Skip to content

Commit f723e7d

Browse files
authored
Merge pull request #155530 from bhavana-129/tutorial-to-update-38
Product Backlog Item 1372223: SaaS App Tutorial: TutorialToUpdate38
2 parents 9e2562d + 229f7f1 commit f723e7d

16 files changed

+73
-108
lines changed

articles/active-directory/saas-apps/bamboo-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/12/2021
12+
ms.date: 04/20/2021
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with SAML SSO for Bamboo by resolution GmbH
@@ -24,15 +24,15 @@ In this tutorial, you'll learn how to integrate SAML SSO for Bamboo by resolutio
2424

2525
To configure Azure AD integration with SAML SSO for Bamboo by resolution GmbH, you need the following items:
2626

27-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/)
28-
* SAML SSO for Bamboo by resolution GmbH single sign-on enabled subscription
27+
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
28+
* SAML SSO for Bamboo by resolution GmbH single sign-on enabled subscription.
2929

3030
## Scenario description
3131

3232
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
3333

34-
* SAML SSO for Bamboo by resolution GmbH supports **SP and IDP** initiated SSO
35-
* SAML SSO for Bamboo by resolution GmbH supports **Just In Time** user provisioning
34+
* SAML SSO for Bamboo by resolution GmbH supports **SP and IDP** initiated SSO.
35+
* SAML SSO for Bamboo by resolution GmbH supports **Just In Time** user provisioning.
3636

3737
## Add SAML SSO for Bamboo by resolution GmbH from the gallery
3838

@@ -122,19 +122,19 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
122122

123123
1. On the right side of the main toolbar, click **Settings** > **Add-ons**.
124124

125-
![The Settings](./media/bamboo-tutorial/tutorial_bamboo_setings.png)
125+
![The Settings](./media/bamboo-tutorial/settings.png)
126126

127127
1. Go to SECURITY section, click on **SAML SingleSignOn** on the Menubar.
128128

129-
![The Samlsingle](./media/bamboo-tutorial/tutorial_bamboo_samlsingle.png)
129+
![The Samlsingle](./media/bamboo-tutorial/single-sign-on.png)
130130

131131
1. On the **SAML SIngleSignOn Plugin Configuration page**, click **Add idp**.
132132

133-
![The Add idp](./media/bamboo-tutorial/tutorial_bamboo_addidp.png)
133+
![The Add idp](./media/bamboo-tutorial/configuration.png)
134134

135135
1. On the **Choose your SAML Identity Provider** Page, perform the following steps:
136136

137-
![The identity provider](./media/bamboo-tutorial/tutorial_bamboo_identityprovider.png)
137+
![The identity provider](./media/bamboo-tutorial/identity-provider.png)
138138

139139
a. Select **Idp Type** as **AZURE AD**.
140140

@@ -146,11 +146,11 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
146146

147147
1. On the **Identity provider configuration** page click **Next**.
148148

149-
![The identity config](./media/bamboo-tutorial/tutorial_bamboo_identityconfig.png)
149+
![The identity config](./media/bamboo-tutorial/identity-configuration.png)
150150

151151
1. On the **Import SAML Idp Metadata** Page, click **Load File** to upload the **METADATA XML** file which you have downloaded from Azure portal.
152152

153-
![The idpmetadata](./media/bamboo-tutorial/tutorial_bamboo_idpmetadata.png)
153+
![The idpmetadata](./media/bamboo-tutorial/metadata.png)
154154

155155
1. Click **Next**.
156156

articles/active-directory/saas-apps/fluxxlabs-tutorial.md

Lines changed: 22 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 05/21/2020
12+
ms.date: 04/20/2021
1313
ms.author: jeedes
1414
---
1515

@@ -21,8 +21,6 @@ In this tutorial, you'll learn how to integrate Fluxx Labs with Azure Active Dir
2121
* Enable your users to be automatically signed-in to Fluxx Labs with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25-
2624
## Prerequisites
2725

2826
To get started, you need the following items:
@@ -34,25 +32,24 @@ To get started, you need the following items:
3432

3533
In this tutorial, you configure and test Azure AD SSO in a test environment.
3634

37-
* Fluxx Labs supports **IDP** initiated SSO
38-
* Once you configure Fluxx Labs you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
35+
* Fluxx Labs supports **IDP** initiated SSO.
3936

40-
## Adding Fluxx Labs from the gallery
37+
## Add Fluxx Labs from the gallery
4138

4239
To configure the integration of Fluxx Labs into Azure AD, you need to add Fluxx Labs from the gallery to your list of managed SaaS apps.
4340

44-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
41+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4542
1. On the left navigation pane, select the **Azure Active Directory** service.
4643
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4744
1. To add new application, select **New application**.
4845
1. In the **Add from the gallery** section, type **Fluxx Labs** in the search box.
4946
1. Select **Fluxx Labs** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5047

51-
## Configure and test Azure AD single sign-on for Fluxx Labs
48+
## Configure and test Azure AD SSO for Fluxx Labs
5249

5350
Configure and test Azure AD SSO with Fluxx Labs using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Fluxx Labs.
5451

55-
To configure and test Azure AD SSO with Fluxx Labs, complete the following building blocks:
52+
To configure and test Azure AD SSO with Fluxx Labs, perform the following steps:
5653

5754
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5855
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -65,22 +62,22 @@ To configure and test Azure AD SSO with Fluxx Labs, complete the following build
6562

