-
Notifications
You must be signed in to change notification settings - Fork 555
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #6754 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 1/31
- Loading branch information
Showing
25 changed files
with
166 additions
and
135 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file modified
BIN
+22.5 KB
(140%)
...ity/monitoring-health/media/concept-flagged-sign-ins/flagged-sign-in-admins.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+38 KB
(160%)
...ing-health/media/concept-noninteractive-sign-ins/aggregate-sign-in-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
-43.6 KB
(73%)
...y/monitoring-health/media/concept-noninteractive-sign-ins/aggregate-sign-in.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+72.4 KB
(150%)
...a/concept-noninteractive-sign-ins/sign-in-logs-user-noninteractive-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+40.2 KB
(120%)
...alth/media/concept-noninteractive-sign-ins/sign-in-logs-user-noninteractive.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+34.4 KB
(140%)
.../concept-service-principal-sign-ins/sign-in-logs-service-principal-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
-5.17 KB
(97%)
...lth/media/concept-service-principal-sign-ins/sign-in-logs-service-principal.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+42 KB
(160%)
...dation-remove-unused-credential-from-apps/app-certificates-secrets-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+41.3 KB
(130%)
.../recommendation-remove-unused-credential-from-apps/app-certificates-secrets.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+46.2 KB
(170%)
...ion-renew-expiring-application-credential/app-certificates-secrets-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+41.5 KB
(130%)
...commendation-renew-expiring-application-credential/app-certificates-secrets.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+57.4 KB
(130%)
...ng-service-principal-credential/recommendation-edit-single-sign-on-expanded.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+32.7 KB
(110%)
...ew-expiring-service-principal-credential/recommendation-edit-single-sign-on.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -18,7 +18,7 @@ ms.author: jeedes | |
|
||
# Tutorial: Microsoft Entra single sign-on (SSO) integration with Ardoq | ||
|
||
In this tutorial, you'll learn how to integrate Ardoq with Microsoft Entra ID. When you integrate Ardoq with Microsoft Entra ID, you can: | ||
In this tutorial, you learn how to integrate Ardoq with Microsoft Entra ID. When you integrate Ardoq with Microsoft Entra ID, you can: | ||
|
||
* Control in Microsoft Entra ID who has access to Ardoq. | ||
* Enable your users to be automatically signed-in to Ardoq with their Microsoft Entra accounts. | ||
|
@@ -35,7 +35,7 @@ To get started, you need the following items: | |
|
||
In this tutorial, you configure and test Microsoft Entra SSO in a test environment. | ||
|
||
* Ardoq supports **SP and IDP** initiated SSO. | ||
* Ardoq only supports **SP** initiated SSO. To achieve something similar to an **IDP** initiated SSO, read the guide on [Supporting IDP-Initiated SAML sign in](https://help.ardoq.com/en/articles/109003-supporting-idp-initiated-saml-login). | ||
* Ardoq supports **Just In Time** user provisioning. | ||
|
||
## Adding Ardoq from the gallery | ||
|
@@ -47,7 +47,7 @@ To configure the integration of Ardoq into Microsoft Entra ID, you need to add A | |
1. In the **Add from the gallery** section, type **Ardoq** in the search box. | ||
1. Select **Ardoq** from results panel and then add the app. Wait a few seconds while the app is added to your tenant. | ||
|
||
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides) | ||
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, and walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides) | ||
|
||
|
||
<a name='configure-and-test-azure-ad-sso-for-ardoq'></a> | ||
|
@@ -74,7 +74,7 @@ Follow these steps to enable Microsoft Entra SSO. | |
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator). | ||
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Ardoq** > **Single sign-on**. | ||
1. On the **Select a single sign-on method** page, select **SAML**. | ||
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings. | ||
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings. | ||
|
||
![Edit Basic SAML Configuration](common/edit-urls.png) | ||
|
||
|
@@ -90,7 +90,7 @@ Follow these steps to enable Microsoft Entra SSO. | |
b. In the **Reply URL** text box, type a URL using the following pattern: | ||
`https://<CustomerName>.ardoq.com/saml/v2` | ||
|
||
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode: | ||
