Skip to content

Commit e195c50

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into app-articles-batch-22
2 parents 06f3dc9 + f438c2c commit e195c50

File tree

40 files changed

+886
-786
lines changed

40 files changed

+886
-786
lines changed

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/11/2023
11+
ms.date: 04/12/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -57,7 +57,7 @@ This article uses the following terms:
5757

5858
* Target system - The repository of users that the Azure AD provisions to. The Target system is typically a SaaS application such as ServiceNow, Zscaler, and Slack. The target system can also be an on-premises system such as AD.
5959

60-
* [System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers such as Microsoft, and service providers like Salesforce or other SaaS apps that require user identity information.
60+
* [System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers and service providers. Microsoft is an example of an identity provider. Salesforce is an example of a service provider. Service providers require user identity information and an identity provider fulfills that need. SCIM is the mechanism the identity provider and service provider use to send information back and forth.
6161

6262
### Training resources
6363

@@ -128,7 +128,7 @@ When technology projects fail, it's typically because of mismatched expectations
128128

129129
### Plan communications
130130

131-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
131+
Communication is critical to the success of any new service. Proactively communicate to your users about their experience, how the experience is changing, when to expect any change, and how to gain support if they experience issues.
132132

133133
### Plan a pilot
134134

@@ -140,7 +140,7 @@ A pilot allows you to test with a small group before deploying a capability for
140140

141141
In your first wave, target IT, usability, and other appropriate users who can test and provide feedback. Use this feedback to further develop the communications and instructions you send to your users, and to give insights into the types of issues your support staff may see.
142142

143-
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. This can be done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
143+
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. Increasing the scope of the group(s) is done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
144144

145145
## Plan application connections and administration
146146

@@ -150,7 +150,7 @@ Use the Azure portal to view and manage all the applications that support provis
150150

151151
The actual steps required to enable and configure automatic provisioning vary depending on the application. If the application you wish to automatically provision is listed in the [Azure AD SaaS app gallery](../saas-apps/tutorial-list.md), then you should select the [app-specific integration tutorial](../saas-apps/tutorial-list.md) to configure its pre-integrated user provisioning connector.
152152

153-
If not, follow the steps below:
153+
If not, follow the steps:
154154

155155
1. [Create a request](../manage-apps/v2-howto-app-gallery-listing.md) for a pre-integrated user provisioning connector. Our team will work with you and the application developer to onboard your application to our platform if it supports SCIM.
156156

@@ -164,7 +164,7 @@ For more information, see [What applications and systems can I use with Azure AD
164164

165165
Setting up automatic user provisioning is a per-application process. For each application, you need to provide [administrator credentials](../app-provisioning/configure-automatic-user-provisioning-portal.md) to connect to the target system’s user management endpoint.
166166

167-
The image below shows one version of the required admin credentials:
167+
The image shows one version of the required admin credentials:
168168

169169
![Provisioning screen to manage user account provisioning settings](./media/plan-auto-user-provisioning/userprovisioning-admincredentials.png)
170170

@@ -235,7 +235,7 @@ It's common for a security review to be required as part of a deployment. If you
235235

236236
### Plan rollback
237237

238-
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps below can assist you in reverting to a previous known good state:
238+
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps can assist you in reverting to a previous known good state:
239239

240240
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md) to determine what incorrect operations occurred on the affected users and/or groups.
241241

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: "Quickstart: Add sign in to a React SPA"
3+
description: Learn how to run a sample React SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 04/12/2023
14+
---
15+
16+
# Portal quickstart for React SPA
17+
18+
> [!div renderon="portal" class="sxs-lookup"]
19+
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
20+
>
21+
> ## Prerequisites
22+
>
23+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
24+
> * [Node.js](https://nodejs.org/en/download/)
25+
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
26+
>
27+
> ## Download the code
28+
>
29+
> > [!div class="nextstepaction"]
30+
> > [Download the code sample](https://github.com/Azure-Samples/ms-identity-ciam-javascript-tutorial/archive/react-quickstart.zip)
31+
>
32+
> ## Run the sample
33+
>
34+
> 1. Unzip the downloaded file.
35+
>
36+
> 1. Locate the folder that contains the `package.json` file in your terminal, then run the following command:
37+
>
38+
> ```console
39+
> npm install && npm start
40+
> ```
41+
>
42+
> 1. Open your browser and visit `http://locahost:3000`.
43+
>
44+
> 1. Select the **Sign-in** link on the navigation bar.
45+
>

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ The following details relate to the `lastSignInDateTime` property.
5757

5858
- To read the property, you need to grant the app the following Microsoft Graph permissions:
5959
- AuditLog.Read.All
60-
- Directory.Read.All
6160
- User.Read.All
6261

6362
- Each interactive sign-in that was successful results in an update of the underlying data store. Typically, successful sign-ins show up in the related sign-in report within 10 minutes.