6663
Follow these steps to enable Azure AD SSO in the Azure portal.
6764

68-
1. In the [Azure portal](https://portal.azure.com/), on the **Fluxx Labs** application integration page, find the **Manage** section and select **single sign-on**.
65+
1. In the Azure portal on the **Fluxx Labs** application integration page, find the **Manage** section and select **single sign-on**.
6966
1. On the **Select a single sign-on method** page, select **SAML**.
70-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
67+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7168

7269
![Edit Basic SAML Configuration](common/edit-urls.png)
7370

7471
1. On the **Set up Single Sign-On with SAML** page, perform the following steps:
7572

76-
a. In the **Identifier** text box, type a URL using the following pattern:
73+
a. In the **Identifier** text box, type a URL using one of the following patterns:
7774

7875
| Environment | URL Pattern|
7976
|-------------|------------|
8077
| Production | `https://<subdomain>.fluxx.io` |
8178
| Pre production | `https://<subdomain>.preprod.fluxxlabs.com`|
8279

83-
b. In the **Reply URL** text box, type a URL using the following pattern:
80+
b. In the **Reply URL** text box, type a URL using one of the following patterns:
8481

8582
| Environment | URL Pattern|
8683
|-------------|------------|
@@ -117,15 +114,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
117114
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
118115
1. In the applications list, select **Fluxx Labs**.
119116
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
120-
121-
![The "Users and groups" link](common/users-groups-blade.png)
122-
123117
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
124-
125-
![The Add User link](common/add-assign-user.png)
126-
127118
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
128-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
119+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
129120
1. In the **Add Assignment** dialog, click the **Assign** button.
130121

131122
## Configure Fluxx Labs SSO
@@ -134,15 +125,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
134125

135126
2. Select **Admin** below the **Settings** section.
136127

137-
![Screenshot that shows the "Settings" section with "Admin" selected.](./media/fluxxlabs-tutorial/config1.png)
128+
![Screenshot that shows the "Settings" section with "Admin" selected.](./media/fluxxlabs-tutorial/configure-1.png)
138129

139130
3. In the Admin Panel, Select **Plug-ins** > **Integrations** and then select **SAML SSO-(Disabled)**
140131

141-
![Screenshot that shows the "Integrations" tab with "S A M L S S O- (Disabled) selected.](./media/fluxxlabs-tutorial/config2.png)
132+
![Screenshot that shows the "Integrations" tab with "S A M L S S O- (Disabled) selected.](./media/fluxxlabs-tutorial/configure-2.png)
142133

143134
4. In the attribute section, perform the following steps:
144135

145-
![Screenshot that shows the "Attributes" section with "S A M L S S O" checked, values entered in fields, and the "Save" button selected.](./media/fluxxlabs-tutorial/config3.png)
136+
![Screenshot that shows the "Attributes" section with "S A M L S S O" checked, values entered in fields, and the "Save" button selected.](./media/fluxxlabs-tutorial/configure-3.png)
146137

147138
a. Select the **SAML SSO** checkbox.
148139

@@ -175,36 +166,28 @@ To enable Azure AD users to sign in to Fluxx Labs, they must be provisioned into
175166

176167
2. Click on the below displayed **icon**.
177168

178-
![Screenshot that shows administrator options with the "Plus" icon selected under "Your Dashboard is Empty".](./media/fluxxlabs-tutorial/config6.png)
169+
![Screenshot that shows administrator options with the "Plus" icon selected under "Your Dashboard is Empty".](./media/fluxxlabs-tutorial/configure-6.png)
179170

180171
3. On the dashboard, click on the below displayed icon to open the **New PEOPLE** card.
181172

182-
![Screenshot that shows the "Contact Management" menu with the "Plus" icon next to "People" selected.](./media/fluxxlabs-tutorial/config4.png)
173+
![Screenshot that shows the "Contact Management" menu with the "Plus" icon next to "People" selected.](./media/fluxxlabs-tutorial/configure-4.png)
183174

184175
4. On the **NEW PEOPLE** section, perform the following steps:
185176

186-
![Fluxx Labs Configuration](./media/fluxxlabs-tutorial/config5.png)
177+
![Fluxx Labs Configuration](./media/fluxxlabs-tutorial/configure-5.png)
187178

188179
a. Fluxx Labs use email as the unique identifier for SSO logins. Populate the **SSO UID** field with the user’s email address, that matches the email address, which they are using as login with SSO.
189180

190181
b. Click **Save**.
191182

192183
## Test SSO
193184

194-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
195-
196-
When you click the Fluxx Labs tile in the Access Panel, you should be automatically signed in to the Fluxx Labs for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](../user-help/my-apps-portal-end-user-access.md).
197-
198-
## Additional resources
199-
200-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
201-
202-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
185+
In this section, you test your Azure AD single sign-on configuration with following options.
203186

204-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
187+
* Click on Test this application in Azure portal and you should be automatically signed in to the Fluxx Labs for which you set up the SSO.
205188

206-
- [Try Fluxx Labs with Azure AD](https://aad.portal.azure.com/)
189+
* You can use Microsoft My Apps. When you click the Fluxx Labs tile in the My Apps, you should be automatically signed in to the Fluxx Labs for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
207190

208-
- [What is session control in Microsoft Cloud App Security?](/cloud-app-security/proxy-intro-aad)
191+
## Next steps
209192

210-
- [How to protect Fluxx Labs with advanced visibility and controls](/cloud-app-security/proxy-intro-aad)
193+
Once you configure Fluxx Labs you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)