1. Select **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode: | ||
|
||
In the **Sign-on URL** text box, type a URL using one of the following patterns: | ||
|
||
|
@@ -100,7 +100,7 @@ Follow these steps to enable Microsoft Entra SSO. | |
| `https://<CustomerName>.us.ardoq.com/saml/v2` | | ||
|
||
> [!NOTE] | ||
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Ardoq Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section. | ||
> These values aren't real. Update these values with the actual Identifier, Reply URL, and Sign-on URL. Contact [Ardoq Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section. | ||
|
||
1. Ardoq application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. | ||
|
||
|
@@ -123,15 +123,15 @@ Follow these steps to enable Microsoft Entra SSO. | |
|
||
![The Certificate download link](common/metadataxml.png) | ||
|
||
1. On the **Set up Ardoq** section, copy the appropriate URL(s) based on your requirement. | ||
1. On the **Set up Ardoq** section, copy one or more appropriate URLs based on your requirement. | ||
|
||
![Copy configuration URLs](common/copy-configuration-urls.png) | ||
|
||
<a name='create-an-azure-ad-test-user'></a> | ||
|
||
### Create a Microsoft Entra test user | ||
|
||
In this section, you'll create a test user called B.Simon. | ||
In this section, you create a test user called B.Simon. | ||
|
||
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator). | ||
1. Browse to **Identity** > **Users** > **All users**. | ||
|
@@ -147,39 +147,39 @@ In this section, you'll create a test user called B.Simon. | |
|
||
### Assign the Microsoft Entra test user | ||
|
||
In this section, you'll enable B.Simon to use single sign-on by granting access to Ardoq. | ||
In this section, you enable B.Simon to use single sign-on by granting access to Ardoq. | ||
|
||
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator). | ||
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Ardoq**. | ||
1. In the app's overview page, find the **Manage** section and select **Users and groups**. | ||
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog. | ||
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen. | ||
1. Select **Add user**, then select **Users and groups** in the **Added Assignment** dialog. | ||
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then select the **Select** button at the bottom of the screen. | ||
1. If you have setup the roles as explained in the above, you can select it from the **Select a role** dropdown. | ||
1. In the **Add Assignment** dialog, click the **Assign** button. | ||
1. In the **Added Assignment** dialog, select the **Assign** button. | ||
|
||
## Configure Ardoq SSO | ||
|
||
To configure single sign-on on **Ardoq** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to [Ardoq support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides. | ||
|
||
### Create Ardoq test user | ||
|
||
In this section, a user called Britta Simon is created in Ardoq. Ardoq supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Ardoq, a new one is created after authentication. | ||
In this section, a user called Britta Simon is created in Ardoq. Ardoq supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in Ardoq, a new one is created after authentication. | ||
|
||
## Test SSO | ||
|
||
In this section, you test your Microsoft Entra single sign-on configuration with following options. | ||
|
||
#### SP initiated: | ||
|
||
* Click on **Test this application**, this will redirect to Ardoq Sign on URL where you can initiate the login flow. | ||
* Select on **Test this application**, this will redirect to Ardoq Sign on URL where you can initiate the sign in flow. | ||
|
||
* Go to Ardoq Sign-on URL directly and initiate the login flow from there. | ||
* Go to Ardoq Sign-on URL directly and initiate the sign in flow from there. | ||
|
||
#### IDP initiated: | ||
|
||
* Click on **Test this application**, and you should be automatically signed in to the Ardoq for which you set up the SSO | ||
* Select on **Test this application**, and you should be automatically signed in to the Ardoq for which you set up the SSO | ||
|
||
You can also use Microsoft My Apps to test the application in any mode. When you click the Ardoq tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Ardoq for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510). | ||
You can also use Microsoft My Apps to test the application in any mode. When you select the Ardoq tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the sign in flow and if configured in IDP mode, you should be automatically signed in to the Ardoq for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510). | ||
|
||
|
||
## Next steps | ||
|
Oops, something went wrong.