You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/moveittransfer-tutorial.md
+21-22Lines changed: 21 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory integration with MOVEit Transfer - Azure AD integration | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with MOVEit Transfer - Azure AD integration'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and MOVEit Transfer - Azure AD integration.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 01/27/2021
12
+
ms.date: 01/19/2022
13
13
ms.author: jeedes
14
14
---
15
-
# Tutorial: Azure Active Directory integration with MOVEit Transfer - Azure AD integration
15
+
# Tutorial: Azure AD SSO integration with MOVEit Transfer - Azure AD integration
16
16
17
17
In this tutorial, you'll learn how to integrate MOVEit Transfer - Azure AD integration with Azure Active Directory (Azure AD). When you integrate MOVEit Transfer - Azure AD integration with Azure AD, you can:
18
18
@@ -31,7 +31,7 @@ To get started, you need the following items:
31
31
32
32
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
33
33
34
-
* MOVEit Transfer - Azure AD integration supports **SP** initiated SSO
34
+
* MOVEit Transfer - Azure AD integration supports **SP** initiated SSO.
35
35
36
36
## Add MOVEit Transfer - Azure AD integration from the gallery
37
37
@@ -57,7 +57,7 @@ To configure and test Azure AD SSO with MOVEit Transfer - Azure AD integration,
57
57
1.**[Create MOVEit Transfer - Azure AD integration test user](#create-moveit-transfer---azure-ad-integration-test-user)** - to have a counterpart of B.Simon in MOVEit Transfer - Azure AD integration that is linked to the Azure AD representation of user.
58
58
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
59
59
60
-
###Configure Azure AD SSO
60
+
## Configure Azure AD SSO
61
61
62
62
Follow these steps to enable Azure AD SSO in the Azure portal.
63
63
@@ -77,11 +77,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** value gets auto populated in **Basic SAML Configuration** section:
80
+
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** value gets auto populated in **Basic SAML Configuration** section.
81
81
82
-

83
-
84
-
In the **Sign-on URL** text box, type the URL:
82
+
d. In the **Sign-on URL** text box, type the URL:
85
83
`https://contoso.com`
86
84
87
85
> [!NOTE]
@@ -119,42 +117,43 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
119
117
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
120
118
1. In the **Add Assignment** dialog, click the **Assign** button.
121
119
122
-
###Configure MOVEit Transfer - Azure AD integration SSO
120
+
## Configure MOVEit Transfer - Azure AD integration SSO
123
121
124
122
1. Sign on to your MOVEit Transfer tenant as an administrator.
125
123
126
124
2. On the left navigation pane, click **Settings**.
127
125
128
-

126
+

129
127
130
128
3. Click **Single Signon** link, which is under **Security Policies -> User Auth**.
131
129
132
-

130
+

133
131
134
132
4. Click the Metadata URL link to download the metadata document.
* Verify **entityID** matches **Identifier** in the **Basic SAML Configuration** section .
139
-
* Verify **AssertionConsumerService** Location URL matches **REPLY URL** in the **Basic SAML Configuration** section.
136
+
a. Verify **entityID** matches **Identifier** in the **Basic SAML Configuration** section .
137
+
138
+
b. Verify **AssertionConsumerService** Location URL matches **REPLY URL** in the **Basic SAML Configuration** section.
140
139
141
-

140
+
:::image type="content" source="./media/moveittransfer-tutorial/file.png" alt-text="Screenshot of Configure Single Sign-On On App side." lightbox="./media/moveittransfer-tutorial/file.png":::
142
141
143
142
5. Click **Add Identity Provider** button to add a new Federated Identity Provider.
6. Click **Browse...** to select the metadata file which you downloaded from Azure portal, then click **Add Identity Provider** to upload the downloaded file.
@@ -173,7 +172,7 @@ The objective of this section is to create a user called Britta Simon in MOVEit
173
172
>[!NOTE]
174
173
>If you need to create a user manually, you need to contact the [MOVEit Transfer - Azure AD integration Client support team](https://community.ipswitch.com/s/support).
175
174
176
-
###Test SSO
175
+
## Test SSO
177
176
178
177
In this section, you test your Azure AD single sign-on configuration with following options.
179
178
@@ -185,4 +184,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
185
184
186
185
## Next steps
187
186
188
-
Once you configure MOVEit Transfer - Azure AD integration you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
187
+
Once you configure MOVEit Transfer - Azure AD integration you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/navex-one-tutorial.md
+21-18Lines changed: 21 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with NAVEX One | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with NAVEX One'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and NAVEX One.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 01/28/2021
12
+
ms.date: 01/19/2022
13
13
ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with NAVEX One
17
+
# Tutorial: Azure AD SSO integration with NAVEX One
18
18
19
19
In this tutorial, you'll learn how to integrate NAVEX One with Azure Active Directory (Azure AD). When you integrate NAVEX One with Azure AD, you can:
20
20
@@ -33,9 +33,12 @@ To get started, you need the following items:
33
33
34
34
In this tutorial, you configure and test Azure AD SSO in a test environment.
35
35
36
-
* NAVEX One supports **SP** initiated SSO
36
+
* NAVEX One supports **SP** initiated SSO.
37
37
38
-
## Adding NAVEX One from the gallery
38
+
> [!NOTE]
39
+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40
+
41
+
## Add NAVEX One from the gallery
39
42
40
43
To configure the integration of NAVEX One into Azure AD, you need to add NAVEX One from the gallery to your list of managed SaaS apps.
41
44
@@ -46,7 +49,6 @@ To configure the integration of NAVEX One into Azure AD, you need to add NAVEX O
46
49
1. In the **Add from the gallery** section, type **NAVEX One** in the search box.
47
50
1. Select **NAVEX One** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48
51
49
-
50
52
## Configure and test Azure AD SSO for NAVEX One
51
53
52
54
Configure and test Azure AD SSO with NAVEX One using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in NAVEX One.
@@ -70,38 +72,39 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
c. In the **Sign-on URL** text box, type a URL using one of the following patterns:
94
+
95
+
| Sign-on URL |
96
+
|--------------|
97
+
|`https://<CLIENT_KEY>.navexglobal.com`|
98
+
|`https://<CLIENT_KEY>.navexglobal.eu`|
99
+
|
100
+
99
101
> [!NOTE]
100
102
> The Sign-on URL value is not real. Update the value with the actual Sign-on URL. Contact [NAVEX One Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
101
103
102
104
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -146,4 +149,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
146
149
147
150
## Next steps
148
151
149
-
Once you configure NAVEX One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
152
+
Once you configure NAVEX One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments