Skip to content

Commit dfdfc48

Browse files
Merge pull request #252127 from MicrosoftGuyJFlo/BulkSaaSAppsNavigationUpdate
[Microsoft Entra] BULK Saas App step updates
2 parents 8846435 + 167be51 commit dfdfc48

File tree

1,751 files changed

+23312
-23196
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,751 files changed

+23312
-23196
lines changed

articles/active-directory/saas-apps/10000ftplans-tutorial.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,8 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
3838

3939
To configure the integration of 10,000ft Plans into Azure AD, you need to add 10,000ft Plans from the gallery to your list of managed SaaS apps.
4040

41-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
42-
1. On the left navigation pane, select the **Azure Active Directory** service.
43-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
44-
1. To add new application, select **New application**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
4543
1. In the **Add from the gallery** section, type **10,000ft Plans** in the search box.
4644
1. Select **10,000ft Plans** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4745

@@ -64,13 +62,14 @@ To configure and test Azure AD SSO with 10,000ft Plans, perform the following st
6462

6563
Follow these steps to enable Azure AD SSO in the Azure portal.
6664

67-
1. In the Azure portal, on the **10,000ft Plans** application integration page, find the **Manage** section and select **single sign-on**.
65+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
66+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans** > **Single sign-on**.
6867
1. On the **Select a single sign-on method** page, select **SAML**.
6968
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7069

7170
![Edit Basic SAML Configuration](common/edit-urls.png)
7271

73-
4. On the **Basic SAML Configuration** section, perform the following steps:
72+
1. On the **Basic SAML Configuration** section, perform the following steps:
7473

7574
a. In the **Identifier (Entity ID)** text box, type the URL:
7675
`https://rm.smartsheet.com/saml/metadata`
@@ -89,20 +88,22 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8988

9089
In this section, you'll create a test user in the Azure portal called B.Simon.
9190

92-
1.In the Azure portal, in the **Azure services** pane, select **Users**, and then select **All users**.
93-
1. Select **New user** at the top of the screen.
91+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
92+
1. Browse to **Identity** > **Users** > **All users**.
93+
1. Select **New user** > **Create new user**, at the top of the screen.
9494
1. In the **User** properties, follow these steps:
95-
1. In the **Name** field, enter `B.Simon`.
96-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
95+
1. In the **Display name** field, enter `B.Simon`.
96+
1. In the **User principal name** field, enter the [email protected]. For example, `[email protected]`.
9797
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
98-
1. Click **Create**.
98+
1. Select **Review + create**.
99+
1. Select **Create**.
99100

100101
### Assign the Azure AD test user
101102

102103
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 10,000ft Plans.
103104

104-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
105-
1. In the applications list, select **10,000ft Plans**.
105+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans**.
106107
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
107108
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
108109
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.

articles/active-directory/saas-apps/123formbuilder-tutorial.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -39,10 +39,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
3939

4040
To configure the integration of 123FormBuilder SSO into Azure AD, you need to add 123FormBuilder SSO from the gallery to your list of managed SaaS apps.
4141

42-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
43-
1. On the left navigation pane, select the **Azure Active Directory** service.
44-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
45-
1. To add new application, select **New application**.
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
43+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
4644
1. In the **Add from the gallery** section, type **123FormBuilder SSO** in the search box.
4745
1. Select **123FormBuilder SSO** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4846

@@ -65,13 +63,14 @@ To configure and test Azure AD SSO with 123FormBuilder SSO, perform the followin
6563

6664
Follow these steps to enable Azure AD SSO in the Azure portal.
6765

68-
1. In the Azure portal, on the **123FormBuilder SSO** application integration page, find the **Manage** section and select **single sign-on**.
66+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
67+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO** > **Single sign-on**.
6968
1. On the **Select a single sign-on method** page, select **SAML**.
7069
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7170

7271
![Edit Basic SAML Configuration](common/edit-urls.png)
7372

74-
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
73+
1. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
7574

7675
a. In the **Identifier** text box, type a URL using the following pattern: `https://www.123formbuilder.com/saml/azure_ad/<TENANT_ID>/metadata`
7776

@@ -97,25 +96,27 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9796

9897
In this section, you'll create a test user in the Azure portal called B.Simon.
9998

100-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
101-
1. Select **New user** at the top of the screen.
99+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100+
1. Browse to **Identity** > **Users** > **All users**.
101+
1. Select **New user** > **Create new user**, at the top of the screen.
102102
1. In the **User** properties, follow these steps:
103-
1. In the **Name** field, enter `B.Simon`.
104-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
103+
1. In the **Display name** field, enter `B.Simon`.
104+
1. In the **User principal name** field, enter the [email protected]. For example, `[email protected]`.
105105
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
106-
1. Click **Create**.
106+
1. Select **Review + create**.
107+
1. Select **Create**.
107108

