You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tutorial: Azure Active Directory integration with GitHub
23
21
24
-
In this tutorial, you learn how to integrate GitHub with Azure Active Directory (Azure AD).
25
-
Integrating GitHub with Azure AD provides you with the following benefits:
22
+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with GitHub
26
23
27
-
* You can control in Azure AD who has access to GitHub.
28
-
* You can enable your users to be automatically signed-in to GitHub (Single Sign-On) with their Azure AD accounts.
29
-
* You can manage your accounts in one central location - the Azure portal.
24
+
In this tutorial, you'll learn how to integrate GitHub with Azure Active Directory (Azure AD). When you integrate GitHub with Azure AD, you can:
30
25
31
-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32
-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
26
+
* Control in Azure AD who has access to GitHub.
27
+
* Enable your users to be automatically signed-in to GitHub with their Azure AD accounts.
28
+
* Manage your accounts in one central location - the Azure portal.
29
+
30
+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
33
31
34
32
## Prerequisites
35
33
@@ -45,66 +43,46 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
45
43
* GitHub supports **SP** initiated SSO
46
44
47
45
* GitHub supports [**Automated** user provisioning](github-provisioning-tutorial.md)
46
+
* Once you configure the GitHub you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
48
47
49
48
## Adding GitHub from the gallery
50
49
51
50
To configure the integration of GitHub into Azure AD, you need to add GitHub from the gallery to your list of managed SaaS apps.
52
51
53
-
**To add GitHub from the gallery, perform the following steps:**
54
-
55
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
56
-
57
-

58
-
59
-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
3. To add new application, click **New application** button on the top of dialog.
64
-
65
-

66
-
67
-
4. In the search box, type **GitHub**, select **GitHub.com** from result panel then click **Add** button to add the application.
68
-
69
-

70
-
71
-
## Configure and test Azure AD single sign-on
72
-
73
-
In this section, you configure and test Azure AD single sign-on with GitHub based on a test user called **Britta Simon**.
74
-
For single sign-on to work, a link relationship between an Azure AD user and the related user in GitHub needs to be established.
75
-
76
-
To configure and test Azure AD single sign-on with GitHub, you need to complete the following building blocks:
77
-
78
-
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
79
-
2.**[Configure GitHub Single Sign-On](#configure-github-single-sign-on)** - to configure the Single Sign-On settings on application side.
80
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
81
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
82
-
5.**[Create GitHub test user](#create-github-test-user)** - to have a counterpart of Britta Simon in GitHub that is linked to the Azure AD representation of user.
83
-
6.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
84
-
85
-
### Configure Azure AD single sign-on
52
+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
53
+
1. On the left navigation pane, select the **Azure Active Directory** service.
54
+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
55
+
1. To add new application, select **New application**.
56
+
1. In the **Add from the gallery** section, type **GitHub** in the search box.
57
+
1. Select **GitHub** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
86
58
87
-
In this section, you enable Azure AD single sign-on in the Azure portal.
88
59
89
-
To configure Azure AD single sign-on with GitHub, perform the following steps:
60
+
## Configure and test Azure AD single sign-on for GitHub
90
61
91
-
1. In the [Azure portal](https://portal.azure.com/), on the **GitHub** application integration page, select **Single sign-on**.
62
+
Configure and test Azure AD SSO with GitHub using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in GitHub.
92
63
93
-

64
+
To configure and test Azure AD SSO with GitHub, complete the following building blocks:
94
65
95
-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
66
+
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
67
+
***[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68
+
***[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
69
+
1.**[Configure GitHub SSO](#configure-github-sso)** - to configure the single sign-on settings on application side.
70
+
***[Create GitHub test user](#create-github-test-user)** - to have a counterpart of B.Simon in GitHub that is linked to the Azure AD representation of user.
71
+
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
1. In the [Azure portal](https://portal.azure.com/), on the **GitHub** application integration page, find the **Manage** section and select **single sign-on**.
78
+
1. On the **Select a single sign-on method** page, select **SAML**.
79
+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
102
80
103
-
4. On the **Basic SAML Configuration** section, perform the following steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
122
+
1. Click **Create**.
123
+
124
+
### Assign the Azure AD test user
125
+
126
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to GitHub.
127
+
128
+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
129
+
1. In the applications list, select **GitHub**.
130
+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
131
+
132
+

