Skip to content

Commit f93bf2a

Browse files
authored
Merge pull request #236130 from MicrosoftDocs/main
4/27 AM Publish
2 parents eaa54b5 + c148ff5 commit f93bf2a

File tree

135 files changed

+1509
-907
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

135 files changed

+1509
-907
lines changed

articles/active-directory/devices/troubleshoot-mac-sso-extension-plugin.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Use the following steps to check the operating system (OS) version on the macOS
7777
1. From the macOS device, open Terminal from the **Applications** -> **Utilities** folder.
7878
1. When the Terminal opens type **sw_vers** at the prompt, look for a result like the following:
7979

80-
```bash
80+
```zsh
8181
% sw_vers
8282
ProductName: macOS
8383
ProductVersion: 13.0.1
@@ -194,7 +194,7 @@ Once deployed the **Microsoft Enterprise SSO Extension for Apple devices** suppo
194194
1. When the **Spotlight Search** appears type **Terminal** and hit **return**.
195195
1. When the Terminal opens type **`osascript -e 'id of app "<appname>"'`** at the prompt. See some examples follow:
196196

197-
```bash
197+
```zsh
198198
% osascript -e 'id of app "Safari"'
199199
com.apple.Safari
200200

@@ -294,14 +294,14 @@ During troubleshooting it may be useful to reproduce a problem while tailing the
294294
1. When the **Spotlight Search** appears type: **Terminal** and hit **return**.
295295
1. When the Terminal opens type:
296296

297-
```bash
297+
```zsh
298298
tail -F ~/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/*
299299
```
300300

301301
> [!NOTE]
302302
> The trailing /* indicates that multiple logs will be tailed should any exist
303303
304-
```
304+
```output
305305
% tail -F ~/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/*
306306
==> /Users/<username>/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/SSOExtension 2022-12-25--13-11-52-855.log <==
307307
2022-12-29 14:49:59:281 | I | TID=783491 MSAL 1.2.4 Mac 13.0.1 [2022-12-29 19:49:59] Handling SSO request, requested operation:

articles/active-directory/external-identities/code-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,14 +37,14 @@ You can bulk-invite external users to an organization from email addresses that
3737

3838
3. Sign in to your tenancy
3939

40-
```powershell
40+
```azurepowershell-interactive
4141
$cred = Get-Credential
4242
Connect-AzureAD -Credential $cred
4343
```
4444
4545
4. Run the PowerShell cmdlet
4646
47-
```powershell
47+
```azurepowershell-interactive
4848
$invitations = import-csv C:\data\invitations.csv
4949
$messageInfo = New-Object Microsoft.Open.MSGraph.Model.InvitedUserMessageInfo
5050
$messageInfo.customizedMessageBody = "Hey there! Check this out. I created an invitation through PowerShell"

articles/active-directory/fundamentals/multi-tenant-user-management-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -165,13 +165,13 @@ This scenario requires automatic synchronization and identity management to conf
165165

166166
This section describes three techniques for automating account provisioning in the automated scenario.
167167

168-
#### Technique 1: Use the [built-in cross-tenant synchronization capability in Azure AD](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/seamless-application-access-and-lifecycle-management-for-multi/ba-p/3728752)
168+
#### Technique 1: Use the [built-in cross-tenant synchronization capability in Azure AD](../multi-tenant-organizations/cross-tenant-synchronization-overview.md)
169169

170170
This approach only works when all tenants that you need to synchronize are in the same cloud instance (such as Commercial to Commercial).
171171

172172
#### Technique 2: Provision accounts with Microsoft Identity Manager
173173

174-
Use an external Identity and Access Management (IAM) solution such as [Microsoft Identity Manager](https://microsoft.sharepoint-df.com/microsoft-identity-manager/microsoft-identity-manager-2016) (MIM) as a synchronization engine.
174+
Use an external Identity and Access Management (IAM) solution such as [Microsoft Identity Manager](/microsoft-identity-manager/microsoft-identity-manager-2016) (MIM) as a synchronization engine.
175175

176176
This advanced deployment uses MIM as a synchronization engine. MIM calls the [Microsoft Graph API](https://developer.microsoft.com/graph) and [Exchange Online PowerShell](/powershell/exchange/exchange-online/exchange-online-powershell?view=exchange-ps&preserve-view=true). Alternative implementations can include the cloud-hosted [Active Directory Synchronization Service](/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview) (ADSS) managed service offering from [Microsoft Industry Solutions](https://www.microsoft.com/industrysolutions). There are non-Microsoft offerings that you can create from scratch with other IAM offerings (such as SailPoint, Omada, and OKTA).
177177

articles/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -178,21 +178,21 @@ To use Azure PowerShell locally for this article instead of using Cloud Shell:
178178