108109
### Assign the Azure AD test user
109110

110111
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 123FormBuilder SSO.
111112

112-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113-
1. In the applications list, select **123FormBuilder SSO**.
114-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
117-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
118-
1. In the **Add Assignment** dialog, click the **Assign** button.
113+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
114+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO**.
115+
1. In the app's overview page, select **Users and groups**.
116+
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
117+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
118+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
119+
1. In the **Add Assignment** dialog, click the **Assign** button.
119120

120121
## Configure 123FormBuilder SSO
121122

articles/active-directory/saas-apps/15five-provisioning-tutorial.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,11 +80,12 @@ This section guides you through the steps to configure the Azure AD provisioning
8080

8181
### To configure automatic user provisioning for 15Five in Azure AD:
8282

83-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
83+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
84+
1. Browse to **Identity** > **Applications** > **Enterprise applications**
8485

8586
![Enterprise applications blade](common/enterprise-applications.png)
8687

87-
2. In the applications list, select **15Five**.
88+
1. In the applications list, select **15Five**.
8889

8990
![The 15Five link in the Applications list](common/all-applications.png)
9091

articles/active-directory/saas-apps/15five-tutorial.md

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,8 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
3838

3939
To configure the integration of 15Five into Azure AD, you need to add 15Five from the gallery to your list of managed SaaS apps.
4040

41-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
42-
1. On the left navigation pane, select the **Azure Active Directory** service.
43-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
44-
1. To add new application, select **New application**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
4543
1. In the **Add from the gallery** section, type **15Five** in the search box.
4644
1. Select **15Five** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4745

@@ -64,13 +62,14 @@ To configure and test Azure AD SSO with 15Five, perform the following steps:
6462

6563
Follow these steps to enable Azure AD SSO in the Azure portal.
6664

67-
1. In the Azure portal, on the **15Five** application integration page, find the **Manage** section and select **single sign-on**.
65+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
66+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five** > **Single sign-on**.
6867
1. On the **Select a single sign-on method** page, select **SAML**.
6968
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7069

7170
![Edit Basic SAML Configuration](common/edit-urls.png)
7271

73-
4. On the **Basic SAML Configuration** section, perform the following steps:
72+
1. On the **Basic SAML Configuration** section, perform the following steps:
7473

7574
a. In the **Sign on URL** text box, type a URL using the following pattern:
7675
`https://<COMPANY_NAME>.15five.com`
@@ -81,37 +80,39 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8180
> [!NOTE]
8281
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8382
84-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
83+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
8584

8685
![The Certificate download link](common/metadataxml.png)
8786

88-
6. On the **Set up 15Five** section, copy the appropriate URL(s) as per your requirement.
87+
1. On the **Set up 15Five** section, copy the appropriate URL(s) as per your requirement.
8988

9089
![Copy configuration URLs](common/copy-configuration-urls.png)
9190

9291
### Create an Azure AD test user
9392

9493
In this section, you'll create a test user in the Azure portal called B.Simon.
9594

96-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
97-
1. Select **New user** at the top of the screen.
95+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
96+
1. Browse to **Identity** > **Users** > **All users**.
97+
1. Select **New user** > **Create new user**, at the top of the screen.
9898
1. In the **User** properties, follow these steps:
99-
1. In the **Name** field, enter `B.Simon`.
100-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
99+
1. In the **Display name** field, enter `B.Simon`.
100+
1. In the **User principal name** field, enter the [email protected]. For example, `[email protected]`.
101101
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
102-
1. Click **Create**.
102+
1. Select **Review + create**.
103+
1. Select **Create**.
103104

104105
### Assign the Azure AD test user
105106

106107
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 15Five.
107108

108-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
109-
1. In the applications list, select **15Five**.
110-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
111-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
112-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
113-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
114-
1. In the **Add Assignment** dialog, click the **Assign** button.
109+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
110+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five**.
111+
1. In the app's overview page, select **Users and groups**.
112+
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
113+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
114+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
115+
1. In the **Add Assignment** dialog, click the **Assign** button.
115116

116117
## Configure 15Five SSO
117118

0 commit comments

Comments
 (0)