Skip to content

Commit f7d6543

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into 2020-2-ingestion-changes
2 parents d8854e5 + 40041cb commit f7d6543

File tree

153 files changed

+6985
-410
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+6985
-410
lines changed

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ In ASP.NET Core, these settings are located in the [appsettings.json](https://gi
9090
// - "organizations" to sign in users in any work or school account
9191
// - "common" to sign in users with any work or school account or Microsoft personal account
9292
// - "consumers" to sign in users with a Microsoft personal account only
93-
"TenantId": "[Enter the tenantId here]]",
93+
"TenantId": "[Enter the tenantId here]",
9494

9595
// Client ID (application ID) obtained from the Azure portal
9696
"ClientId": "[Enter the Client Id]",

articles/active-directory/fundamentals/whats-new-microsoft-365-government.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,6 @@ For more information, see these articles:
6565

6666
- [Azure Government AAD Authority Endpoint Update](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/)
6767

68-
- [Microsoft Graph endpoints in US Government cloud](https://developer.microsoft.com/graph/blogs/new-microsoft-graph-endpoints-in-us-government-cloud/)
68+
- [Microsoft Graph endpoints in US Government cloud](https://developer.microsoft.com/graph/blogs/new-microsoft-graph-endpoints-in-us-government-cloud/)
6969

70-
- [Office 365 US Government GCC High and DoD](https://docs.microsoft.com/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod)
70+
- [Office 365 US Government GCC High and DoD](https://docs.microsoft.com/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod)

articles/active-directory/managed-identities-azure-resources/qs-configure-template-windows-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ In this section, you assign a user-assigned managed identity to a virtual machin
185185
"identity": {
186186
"type": "userAssigned",
187187
"identityIds": [
188-
"[resourceID('Micrososft.ManagedIdentity/userAssignedIdentities/',variables('<USERASSIGNEDIDENTITY>'))]"
188+
"[resourceID('Microsoft.ManagedIdentity/userAssignedIdentities/',variables('<USERASSIGNEDIDENTITY>'))]"
189189
]
190190
}
191191

12.3 KB
Loading
8.22 KB
Loading
11.5 KB
Loading
17 KB
Loading
Lines changed: 180 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,180 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with NS1 SSO for Azure | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and NS1 SSO for Azure.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 24a1afb6-b8b6-4787-bd4b-8fe3a32f8def
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.topic: tutorial
16+
ms.date: 02/12/2020
17+
ms.author: jeedes
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with NS1 SSO for Azure
23+
24+
In this tutorial, you'll learn how to integrate NS1 SSO for Azure with Azure Active Directory (Azure AD). When you integrate NS1 SSO for Azure with Azure AD, you can:
25+
26+
* Control in Azure AD who has access to NS1 SSO for Azure.
27+
* Enable your users to be automatically signed-in to NS1 SSO for Azure with their Azure AD accounts.
28+
* Manage your accounts in one central location - the Azure portal.
29+
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
31+
32+
## Prerequisites
33+
34+
To get started, you need the following items:
35+
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* NS1 SSO for Azure single sign-on (SSO) enabled subscription.
38+
39+
## Scenario description
40+
41+
In this tutorial, you configure and test Azure AD SSO in a test environment.
42+
43+
* NS1 SSO for Azure supports **SP and IDP** initiated SSO
44+
* Once you configure NS1 SSO for Azure you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45+
46+
47+
## Adding NS1 SSO for Azure from the gallery
48+
49+
To configure the integration of NS1 SSO for Azure into Azure AD, you need to add NS1 SSO for Azure from the gallery to your list of managed SaaS apps.
50+
51+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52+
1. On the left navigation pane, select the **Azure Active Directory** service.
53+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54+
1. To add new application, select **New application**.
55+
1. In the **Add from the gallery** section, type **NS1 SSO for Azure** in the search box.
56+
1. Select **NS1 SSO for Azure** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57+
58+
59+
## Configure and test Azure AD single sign-on for NS1 SSO for Azure
60+
61+
Configure and test Azure AD SSO with NS1 SSO for Azure using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in NS1 SSO for Azure.
62+
63+
To configure and test Azure AD SSO with NS1 SSO for Azure, complete the following building blocks:
64+
65+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
1. **[Configure NS1 SSO for Azure SSO](#configure-ns1-sso-for-azure-sso)** - to configure the single sign-on settings on application side.
69+
1. **[Create NS1 SSO for Azure test user](#create-ns1-sso-for-azure-test-user)** - to have a counterpart of B.Simon in NS1 SSO for Azure that is linked to the Azure AD representation of user.
70+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
71+
72+
## Configure Azure AD SSO
73+
74+
Follow these steps to enable Azure AD SSO in the Azure portal.
75+
76+
1. In the [Azure portal](https://portal.azure.com/), on the **NS1 SSO for Azure** application integration page, find the **Manage** section and select **single sign-on**.
77+
1. On the **Select a single sign-on method** page, select **SAML**.
78+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
79+
80+
![Edit Basic SAML Configuration](common/edit-urls.png)
81+
82+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
83+
84+
a. In the **Identifier** text box, type the URL:
85+
`https://api.nsone.net/saml/metadata`
86+
87+
b. In the **Reply URL** text box, type a URL using the following pattern:
88+
`https://api.nsone.net/saml/sso/<ssoid>`
89+
90+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
91+
92+
In the **Sign-on URL** text box, type the URL:
93+
`https://my.nsone.net/#/login/sso`
94+
95+
> [!NOTE]
96+
> The Reply URL value is not real. Update Reply URL value with the actual Reply URL. Contact [NS1 SSO for Azure Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
97+
98+
1. NS1 SSO for Azure application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
99+
100+
![Attribute Section](./media/ns1-sso-for-azure-tutorial/attribute-edit-option.png)
101+
102+
1. Click on the attribute name to edit the claim.
103+
104+
![Attribute Section](./media/ns1-sso-for-azure-tutorial/attribute-claim-edit.png)
105+
106+
1. Select **Transformation**.
107+
108+
![Attribute Section](./media/ns1-sso-for-azure-tutorial/prefix-edit.png)
109+
110+
1. On the **Manage transformation** section, perform the following steps:
111+
112+
![Attribute Section](./media/ns1-sso-for-azure-tutorial/prefix-added.png)
113+
114+
1. Select **ExactMailPrefix()** as **Transformation**.
115+
116+
1. Select **user.userprincipalname** as **Parameter 1**.
117+
118+
1. Click on **Add**.
119+
120+
1. Click on **Save**
121+
122+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
123+
124+
![The Certificate download link](common/copy-metadataurl.png)
125+
126+
### Create an Azure AD test user
127+
128+
In this section, you'll create a test user in the Azure portal called B.Simon.
129+
130+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
131+
1. Select **New user** at the top of the screen.
132+
1. In the **User** properties, follow these steps:
133+
1. In the **Name** field, enter `B.Simon`.
134+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
135+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
136+
1. Click **Create**.
137+
138+
### Assign the Azure AD test user
139+
140+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to NS1 SSO for Azure.
141+
142+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
143+
1. In the applications list, select **NS1 SSO for Azure**.
144+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
145+
146+
![The "Users and groups" link](common/users-groups-blade.png)
147+
148+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
149+
150+
![The Add User link](common/add-assign-user.png)
151+
152+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
153+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
154+
1. In the **Add Assignment** dialog, click the **Assign** button.
155+
156+
## Configure NS1 SSO for Azure SSO
157+
158+
To configure single sign-on on **NS1 SSO for Azure** side, you need to send the **App Federation Metadata Url** to [NS1 SSO for Azure support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
159+
160+
### Create NS1 SSO for Azure test user
161+
162+
In this section, you create a user called B.Simon in NS1 SSO for Azure. Work with NS1 SSO for Azure support team to add the users in the NS1 SSO for Azure platform. Users must be created and activated before you use single sign-on.
163+
164+
## Test SSO
165+
166+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
167+
168+
When you click the NS1 SSO for Azure tile in the Access Panel, you should be automatically signed in to the NS1 SSO for Azure for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
169+
170+
## Additional resources
171+
172+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
173+
174+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
175+
176+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
177+
178+
- [Try NS1 SSO for Azure with Azure AD](https://aad.portal.azure.com/)
179+
180+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -978,6 +978,8 @@
978978
href: nomadic-tutorial.md
979979
- name: Novatus
980980
href: novatus-tutorial.md
981+
- name: NS1 SSO for Azure
982+
href: ns1-sso-azure-tutorial.md
981983
- name: Nuclino
982984
href: nuclino-tutorial.md
983985
- name: O.C. Tanner - AppreciateHub

