Skip to content

Commit 27dd526

Browse files
committed
Add roles doc for Microsoft Entra ID
1 parent 0551701 commit 27dd526

11 files changed

+92
-57
lines changed

blog-service/2025-04-15-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1111

1212
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
1313

14-
We're excited to announce provisioning for Sumo Logic using SCIM (Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic from a provider like Microsoft Entra ID, Okta, or OneLogin.
14+
We're excited to announce provisioning for Sumo Logic using SCIM (Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic with a provider like Microsoft Entra ID, Okta, or OneLogin.
1515

1616
Create an access key using a Sumo Logic service account to provide authentication for the provider to provision users into Sumo Logic.
1717

docs/manage/security/scim/about-scim-provisioning.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,17 +12,17 @@ You can provision and deprovision users in Sumo Logic using SCIM (System for Cro
1212
## Directions for provisioning providers
1313

1414
See the following articles for directions to configure specific provisioning providers:
15-
* [Provision from Microsoft Entra ID](/docs/manage/security/scim/provision-from-microsoft-entra-id/)
16-
* [Provision from Okta](/docs/manage/security/scim/provision-from-okta/)
17-
* [Provision from OneLogin](/docs/manage/security/scim/provision-from-onelogin/)
15+
* [Provision with Microsoft Entra ID](/docs/manage/security/scim/provision-with-microsoft-entra-id/)
16+
* [Provision with Okta](/docs/manage/security/scim/provision-with-okta/)
17+
* [Provision with OneLogin](/docs/manage/security/scim/provision-with-onelogin/)
1818

1919
## Prerequisites
2020

2121
### Create an access key
2222

2323
Before configuring a provisioning provider, create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from the provider into Sumo Logic.
2424

25-
When you create the access key, copy its access ID and access key values. Depending on the provider you configure, you will enter these when you set up provisioning to use one of the following authorization methods:
25+
When you create the access key, copy its access ID and access key values. You will enter these when you set up provisioning to use one of the following authorization methods:
2626
* Basic authentication
2727
* Username: Access ID
2828
* Password: Access key

docs/manage/security/scim/index.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
slug: /manage/security/scim
33
title: SCIM Provisioning
4-
description: Learn how to provision users into Sumo Logic using SCIM.
4+
description: Learn how to provision users in Sumo Logic using SCIM.
55
---
66

77
import useBaseUrl from '@docusaurus/useBaseUrl';
@@ -14,25 +14,25 @@ This section contains the following articles:
1414
<div className="box smallbox card">
1515
<div className="container">
1616
<a href="/docs/manage/security/scim/about-scim-provisioning"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>About SCIM Provisioning</h4></a>
17-
<p>Learn about provisioning users into Sumo Logic using SCIM.</p>
17+
<p>Learn about provisioning users in Sumo Logic using SCIM.</p>
1818
</div>
1919
</div>
2020
<div className="box smallbox card">
2121
<div className="container">
22-
<a href="/docs/manage/security/scim/provision-from-microsoft-entra-id"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision from Microsoft Entra ID</h4></a>
23-
<p>Learn how to provision users into Sumo Logic from Microsoft Entra ID (formerly Azure Active Directory).</p>
22+
<a href="/docs/manage/security/scim/provision-with-microsoft-entra-id"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision with Microsoft Entra ID</h4></a>
23+
<p>Learn how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory).</p>
2424
</div>
2525
</div>
2626
<div className="box smallbox card">
2727
<div className="container">
28-
<a href="/docs/manage/security/scim/provision-from-okta"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision from Okta</h4></a>
29-
<p>Learn how to provision users into Sumo Logic from Okta</p>
28+
<a href="/docs/manage/security/scim/provision-with-okta"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision with Okta</h4></a>
29+
<p>Learn how to provision users in Sumo Logic with Okta</p>
3030
</div>
3131
</div>
3232
<div className="box smallbox card">
3333
<div className="container">
34-
<a href="/docs/manage/security/scim/provision-from-onelogin"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision from OneLogin</h4></a>
35-
<p>Learn how to provision users into Sumo Logic from OneLogin</p>
34+
<a href="/docs/manage/security/scim/provision-with-onelogin"><img src={useBaseUrl('img/icons/general/session.png')} alt="icon" width="40"/><h4>Provision with OneLogin</h4></a>
35+
<p>Learn how to provision users in Sumo Logic with OneLogin</p>
3636
</div>
3737
</div>
3838
</div>

docs/manage/security/scim/provision-from-microsoft-entra-id.md renamed to docs/manage/security/scim/provision-with-microsoft-entra-id.md

