Skip to content

Commit f21e2c7

Browse files
authored
Merge pull request #172180 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 0770a7d + 31c2fdf commit f21e2c7

File tree

130 files changed

+1805
-1870
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+1805
-1870
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16658,6 +16658,11 @@
1665816658
"redirect_url": "https://azure.microsoft.com/pricing/details/azure-defender/",
1665916659
"redirect_document_id": false
1666016660
},
16661+
{
16662+
"source_path_from_root": "/articles/defender-for-iot/organizations/integration-palo-alto.md",
16663+
"redirect_url": "/azure/defender-for-iot/organizations/tutorial-palo-alto",
16664+
"redirect_document_id": false
16665+
},
1666116666
{
1666216667
"source_path_from_root": "/articles/defender-for-iot/organizations/integration-qradar.md",
1666316668
"redirect_url": "/azure/defender-for-iot/organizations/tutorial-qradar",

articles/active-directory/develop/msal-android-handling-exceptions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Errors and exceptions (MSAL Android) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to handle errors and exceptions, Conditional Access, and claims challenges in MSAL Android applications.
55
services: active-directory
6-
author: hamiltonha
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: troubleshooting
1212
ms.workload: identity
1313
ms.date: 08/07/2020
14-
ms.author: hahamil
14+
ms.author: marsma
1515
ms.reviewer: marsma
1616
---
1717

articles/active-directory/develop/msal-android-single-sign-on.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: How to enable cross-app SSO on Android using MSAL | Azure
33
titleSuffix: Microsoft identity platform
44
description: How to use the Microsoft Authentication Library (MSAL) for Android to enable single sign-on across your applications.
55
services: active-directory
6-
author: hamiltonha
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -13,7 +13,7 @@ ms.tgt_pltfrm: android
1313
ms.devlang: java
1414
ms.topic: how-to
1515
ms.date: 10/15/2020
16-
ms.author: hahamil
16+
ms.author: marsma
1717
ms.reviewer: marsma
1818
---
1919

articles/active-directory/develop/msal-net-migration-android-broker.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Migrate Xamarin Android apps using brokers to MSAL.NET
33
titleSuffix: Microsoft identity platform
44
description: Learn how to migrate Xamarin Android apps that use the Microsoft Authenticator or Intune Company Portal from ADAL.NET to MSAL.NET.
5-
author: aiwang
5+
author: mmacy
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.date: 08/31/2020
13-
ms.author: aiwang
13+
ms.author: marsma
1414
ms.reviewer: saeeda
1515
ms.custom: aaddev, has-adal-ref
1616
#Customer intent: As an application developer, I want to learn how to migrate my Xamarin Android applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET.

articles/active-directory/develop/quickstart-v2-angular.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Quickstart: Sign in users in Angular single-page apps - Azure"
33
titleSuffix: Microsoft identity platform
44
description: In this quickstart, you learn how an Angular app can call an API that requires access tokens issued by the Microsoft identity platform.
55
services: active-directory
6-
author: jasonnutter
6+
author: henrymbuguakiarie
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -12,7 +12,8 @@ ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:J
1212
ms.topic: quickstart
1313
ms.workload: identity
1414
ms.date: 03/18/2020
15-
ms.author: janutter
15+
ms.author: henrymbugua
16+
ROBOTS: NOINDEX
1617

1718
#Customer intent: As an app developer, I want to learn how to get access tokens by using the Microsoft identity platform so that my Angular app can sign in users of personal Microsoft accounts, work accounts, or school accounts.
1819
---

articles/active-directory/develop/tutorial-v2-angular.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,17 @@ title: "Tutorial: Create an Angular app that uses the Microsoft identity platfor
33
titleSuffix: Microsoft identity platform
44
description: In this tutorial, you build an Angular single-page app (SPA) that uses the Microsoft identity platform to sign in users and get an access token to call the Microsoft Graph API on their behalf.
55
services: active-directory
6-
author: hamiltonha
6+
author: henrymbuguakiarie
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: tutorial
1212
ms.workload: identity
1313
ms.date: 03/05/2020
14-
ms.author: hahamil
14+
ms.author: henrymbugua
1515
ms.custom: aaddev, identityplatformtop40, devx-track-js
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# Tutorial: Sign in users and call the Microsoft Graph API from an Angular single-page application

articles/active-directory/manage-apps/secure-hybrid-access-integrations.md

Lines changed: 594 additions & 594 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/askspoke-tutorial.md

Lines changed: 26 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/20/2020
12+
ms.date: 08/27/2021
1313
ms.author: jeedes
1414
---
1515

@@ -21,7 +21,6 @@ In this tutorial, you'll learn how to integrate askSpoke with Azure Active Direc
2121
* Enable your users to be automatically signed-in to askSpoke with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
2524

2625
## Prerequisites
2726

@@ -34,18 +33,18 @@ To get started, you need the following items:
3433

3534
In this tutorial, you configure and test Azure AD SSO in a test environment.
3635

37-
* askSpoke supports **SP and IDP** initiated SSO
38-
* askSpoke supports **Just In Time** user provisioning
39-
* Once you configure askSpoke you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
36+
* askSpoke supports **SP and IDP** initiated SSO.
37+
* askSpoke supports **Just In Time** user provisioning.
38+
* askSpoke supports [Automated user provisioning](askspoke-provisioning-tutorial.md).
4039