articles/aks/supported-kubernetes-versions.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ When a new minor version is introduced, the oldest minor version and patch relea
7171
1.13.f
7272
```
7373

74-
And AKS releases 1.16.*, this means that the 1.13.* versions (all 1.13 versions) will be removed and out of support.
74+
And AKS releases 1.16.*, this means that the 1.13.* versions (all 1.13 versions) will be removed and are out of support.
7575

7676
> [!NOTE]
7777
> Please note, that if customers are running an unsupported Kubernetes version, they will be asked to upgrade when
@@ -102,8 +102,7 @@ New Supported Version List
102102
* Customers have **30 days** from the public notification date to upgrade to a supported minor version release.
103103
* For new **patch** versions of Kubernetes
104104
* All users are notified of the new patch version being released and to upgrade to the latest patch release.
105-
* Users have **30 days** to upgrade to a newer, supported patch release. Users have **30 days** to upgrade to
106-
a supported patch release before the oldest is removed.
105+
* Users have **30 days** to upgrade to a newer, supported patch release before the oldest is removed.
107106

108107
AKS defines a "released version" as the generally available versions, enabled in all SLO / Quality of Service measurements and available in all regions. AKS may also support preview versions which are explicitly labeled and subject to Preview terms and conditions.
109108

@@ -147,11 +146,11 @@ az aks get-versions --location eastus --output table
147146
If you are on the *n-3* version, you are outside of support and will be asked to upgrade. If your upgrade from version n-3 to n-2 succeeds, you are now within our support policies. For example:
148147

149148
- If the oldest supported AKS version is are *1.13.a* and you are on *1.12.b* or older, you are outside of support.
150-
- If the upgrade from *1.12.b* to *1.13.a* or higher succeeds, you are back in the within our support policies.
149+
- If the upgrade from *1.12.b* to *1.13.a* or higher succeeds, you are back within our support policies.
151150

152151
Upgrades to versions older than the supported window of *N-2* are not supported. In such cases, we recommend customers create new AKS clusters and redeploy their workloads with versions in the supported window.
153152

154-
**What does 'Out of Support' mean**
153+
**What does 'Outside of Support' mean**
155154

156155
'Outside of Support' means that the version you are running is outside of the supported versions list, and you will be
157156
asked to upgrade the cluster to a supported version when requesting support. Additionally, AKS does not make any

0 commit comments

Comments
 (0)