Lines changed: 49 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
id: provision-from-microsoft-entra-id
3-
title: Provision from Microsoft Entra ID
4-
sidebar_label: Provision from Microsoft Entra ID
5-
description: Learn how to provision users into Sumo Logic from Microsoft Entra ID (formerly Azure Active Directory).
2+
id: provision-with-microsoft-entra-id
3+
title: Provision with Microsoft Entra ID
4+
sidebar_label: Provision with Microsoft Entra ID
5+
description: Learn how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory).
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
This article describes how to provision users into Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory).
10+
This article describes how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory).
1111

1212
## Prerequisites
1313

1414
### Create an access key
1515

16-
Create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from Okta into Sumo Logic.
16+
Create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from Microsoft Entra ID into Sumo Logic.
1717

1818
When you create the access key, copy its access ID and access key values. You will enter these when you use [Base64 encoding](https://www.base64encode.org/) to Base64 encode `<access ID>:<access key>` to generate a token.
1919

@@ -31,27 +31,42 @@ When you create the access key, copy its access ID and access key values. You wi
3131

3232
### Step 2: Set up single sign-on
3333

34-
Follow the directions in [Configure Sumo as an Enterprise App in Azure AD](/docs/manage/security/saml/integrate-sumo-with-azure-ad/#configure-saml-in-sumo-logic) beginning with the step where you select **Set up single sign-on**.
34+
Follow the directions in [Configure Sumo as an Enterprise App in Azure AD](/docs/manage/security/saml/integrate-sumo-with-azure-ad/#configure-saml-in-sumo-logic) beginning with the step where you select **Set up single sign on**.
3535

3636
<img src={useBaseUrl('img/security/provision-azure-set-up-sso.png')} alt="Set up single sign on" style={{border: '1px solid gray'}} width="600" />
3737

3838
When you [configure SAML in Sumo Logic](/docs/manage/security/saml/integrate-sumo-with-azure-ad/#configure-saml-in-sumo-logic):
39-
* Select **Disable Requested Authentication Context**
40-
* Do not select the **On Demand Provisioning** checkbox. You will set up provisioning later.
39+
* Select **Disable Requested Authentication Context**.
40+
* Do not select the **On Demand Provisioning** checkbox. You will set up provisioning later.
4141

42-
### Step 3: Assign users to the app
42+
### Step 3: Add roles
43+
44+
Create roles that the users will have in Sumo Logic (for example, `Analyst` and `Administrator`).
45+
46+
1. In the app, select **Manage > Users and groups**.
47+
1. Select **application registration**.<br/><img src={useBaseUrl('img/security/provision-azure-app-registration.png')} alt="Add users" style={{border: '1px solid gray'}} width="700" />
48+
1. Click **Create app role**.<br/><img src={useBaseUrl('img/security/provision-azure-create-app-role.png')} alt="Create app role" style={{border: '1px solid gray'}} width="700" />
49+
1. Create the role:
50+
1. In **Display name**, enter the name to be displayed in the UI (for example, `Analyst`).
51+
1. For **Allowed member types** select **Both**.
52+
1. For **Value** enter the value of the role in Sumo Logic (for example, `Analyst`).
53+
1. For **Description** enter a description of the role.
54+
1. Click **Apply**.<br/><img src={useBaseUrl('img/security/provision-azure-create-app-role-dialog.png')} alt="Create app role dialog" style={{border: '1px solid gray'}} width="400" />
55+
56+
### Step 4: Assign users to the app
4357

4458
1. In the app, select **Manage > Users and groups**.
4559
1. Select **Add user/group**.<br/><img src={useBaseUrl('img/security/provision-azure-add-users.png')} alt="Add users" style={{border: '1px solid gray'}} width="600" />
46-
1. Select **Users**.
47-
1. From the list of available users, select users to add to the app.
48-
1. Click **Select**.
60+
1. Under **Users**, click **None Selected**.<br/><img src={useBaseUrl('img/security/provision-azure-add-assignment.png')} alt="Add Assignment" style={{border: '1px solid gray'}} width="400" />
61+
1. From the list of available users, select users to add to the app and click **Select**.
62+
1. Under **Select a role** click **None Selected**.
63+
1. From the list of available roles, select a role (for example, **Analyst**).
4964
1. Click **Assign**.
5065

