
@@ -85,6 +84,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
8584
* G Suite supports **SP** initiated SSO
8685

8786
* G Suite supports [**Automated** user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/google-apps-provisioning-tutorial)
87+
* Once you configure the G Suite you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
8888

8989
## Adding G Suite from the gallery
9090

@@ -151,31 +151,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
151151

152152
1. Your G Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but G Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
153153

154-
![image](common/edit-attribute.png)
154+
![image](common/default-attributes.png)
155155

156-
1. In the **User Claims** section on the **User Attributes** dialog, edit the claims by using **Edit icon** or add the claims by using **Add new claim** to configure SAML token attribute as shown in the image above and perform the following steps:
157-
158-
| Name | Source Attribute |
159-
| ---------------| --------------- |
160-
| Unique User Identifier | User.mail |
161-
162-
a. Click **Add new claim** to open the **Manage user claims** dialog.
163-
164-
![image](common/new-save-attribute.png)
165-
166-
![image](common/new-attribute-details.png)
167-
168-
b. In the **Name** textbox, type the attribute name shown for that row.
169-
170-
c. Leave the **Namespace** blank.
171-
172-
d. Select Source as **Attribute**.
173-
174-
e. From the **Source attribute** list, type the attribute value shown for that row.
175-
176-
f. Click **Ok**
177-
178-
g. Click **Save**.
179156

180157
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
181158

@@ -272,7 +249,9 @@ When you click the G Suite tile in the Access Panel, you should be automatically
272249
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
273250
- [Configure User Provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/google-apps-provisioning-tutorial)
274251
- [Try G Suite with Azure AD](https://aad.portal.azure.com/)
252+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/protect-gsuite)
275253

254+
- [How to protect G Suite with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
276255
<!--Image references-->
277256

278257
[10]: ./media/google-apps-tutorial/gapps-security.png

0 commit comments

Comments
 (0)