133
+
134
+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
135
+
136
+

137
+
138
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
139
+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140
+
1. In the **Add Assignment** dialog, click the **Assign** button.
141
+
142
+
## Configure GitHub SSO
135
143
136
144
1. In a different web browser window, log into your GitHub organization site as an administrator.
137
145
@@ -166,57 +174,6 @@ To configure Azure AD single sign-on with GitHub, perform the following steps:
166
174
> [!NOTE]
167
175
> Single sign-on in GitHub authenticates to a specific organization in GitHub and does not replace the authentication of GitHub itself. Therefore, if the user's github.com session has expired, you may be asked to authenticate with GitHub's ID/password during the single sign-on process.
168
176
169
-
### Create an Azure AD test user
170
-
171
-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
172
-
173
-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
174
-
175
-

176
-
177
-
2. Select **New user** at the top of the screen.
178
-
179
-

180
-
181
-
3. In the User properties, perform the following steps.
182
-
183
-

184
-
185
-
a. In the **Name** field enter **BrittaSimon**.
186
-
187
-
b. In the **User name** field type **brittasimon\@yourcompanydomain.extension**
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
215
-
216
-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
217
-
218
-
7. In the **Add Assignment** dialog click the **Assign** button.
219
-
220
177
### Create GitHub test user
221
178
222
179
The objective of this section is to create a user called Britta Simon in GitHub. GitHub supports automatic user provisioning, which is by default enabled. You can find more details [here](github-provisioning-tutorial.md) on how to configure automatic user provisioning.
@@ -246,16 +203,22 @@ The objective of this section is to create a user called Britta Simon in GitHub.
246
203
> [!NOTE]
247
204
> The Azure Active Directory account holder will receive an email and follow a link to confirm their account before it becomes active.
248
205
249
-
###Test single sign-on
206
+
## Test SSO
250
207
251
208
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
252
209
253
210
When you click the GitHub tile in the Access Panel, you should be automatically signed in to the GitHub for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
254
211
255
-
## Additional Resources
212
+
## Additional resources
213
+
214
+
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
215
+
216
+
-[What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
217
+
218
+
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
256
219
257
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
220
+
-[Try GitHub with Azure AD](https://aad.portal.azure.com/)
258
221
259
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
222
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
260
223
261
-
-[What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
224
+
-[How to protect GitHub with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/google-apps-tutorial.md
+5-26Lines changed: 5 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
12
12
ms.subservice: saas-app-tutorial
13
13
ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
-
ms.devlang: na
16
15
ms.topic: tutorial
17
-
ms.date: 09/23/2019
16
+
ms.date: 01/16/2020
18
17
ms.author: jeedes
19
18
20
19
ms.collection: M365-identity-device-management
@@ -85,6 +84,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
85
84
* G Suite supports **SP** initiated SSO
86
85
87
86
* G Suite supports [**Automated** user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/google-apps-provisioning-tutorial)
87
+
* Once you configure the G Suite you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
88
88
89
89
## Adding G Suite from the gallery
90
90
@@ -151,31 +151,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
151
151
152
152
1. Your G Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but G Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
153
153
154
-

154
+

155
155
156
-
1. In the **User Claims** section on the **User Attributes** dialog, edit the claims by using **Edit icon** or add the claims by using **Add new claim** to configure SAML token attribute as shown in the image above and perform the following steps:
157
-
158
-
| Name | Source Attribute |
159
-
| ---------------| --------------- |
160
-
| Unique User Identifier | User.mail |
161
-
162
-
a. Click **Add new claim** to open the **Manage user claims** dialog.
163
-
164
-

165
-
166
-

167
-
168
-
b. In the **Name** textbox, type the attribute name shown for that row.
169
-
170
-
c. Leave the **Namespace** blank.
171
-
172
-
d. Select Source as **Attribute**.
173
-
174
-
e. From the **Source attribute** list, type the attribute value shown for that row.
175
-
176
-
f. Click **Ok**
177
-
178
-
g. Click **Save**.
179
156
180
157
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
181
158
@@ -272,7 +249,9 @@ When you click the G Suite tile in the Access Panel, you should be automatically
272
249
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
273
250
-[Configure User Provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/google-apps-provisioning-tutorial)
274
251
-[Try G Suite with Azure AD](https://aad.portal.azure.com/)
252
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/protect-gsuite)
275
253
254
+
-[How to protect G Suite with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments