Skip to content

Commit dfce707

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into naman-edit2
2 parents a2517bd + acb74a5 commit dfce707

File tree

143 files changed

+1253
-730
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+1253
-730
lines changed
7.23 KB
Loading
63.4 KB
Loading
1.29 KB
Loading
11.4 KB
Loading
7.24 KB
Loading
23.4 KB
Loading
3.8 KB
Loading
24.6 KB
Loading

articles/active-directory/saas-apps/moveittransfer-tutorial.md

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with MOVEit Transfer - Azure AD integration | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with MOVEit Transfer - Azure AD integration'
33
description: Learn how to configure single sign-on between Azure Active Directory and MOVEit Transfer - Azure AD integration.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/27/2021
12+
ms.date: 01/19/2022
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with MOVEit Transfer - Azure AD integration
15+
# Tutorial: Azure AD SSO integration with MOVEit Transfer - Azure AD integration
1616

1717
In this tutorial, you'll learn how to integrate MOVEit Transfer - Azure AD integration with Azure Active Directory (Azure AD). When you integrate MOVEit Transfer - Azure AD integration with Azure AD, you can:
1818

@@ -31,7 +31,7 @@ To get started, you need the following items:
3131

3232
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
3333

34-
* MOVEit Transfer - Azure AD integration supports **SP** initiated SSO
34+
* MOVEit Transfer - Azure AD integration supports **SP** initiated SSO.
3535

3636
## Add MOVEit Transfer - Azure AD integration from the gallery
3737

@@ -57,7 +57,7 @@ To configure and test Azure AD SSO with MOVEit Transfer - Azure AD integration,
5757
1. **[Create MOVEit Transfer - Azure AD integration test user](#create-moveit-transfer---azure-ad-integration-test-user)** - to have a counterpart of B.Simon in MOVEit Transfer - Azure AD integration that is linked to the Azure AD representation of user.
5858
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
5959

60-
### Configure Azure AD SSO
60+
## Configure Azure AD SSO
6161

6262
Follow these steps to enable Azure AD SSO in the Azure portal.
6363

@@ -77,11 +77,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7777

7878
![choose metadata file](common/browse-upload-metadata.png)
7979

80-
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** value gets auto populated in **Basic SAML Configuration** section:
80+
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** value gets auto populated in **Basic SAML Configuration** section.
8181

82-
![MOVEit Transfer - Azure AD integration Domain and URLs single sign-on information](common/sp-identifier-reply.png)
83-
84-
In the **Sign-on URL** text box, type the URL:
82+
d. In the **Sign-on URL** text box, type the URL:
8583
`https://contoso.com`
8684

8785
> [!NOTE]
@@ -119,42 +117,43 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
119117
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
120118
1. In the **Add Assignment** dialog, click the **Assign** button.
121119

122-
### Configure MOVEit Transfer - Azure AD integration SSO
120+
## Configure MOVEit Transfer - Azure AD integration SSO
123121

124122
1. Sign on to your MOVEit Transfer tenant as an administrator.
125123

126124
2. On the left navigation pane, click **Settings**.
127125

128-
![Settings Section On App side](./media/moveittransfer-tutorial/settings.png)
126+
![Settings Section On App side.](./media/moveittransfer-tutorial/settings.png)
129127

130128
3. Click **Single Signon** link, which is under **Security Policies -> User Auth**.
131129

132-
![Security Policies On App side](./media/moveittransfer-tutorial/sso.png)
130+
![Security Policies On App side.](./media/moveittransfer-tutorial/security.png)
133131

134132
4. Click the Metadata URL link to download the metadata document.
135133

136-
![Service Provider Metadata URL](./media/moveittransfer-tutorial/metadata.png)
134+
![Service Provider Metadata URL.](./media/moveittransfer-tutorial/metadata.png)
137135

138-
* Verify **entityID** matches **Identifier** in the **Basic SAML Configuration** section .
139-
* Verify **AssertionConsumerService** Location URL matches **REPLY URL** in the **Basic SAML Configuration** section.
136+
a. Verify **entityID** matches **Identifier** in the **Basic SAML Configuration** section .
137+
138+
b. Verify **AssertionConsumerService** Location URL matches **REPLY URL** in the **Basic SAML Configuration** section.
140139

141-
![Configure Single Sign-On On App side](./media/moveittransfer-tutorial/xml.png)
140+
:::image type="content" source="./media/moveittransfer-tutorial/file.png" alt-text="Screenshot of Configure Single Sign-On On App side." lightbox="./media/moveittransfer-tutorial/file.png":::
142141

143142
5. Click **Add Identity Provider** button to add a new Federated Identity Provider.
144143

145-
![Add Identity Provider](./media/moveittransfer-tutorial/idp.png)
144+
![Add Identity Provider.](./media/moveittransfer-tutorial/provider.png)
146145

147146
6. Click **Browse...** to select the metadata file which you downloaded from Azure portal, then click **Add Identity Provider** to upload the downloaded file.
148147

149-
![SAML Identity Provider](./media/moveittransfer-tutorial/saml.png)
148+
![SAML Identity Provider.](./media/moveittransfer-tutorial/azure.png)
150149

151150
7. Select "**Yes**" as **Enabled** in the **Edit Federated Identity Provider Settings...** page and click **Save**.
152151

153-
![Federated Identity Provider Settings](./media/moveittransfer-tutorial/save.png)
152+
![Federated Identity Provider Settings.](./media/moveittransfer-tutorial/save.png)
154153

155154
8. In the **Edit Federated Identity Provider User Settings** page, perform the following actions:
156155

157-
![Edit Federated Identity Provider Settings](./media/moveittransfer-tutorial/attributes.png)
156+
![Edit Federated Identity Provider Settings.](./media/moveittransfer-tutorial/attributes.png)
158157

159158
a. Select **SAML NameID** as **Login name**.
160159

@@ -173,7 +172,7 @@ The objective of this section is to create a user called Britta Simon in MOVEit
173172
>[!NOTE]
174173
>If you need to create a user manually, you need to contact the [MOVEit Transfer - Azure AD integration Client support team](https://community.ipswitch.com/s/support).
175174
176-
### Test SSO
175+
## Test SSO
177176

178177
In this section, you test your Azure AD single sign-on configuration with following options.
179178

@@ -185,4 +184,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
185184

186185
## Next steps
187186

188-
Once you configure MOVEit Transfer - Azure AD integration you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
187+
Once you configure MOVEit Transfer - Azure AD integration you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/navex-one-tutorial.md

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with NAVEX One | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with NAVEX One'
33
description: Learn how to configure single sign-on between Azure Active Directory and NAVEX One.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/28/2021
12+
ms.date: 01/19/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with NAVEX One
17+
# Tutorial: Azure AD SSO integration with NAVEX One
1818

1919
In this tutorial, you'll learn how to integrate NAVEX One with Azure Active Directory (Azure AD). When you integrate NAVEX One with Azure AD, you can:
2020

@@ -33,9 +33,12 @@ To get started, you need the following items:
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* NAVEX One supports **SP** initiated SSO
36+
* NAVEX One supports **SP** initiated SSO.
3737

38-
## Adding NAVEX One from the gallery
38+
> [!NOTE]
39+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40+
41+
## Add NAVEX One from the gallery
3942

4043
To configure the integration of NAVEX One into Azure AD, you need to add NAVEX One from the gallery to your list of managed SaaS apps.
4144

@@ -46,7 +49,6 @@ To configure the integration of NAVEX One into Azure AD, you need to add NAVEX O
4649
1. In the **Add from the gallery** section, type **NAVEX One** in the search box.
4750
1. Select **NAVEX One** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4851

49-
5052
## Configure and test Azure AD SSO for NAVEX One
5153

5254
Configure and test Azure AD SSO with NAVEX One using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in NAVEX One.
@@ -70,38 +72,39 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7072

7173
![Edit Basic SAML Configuration](common/edit-urls.png)
7274

73-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
74-
75-
a. In the **Sign-on URL** text box, type a URL using one of the following patterns:
76-
77-
| Sign-on URL |
78-
|--------------|
79-
| `https://<CLIENT_KEY>.navexglobal.com` |
80-
| `https://<CLIENT_KEY>.navexglobal.eu` |
81-
|
75+
1. On the **Basic SAML Configuration** section, perform the following steps:
8276

83-
b. In the **Identifier** text box, type one of the following URLs:
77+
a. In the **Identifier** text box, type one of the following URLs:
8478

8579
| Identifier |
8680
|--------------|
8781
| `https://doorman.navexglobal.com/Shibboleth` |
8882
| `https://doorman.navexglobal.eu/Shibboleth` |
8983
|
9084

91-
c. In the **Reply URL** text box, type one of the following URLs:
85+
b. In the **Reply URL** text box, type one of the following URLs:
9286

9387
| Reply URL |
9488
|--------------|
9589
| `https://doorman.navexglobal.com/Shibboleth.sso/SAML2/POST` |
9690
| `https://doorman.navexglobal.eu/Shibboleth.sso/SAML2/POST` |
9791
|
9892

93+
c. In the **Sign-on URL** text box, type a URL using one of the following patterns:
94+
95+
| Sign-on URL |
96+
|--------------|
97+
| `https://<CLIENT_KEY>.navexglobal.com` |
98+
| `https://<CLIENT_KEY>.navexglobal.eu` |
99+
|
100+
99101
> [!NOTE]
100102
> The Sign-on URL value is not real. Update the value with the actual Sign-on URL. Contact [NAVEX One Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
101103

102104
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
103105

104106
![The Certificate download link](common/copy-metadataurl.png)
107+
105108
### Create an Azure AD test user
106109

107110
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -146,4 +149,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
146149

147150
## Next steps
148151

149-
Once you configure NAVEX One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
152+
Once you configure NAVEX One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)