179179
1. Sign in to Azure.
180180

181-
```azurepowershell
181+
```azurepowershell-interactive
182182
Connect-AzAccount
183183
```
184184
185185
1. Install the [latest version of PowerShellGet](/powershell/gallery/powershellget/install-powershellget).
186186
187-
```azurepowershell
187+
```azurepowershell-interactive
188188
Install-Module -Name PowerShellGet -AllowPrerelease
189189
```
190190
191191
You might need to `Exit` out of the current PowerShell session after you run this command for the next step.
192192
193193
1. Install the prerelease version of the `Az.ManagedServiceIdentity` module to perform the user-assigned managed identity operations in this article.
194194
195-
```azurepowershell
195+
```azurepowershell-interactive
196196
Install-Module -Name Az.ManagedServiceIdentity -AllowPrerelease
197197
```
198198
@@ -330,7 +330,7 @@ In this article, you learn how to create, list, and delete a user-assigned manag
330330

331331
1. If you're running locally, sign in to Azure through the Azure CLI.
332332

333-
```
333+
```azurecli-interactive
334334
az login
335335
```
336336

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ To assign a user-assigned identity to a VM during its creation, your account nee
132132
3. Create a VM using [az vm create](/cli/azure/vm/#az-vm-create). The following example creates a VM associated with the new user-assigned identity, as specified by the `--assign-identity` parameter, with the specified `--role` and `--scope`. Be sure to replace the `<RESOURCE GROUP>`, `<VM NAME>`, `<USER NAME>`, `<PASSWORD>`, `<USER ASSIGNED IDENTITY NAME>`, `<ROLE>`, and `<SUBSCRIPTION>` parameter values with your own values.
133133

134134
```azurecli-interactive
135-
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME> --role <ROLE> --scope <SUBSCRIPTION>
135+
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image <SKU linux image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME> --role <ROLE> --scope <SUBSCRIPTION>
136136
```
137137

138138
### Assign a user-assigned managed identity to an existing Azure VM

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ This section walks you through creation of a virtual machine scale set and assig
133133
3. [Create](/cli/azure/vmss/#az-vmss-create) a virtual machine scale set. The following example creates a virtual machine scale set associated with the new user-assigned managed identity, as specified by the `--assign-identity` parameter, with the specified `--role` and `--scope`. Be sure to replace the `<RESOURCE GROUP>`, `<VMSS NAME>`, `<USER NAME>`, `<PASSWORD>`, `<USER ASSIGNED IDENTITY>`, `<ROLE>`, and `<SUBSCRIPTION>` parameter values with your own values.
134134

135135
```azurecli-interactive
136-
az vmss create --resource-group <RESOURCE GROUP> --name <VMSS NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY> --role <ROLE> --scope <SUBSCRIPTION>
136+
az vmss create --resource-group <RESOURCE GROUP> --name <VMSS NAME> --image <SKU Linux Image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY> --role <ROLE> --scope <SUBSCRIPTION>
137137
```
138138

139139
### Assign a user-assigned managed identity to an existing virtual machine scale set

articles/active-directory/managed-identities-azure-resources/tutorial-vm-managed-identities-cosmos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ The user assigned managed identity should be specified using its [resourceID](./
170170
# [Azure CLI](#tab/azure-cli)
171171

172172
```azurecli
173-
az vm create --resource-group <MyResourceGroup> --name <myVM> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME>
173+
az vm create --resource-group <MyResourceGroup> --name <myVM> --image <SKU Linux Image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME>
174174
```
175175

176176
[Configure managed identities for Azure resources on a VM using the Azure CLI](qs-configure-cli-windows-vm.md#user-assigned-managed-identity)