51-
### Step 4: Set up provisioning
66+
### Step 5: Set up provisioning
5267

5368
1. In the app select **Manage > Provisioning**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning.png')} alt="Connect your application" style={{border: '1px solid gray'}} width="600" />
54-
1. For **Provisioning Mode** select **Automatic**.
69+
1. For **Provisioning Mode**, select **Automatic**.
5570
1. Enter **Admin Credentials**:
5671
1. In **Tenant URL**, enter the [API endpoint for your deployment](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security) for the SCIM API using the format `<api-endpoint>/v1/scim/`. For example, `https://api.sumologic.com/api/v1/scim`.
5772
1. For **Secret Token**, use [Base64 encoding](https://www.base64encode.org/) to encode `<access ID>:<access key>` (see [Prerequisites](#prerequisites)). Enter the resulting value into the **Secret Token** field.
@@ -73,24 +88,31 @@ When you [configure SAML in Sumo Logic](/docs/manage/security/saml/integrate-sum
7388
* roles[primary eq "True"].value
7489
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-attribute-mappings.png')} alt="Attribute mappings" style={{border: '1px solid gray'}} width="600" />
7590
1. Click the **Home > `<app name>` | Provisioning** link in the top left corner of the screen. This returns you to the **Provisioning** tab.
91+
1. Test provisioning:
92+
1. In the app, select **Manage > Provisioning**.
93+
1. For **Provisioning Status** select **On** to enable provisioning.
94+
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning-status.png')} alt="Provisioning status" style={{border: '1px solid gray'}} width="600" />
95+
1. Select **Overview**.
96+
1. Select **Provision on demand**.<br/><img src={useBaseUrl('img/security/provision-azure-provision-on-demand.png')} alt="Provision on demand" style={{border: '1px solid gray'}} width="600" />
97+
1. Users assigned the app will be provisioned into Sumo Logic.
7698

77-
### Step 5: Test provisioning
99+
As long as the app's provisioning status is on, the app runs auto provisioning every 40 minutes.
78100

79-
1. In the app, select **Manage > Provisioning**.
80-
1. For **Provisioning Status** select **On** to enable provisioning.
81-
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning-status.png')} alt="Provisioning status" style={{border: '1px solid gray'}} width="600" />
82-
1. Select **Overview**.
83-
1. Select **Provision on demand**.<br/><img src={useBaseUrl('img/security/provision-azure-provision-on-demand.png')} alt="Provision on demand" style={{border: '1px solid gray'}} width="600" />
84-
1. Users assigned the app will be provisioned into Sumo Logic.
101+
### Step 6: Verify provisioning
85102

86-
As long as the app's provisioning status is on, the app runs auto provisioning every 40 minutes.
103+
Users assigned to the app are provisioned into Sumo Logic.
87104

88-
:::note
89-
By default, users will be assigned the `User` role in Sumo Logic. (The `User` role must already be set up in Sumo Logic to allow users to be provisioned with that role.)
90-
:::
105+
1. Verify in Microsoft Entra ID:
106+
1. In the app, select **Provisioning** and then select the **Monitoring** tab.
107+
1. The tab should show provisioning status. Click **View Provisioning Logs** for details.
108+
1. Verify in Sumo Logic:
109+
1. Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID.
110+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Users and Roles > Users**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Users and Roles** select **Users**. You can also click the **Go To...** menu at the top of the screen and select **Users**.
111+
1. Search for the users provisioned from Microsoft Entra ID.
112+
1. You should see the users listed, and with the role given to when you assigned them to the app in Microsoft Entra ID.
91113

92114
## Syncing between Microsoft Entra ID and Sumo Logic
93115

94-
When you modify the name or email of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
116+
When you modify the name, email, or role of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
95117

96118
If you unassign a user from the app in Microsoft Entra ID, the corresponding user is deactivated in Sumo Logic. (If you later try to reassign that same user to the app, it will result in an error in Sumo Logic. You must delete the old user from Sumo Logic first so that the user can be provisioned once again from Microsoft Entra ID.)