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
387387
> | Create user | [User Administrator](permissions-reference.md#user-administrator) | |
388388
> | Delete users | [User Administrator](permissions-reference.md#user-administrator) | |
389389
> | Invalidate refresh tokens of limited admins | [User Administrator](permissions-reference.md#user-administrator) | |
390-
> | Invalidate refresh tokens of non-admins | [Password Administrator](permissions-reference.md#password-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
390+
> | Invalidate refresh tokens of non-admins | [Helpdesk Administrator](permissions-reference.md#helpdesk-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
391391
> | Invalidate refresh tokens of privileged admins | [Privileged Authentication Administrator](permissions-reference.md#privileged-authentication-administrator) | |
392392
> | Read basic configuration | [Default user role](../fundamentals/users-default-permissions.md) | |
393393
> | Reset password for limited admins | [User Administrator](permissions-reference.md#user-administrator) | |

articles/active-directory/saas-apps/cisco-anyconnect.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -72,14 +72,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
![Edit Basic SAML Configuration](common/edit-urls.png)
7474

75-
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields (note that the values are case-sensitive):
75+
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
7676

7777
1. In the **Identifier** text box, type a URL using the following pattern:
7878
`https://<SUBDOMAIN>.YourCiscoServer.com/saml/sp/metadata/<Tunnel_Group_Name>`
7979

8080
1. In the **Reply URL** text box, type a URL using the following pattern:
8181
`https://<YOUR_CISCO_ANYCONNECT_FQDN>/+CSCOE+/saml/sp/acs?tgname=<Tunnel_Group_Name>`
8282

83+
> [!NOTE]
84+
> `<Tunnel_Group_Name>` is a case-sensitive and the value must not contain dots "." and slashes "/".
85+
8386
> [!NOTE]
8487
> For clarification about these values, contact Cisco TAC support. Update these values with the actual Identifier and Reply URL provided by Cisco TAC. Contact the [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8588

articles/active-directory/saas-apps/citi-program-tutorial.md

Lines changed: 23 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/26/2023
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414

1515
---
@@ -46,7 +46,7 @@ Add CITI Program from the Azure AD application gallery to configure single sign-
4646

4747
### Create and assign Azure AD test user
4848

49-
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal.
5050

5151
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5252

@@ -76,17 +76,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
7676

7777
1. CITI Program application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
7878

79-
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Image")
79+
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Default Attributes")
8080

81-
1. In addition to above, CITI Program application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
81+
1. CITI Program application expects urn:oid named attributes to be passed back in the SAML response, which are shown below. These attributes are also pre-populated but you can review them as per your requirements. These are all required.
8282

8383
| Name | Source Attribute|
8484
| ---------------| --------- |
8585
| urn:oid:1.3.6.1.4.1.5923.1.1.1.6 | user.userprincipalname |
86-
| urn:oid:0.9.2342.19200300.100.1.3 | user.userprincipalname |
86+
| urn:oid:0.9.2342.19200300.100.1.3 | user.mail |
8787
| urn:oid:2.5.4.42 | user.givenname |
8888
| urn:oid:2.5.4.4 | user.surname |
8989

90+
1. If you wish to pass additional information in the SAML response, CITI Program can also accept the following optional attributes.
91+
92+
| Name | Source Attribute|
93+
| ---------------| --------- |
94+
| urn:oid:2.16.840.1.113730.3.1.241 | user.displayname |
95+
| urn:oid:2.16.840.1.113730.3.1.3 | user.employeeid |
96+
9097
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9198

9299
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
@@ -97,11 +104,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
97104

98105
## Configure CITI Program SSO
99106

100-
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
101-
102-
### Create CITI Program test user
103-
104-
In this section, a user called B.Simon is created in CITI Program. CITI Program supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in CITI Program, a new one is commonly created after authentication.
107+
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). This is required to have the SAML SSO connection set properly on both sides.
105108

106109
## Test SSO
107110

@@ -113,10 +116,19 @@ In this section, you test your Azure AD single sign-on configuration with follow
113116

114117
* You can use Microsoft My Apps. When you click the CITI Program tile in the My Apps, this will redirect to CITI Program Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
115118

119+
CITI Program supports just-in-time user provisioning. First time SSO users will be prompted to either:
120+
121+
* Link their existing CITI Program account, in the case that they already have one
122+
![SSOHaveAccount](https://user-images.githubusercontent.com/46728557/228357500-a74489c7-8c5f-4cbe-ad47-9757d3d9fbe6.PNG "Link existing CITI Program account")
123+
124+
* Or Create a new CITI Program account, which is automatically provisioned
125+
![SSONotHaveAccount](https://user-images.githubusercontent.com/46728557/228357503-f4eba4bb-f3fa-43e9-a98a-f0da87074eeb.PNG "Provision new CITI Program account")
126+
116127
## Additional resources
117128

129+
* [CITI Program SSO Technical Information](https://support.citiprogram.org/s/article/single-sign-on-sso-and-shibboleth-technical-specs#EntityInformation)
118130
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
119-
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
131+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md)
120132

121133
## Next steps
122134

articles/active-directory/saas-apps/cobalt-tutorial.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -79,7 +79,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979
`https://brightside-prod-<INSTANCENAME>.cobaltdl.com`
8080

8181
> [!NOTE]
82-
> The value is not real. Update the value with the actual Sign-On URL. Contact [Cobalt Client support team](https://www.cobalt.net/support/) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
82+
> The value is not real. Update the value with the actual Sign-On URL. Contact [Cobalt Client support team](https://cobaltio.zendesk.com/hc/requests/new) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8383

8484
5. Cobalt application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
8585

@@ -149,7 +149,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
149149
150150
### Create Cobalt test user
151151

152-
In this section, you create a user called B.Simon in Cobalt. Work with [Cobalt support team](https://www.cobalt.net/support/) to add the users in the Cobalt platform. Users must be created and activated before you use single sign-on.
152+
1. Login to the Cobalt website as an administrator.
153+
1. Navigate to the **People -> Organization** and select Invite Users.
154+
1. In the overlay that appears, specify the email addresses of users that you want to invite. Enter the email, and then select **Add** or press **Enter**.
155+
1. Use commas to separate multiple email addresses.
156+
1. For each user, select a role: **Member** or **Owner**.
157+
1. Both members and owners have access to all assets and pentests of an organization.
158+
1. Select **Invite** to confirm.
153159

154160
## Test SSO
155161

0 commit comments

Comments
 (0)