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2617,6 +2617,8 @@
26172617
href: userecho-tutorial.md
26182618
- name: UserVoice
26192619
href: uservoice-tutorial.md
2620+
- name: UserTesting
2621+
href: usertesting-saml-tutorial.md
26202622
- name: UserZoom
26212623
href: userzoom-tutorial.md
26222624
- name: Valence Security Platform
Lines changed: 118 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,118 @@
1+
---
2+
title: Azure Active Directory SSO integration with UserTesting
3+
description: Learn how to configure single sign-on between Azure Active Directory and UserTesting.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 04/26/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with UserTesting
18+
19+
In this article, you learn how to integrate UserTesting with Azure Active Directory (Azure AD). UserTesting is a platform for getting rapid customer feedback on almost any customer experience you can imagine, including websites, mobile apps, prototypes, and real world experiences. When you integrate UserTesting with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to UserTesting.
22+
* Enable your users to be automatically signed-in to UserTesting with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You configure and test Azure AD single sign-on for UserTesting in a test environment. UserTesting supports **SP** and **IDP** initiated single sign-on.
26+
27+
## Prerequisites
28+
29+
To integrate Azure Active Directory with UserTesting, you need:
30+
31+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34+
* UserTesting single sign-on (SSO) enabled subscription.
35+
36+
## Add application and assign a test user
37+
38+
Before you begin the process of configuring single sign-on, you need to add the UserTesting application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
39+
40+
### Add UserTesting from the Azure AD gallery
41+
42+
Add UserTesting from the Azure AD application gallery to configure single sign-on with UserTesting. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
43+
44+
### Create and assign Azure AD test user
45+
46+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
47+
48+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
49+
50+
## Configure Azure AD SSO
51+
52+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
53+
54+
1. In the Azure portal, on the **UserTesting** application integration page, find the **Manage** section and select **single sign-on**.
55+
1. On the **Select a single sign-on method** page, select **SAML**.
56+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
57+
58+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
59+
60+
1. On the **Basic SAML Configuration** section, perform the following steps:
61+
62+
a. In the **Identifier** textbox, type a URL using the following pattern:
63+
`https://www.okta.com/saml2/service-provider/<Account_Name>`
64+
65+
b. In the **Reply URL** textbox, type a URL using the following pattern:
66+
` https://auth.usertesting.com/sso/saml2/<ID>`
67+
68+
1. If you wish to configure the application in **SP** initiated mode, then perform the following step:
69+
70+
a. In the **Sign on URL** textbox, type the URL:
71+
`https://app.usertesting.com/users/sso_sign_in`
72+
73+
b.In the **Relay State** textbox, type the URL:
74+
`https://app.usertesting.com/sessions/from_idp`
75+
76+
> [!NOTE]
77+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [UserTesting Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
78+
79+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
80+
81+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
82+
83+
1. On the **Set up UserTesting** section, copy the appropriate URL(s) based on your requirement.
84+
85+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
86+
87+
## Configure UserTesting SSO
88+
89+
To configure single sign-on on **UserTesting** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [UserTesting support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
90+
91+
### Create UserTesting test user
92+
93+
In this section, you create a user called Britta Simon at UserTesting. Work with [UserTesting support team](mailto:[email protected]) to add the users in the UserTesting platform. Users must be created and activated before you use single sign-on.
94+
95+
## Test SSO
96+
97+
In this section, you test your Azure AD single sign-on configuration with following options.
98+
99+
#### SP initiated:
100+
101+
* Click on **Test this application** in Azure portal. This will redirect to UserTesting Sign-on URL where you can initiate the login flow.
102+
103+
* Go to UserTesting Sign-on URL directly and initiate the login flow from there.
104+
105+
#### IDP initiated:
106+
107+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the UserTesting for which you set up the SSO.
108+
109+
You can also use Microsoft My Apps to test the application in any mode. When you click the UserTesting tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the UserTesting for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
110+
111+
## Additional resources
112+
113+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
114+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
115+
116+
## Next steps
117+
118+
Once you configure UserTesting you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/standards/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ landingContent:
2424
linkLists:
2525
- linkListType: overview
2626
links:
27-
- text: Configure to identity standards
28-
url: standards-overview.md
2927
- text: NIST AAL overview
3028
url: nist-overview.md
3129
- text: FedRAMP High impact overview
3230
url: configure-azure-active-directory-for-fedramp-high-impact.md
31+
- text: Configure Azure Active Directory for Memorandum 22-09 requirements
32+
url: memo-22-09-meet-identity-requirements.md
3333
- text: Configure Azure Active Directory for CMMC compliance
3434
url: configure-azure-active-directory-for-cmmc-compliance.md
3535
- text: Configure Azure Active Directory for HIPAA compliance

0 commit comments

Comments
 (0)