docs/manage/security/scim/provision-from-okta.md renamed to docs/manage/security/scim/provision-with-okta.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
id: provision-from-okta
3-
title: Provision from Okta
4-
sidebar_label: Provision from Okta
5-
description: Learn how to provision users into Sumo Logic from Okta.
2+
id: provision-with-okta
3+
title: Provision with Okta
4+
sidebar_label: Provision with Okta
5+
description: Learn how to provision users in Sumo Logic with Okta.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
This article describes how to provision users into Sumo Logic with Okta.
10+
This article describes how to provision users in Sumo Logic with Okta.
1111

1212
## Prerequisites
1313

@@ -23,7 +23,7 @@ When you create the access key, copy its access ID and access key values. You wi
2323

2424
### Set up SAML
2525

26-
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration). You will use them when you set up provisioning.
26+
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic SAML configuration. You will use them when you set up provisioning.
2727

2828
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
2929

@@ -148,10 +148,10 @@ If it is not already set up, [set up SAML for single sign-on with Okta](/docs/ma
148148

149149
As soon as users are assigned to the app, they are provisioned into Sumo Logic.
150150

151-
1. Verify in Okta.
151+
1. Verify in Okta:
152152
1. Navigate to **Reports > System Log** to see the log.
153153
1. The log should show that users you added to the app are pushed to Sumo Logic with an event info message like **Push new user to external application SUCCESS**.
154-
1. Verify in Sumo Logic.
154+
1. Verify in Sumo Logic:
155155
1. Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID.
156156
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Users and Roles > Users**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Users and Roles** select **Users**. You can also click the **Go To...** menu at the top of the screen and select **Users**.
157157
1. Search for the users provisioned from Okta.

docs/manage/security/scim/provision-from-onelogin.md renamed to docs/manage/security/scim/provision-with-onelogin.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
id: provision-from-onelogin
3-
title: Provision from OneLogin
4-
sidebar_label: Provision from OneLogin
5-
description: Learn how to provision users into Sumo Logic from OneLogin.
2+
id: provision-with-onelogin
3+
title: Provision with OneLogin
4+
sidebar_label: Provision with OneLogin
5+
description: Learn how to provision users in Sumo Logic with OneLogin.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
This article describes how to provision users into Sumo Logic with OneLogin.
10+
This article describes how to provision users in Sumo Logic with OneLogin.
1111

1212
## Prerequisites
1313

@@ -117,7 +117,20 @@ On the **Configuration** tab, for **SCIM Base URL** enter the [API endpoint for
117117
1. Select **Users**.
118118
1. Click **Pending** on the user you want to approve for provisioning.<br/><img src={useBaseUrl('img/security/provision-onelogin-approve-user.png')} alt="Pending user" style={{border: '1px solid gray'}} width="800" />
119119
1. Click **Approve**.<br/><img src={useBaseUrl('img/security/provision-onelogin-approve-dialog.png')} alt="Approve dialog" style={{border: '1px solid gray'}} width="400" />
120-
1. The user is provisioned to Sumo Logic.
120+
1. The user is provisioned to Sumo Logic.f
121+
122+
### Step 6: Verify provisioning
123+
124+
Users assigned to the app are provisioned into Sumo Logic.
125+
126+
1. Verify in OneLogin:
127+
1. In the main menu, select **Provisioning** and then select the **Monitoring** tab.
128+
1. The events for provisioned users should appear. Click an event for details.
129+
1. Verify in Sumo Logic:
130+
1. Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID.
131+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Users and Roles > Users**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Users and Roles** select **Users**. You can also click the **Go To...** menu at the top of the screen and select **Users**.
132+
1. Search for the users provisioned from OneLogin.
133+
1. You should see the users listed, and with the role given to when you assigned them to the app in OneLogin.
121134

122135
## Syncing between OneLogin and Sumo Logic
123136

sidebars.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1102,9 +1102,9 @@ module.exports = {
11021102
link: {type: 'doc', id: 'manage/security/scim/index'},
11031103
items: [
11041104
'manage/security/scim/about-scim-provisioning',
1105-
'manage/security/scim/provision-from-microsoft-entra-id',
1106-
'manage/security/scim/provision-from-okta',
1107-
'manage/security/scim/provision-from-onelogin',
1105+
'manage/security/scim/provision-with-microsoft-entra-id',
1106+
'manage/security/scim/provision-with-okta',
1107+
'manage/security/scim/provision-with-onelogin',
11081108
]
11091109
},
11101110
'manage/security/set-password-policy',
112 KB
Loading
286 KB
Loading
107 KB
Loading

0 commit comments

Comments
 (0)