4140
> [!NOTE]
4241
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
4342
44-
## Adding askSpoke from the gallery
43+
## Add askSpoke from the gallery
4544

4645
To configure the integration of askSpoke into Azure AD, you need to add askSpoke from the gallery to your list of managed SaaS apps.
4746

48-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
47+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4948
1. On the left navigation pane, select the **Azure Active Directory** service.
5049
1. Navigate to **Enterprise Applications** and then select **All Applications**.
5150
1. To add new application, select **New application**.
@@ -56,7 +55,7 @@ To configure the integration of askSpoke into Azure AD, you need to add askSpoke
5655

5756
Configure and test Azure AD SSO with askSpoke using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in askSpoke.
5857

59-
To configure and test Azure AD SSO with askSpoke, complete the following building blocks:
58+
To configure and test Azure AD SSO with askSpoke, perform the following steps:
6059

6160
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6261
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -69,9 +68,9 @@ To configure and test Azure AD SSO with askSpoke, complete the following buildin
6968

7069
Follow these steps to enable Azure AD SSO in the Azure portal.
7170

72-
1. In the [Azure portal](https://portal.azure.com/), on the **askSpoke** application integration page, find the **Manage** section and select **single sign-on**.
71+
1. In the Azure portal, on the **askSpoke** application integration page, find the **Manage** section and select **single sign-on**.
7372
1. On the **Select a single sign-on method** page, select **SAML**.
74-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
73+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7574

7675
![Edit Basic SAML Configuration](common/edit-urls.png)
7776

@@ -126,15 +125,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126125
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
127126
1. In the applications list, select **askSpoke**.
128127
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
129-
130-
![The "Users and groups" link](common/users-groups-blade.png)
131-
132128
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
133-
134-
![The Add User link](common/add-assign-user.png)
135-
136129
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
137-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
130+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
138131
1. In the **Add Assignment** dialog, click the **Assign** button.
139132

140133
## Configure askSpoke SSO
@@ -143,15 +136,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143136

144137
1. Click on **Settings** tab from the left navigation pane.
145138

146-
![askSpoke settings tab](./media/askspoke-tutorial/configure1.png)
139+
![askSpoke settings tab](./media/askspoke-tutorial/configure-1.png)
147140

148141
1. Scroll down to **SSO** and click on **Connect**.
149142

150-
![askSpoke connect](./media/askspoke-tutorial/configure2.png)
143+
![askSpoke connect](./media/askspoke-tutorial/configure-2.png)
151144

152145
1. On the **Enable SAML & SCIM** section, perform the following steps:
153146

154-
![askSpoke Enable SAML & SCIM section](./media/askspoke-tutorial/configure3.png)
147+
![askSpoke Enable SAML & SCIM section](./media/askspoke-tutorial/configure-3.png)
155148

156149
1. In the **Sign-on URL** textbox, paste **Login URL** value, which you have copied from the Azure portal.
157150

@@ -167,20 +160,25 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
167160

168161
In this section, a user called B.Simon is created in askSpoke. askSpoke supports just-in-time provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in askSpoke, a new one is created when you attempt to access askSpoke.
169162

163+
askSpoke also supports automatic user provisioning, you can find more details [here](./askspoke-provisioning-tutorial.md) on how to configure automatic user provisioning.
164+
170165
## Test SSO
171166

172-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
167+
In this section, you test your Azure AD single sign-on configuration with following options.
168+
169+
#### SP initiated:
170+
171+
* Click on **Test this application** in Azure portal. This will redirect to askspoke Sign on URL where you can initiate the login flow.
173172

174-
When you click the askSpoke tile in the Access Panel, you should be automatically signed in to the askSpoke for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
173+
* Go to askspoke Sign-on URL directly and initiate the login flow from there.
175174

176-
## Additional resources
175+
#### IDP initiated:
177176

178-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
177+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the askspoke for which you set up the SSO.
179178

180-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
179+
You can also use Microsoft My Apps to test the application in any mode. When you click the askspoke tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the askspoke for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
181180

182-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
183181

184-
- [Try askSpoke with Azure AD](https://aad.portal.azure.com/)
182+
## Next steps
185183

186-
- [What is session control in Microsoft Cloud App Security?](/cloud-app-security/proxy-intro-aad)
184+
Once you configure askspoke you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/auditboard-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 05/10/2021
12+
ms.date: 08/20/2021
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with AuditBoard
@@ -32,6 +32,7 @@ To configure Azure AD integration with AuditBoard, you need the following items:
3232
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
3333

3434
* AuditBoard supports **SP and IDP** initiated SSO.
35+
* AuditBoard supports [Automated user provisioning](auditboard-provisioning-tutorial.md).
3536

3637
## Add AuditBoard from the gallery
3738

@@ -119,6 +120,8 @@ To configure single sign-on on **AuditBoard** side, you need to send the **App F
119120

120121
In this section, you create a user called Britta Simon in AuditBoard. Work with [AuditBoard support team](mailto:[email protected]) to add the users in the AuditBoard platform. Users must be created and activated before you use single sign-on.
121122

123+
AuditBoard also supports automatic user provisioning, you can find more details [here](./auditboard-provisioning-tutorial.md) on how to configure automatic user provisioning.
124+
122125
## Test SSO
123126

124127
In this section, you test your Azure AD single sign-on configuration with following options.

0 commit comments

Comments
 (0)