This commit is contained in:
Chetan Srivastava (HCL America Inc) 2019-10-22 16:55:51 -07:00
Родитель fc3f471e33
Коммит 9eb70877c0
14 изменённых файлов: 376 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,39 @@
## Prerequisites
To configure Azure AD integration with Contentful, you need the following items:
- An Azure AD subscription
- A Contentful single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Contentful for single sign-on
Follow these steps to configure single sign-on on **Contentful** side.
1. In [Contentful](https://app.contentful.com), navigate to the SSO setup page in Organization Settings.
1. Click on **Set up SSO**.
1. Copy and paste the Login URL from the **Set up Contentful** section in Azure AD.
1. Copy and paste the **[Certifcate](%metadata:CertificateDownloadRawUrl%)** from the Base64 certificate file you downloaded from Azure AD.
1. Set up an SSO name for SP-initiated login.
1. Click on **Enable SSO**.
If that doesn't work, reach out to [Contentful support team](mailto:support@contentful.com).
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate Contentful with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/contentful-tutorial)

Просмотреть файл

@ -0,0 +1,30 @@
## Prerequisites
To configure Azure AD integration with Dynatrace, you need the following items:
- An Azure AD subscription
- A Dynatrace single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Dynatrace for single sign-on
To configure single sign-on on **Dynatrace** side, you need to send the **[Downloaded SAML Metadata file](%metadata:metadataDownloadUrl%)** and appropriate copied URLs from Azure portal to [Dynatrace support team](https://www.dynatrace.com/services-support/). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate Dynatrace with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/dynatrace-tutorial)

Просмотреть файл

@ -0,0 +1,30 @@
## Prerequisites
To configure Azure AD integration with eCornell, you need the following items:
- An Azure AD subscription
- A eCornell single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring eCornell for single sign-on
To configure single sign-on on **eCornell** side, you need to send the **[Downloaded SAML Metadata file](%metadata:metadataDownloadUrl%)** and appropriate copied URLs from Azure portal to [eCornell support team](mailto:jschichor@ecornell.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate eCornell with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/ecornell-tutorial)

Просмотреть файл

@ -0,0 +1,30 @@
## Prerequisites
To configure Azure AD integration with ExponentHR, you need the following items:
- An Azure AD subscription
- An ExponentHR single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring ExponentHR for single sign-on
To configure single sign-on on **ExponentHR** side, you need to send the **App Federation Metadata Url** to [ExponentHR support team](mailto:support@exponenthr.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Login URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate ExponentHR with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/exponenthr-tutorial)

Двоичные данные
articles/en-us/ezofficeinventory/media/configure01.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 25 KiB

Двоичные данные
articles/en-us/ezofficeinventory/media/configure02.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 38 KiB

Просмотреть файл

@ -0,0 +1,58 @@
## Prerequisites
To configure Azure AD integration with EZOfficeInventory, you need the following items:
- An Azure AD subscription
- An EZOfficeInventory single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring EZOfficeInventory for single sign-on
1. Open a new web browser window and sign into your EZOfficeInventory company site as an administrator.
2. On the top-right corner of the page, click on **Profile** and then navigate to **Settings** > **Add Ons**.
![EZOfficeInventory configuration](./media/configure01.png)
3. Scroll down up to the **SAML Integration** section, perform the following steps:
![EZOfficeInventory configuration](./media/configure02.png)
a. Check the **Enabled** option.
b. In the **Identity Provider URL** text box, Paste the **Login URL** : %metadata:singleSignOnServiceUrl% value, which you have copied from the Azure portal.
c. Open the Base64 encoded certificate in notepad, copy its content and paste it into the **Identity Provider Certificate** text box.
d. In **Login Button Text** text box, enter the text of login button.
e. In **First Name** text box, enter **first_name**.
f. In **Last Name** text box, enter **last_name**.
g. In **Email** text box, enter **email**.
h. Select your role as per your requirement from the **EZOfficeInventory Role By default** option.
i. Click **Update**.
## Quick Reference
* **Login URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate EZOfficeInventory with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/ezofficeinventory-tutorial)

Двоичные данные
articles/en-us/incaseofcrisis-mobile/media/properties.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 57 KiB

Просмотреть файл

@ -0,0 +1,37 @@
## Prerequisites
To configure Azure AD integration with In Case of Crisis - Mobile, you need the following items:
- An Azure AD subscription
- An In Case of Crisis - Mobile single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring In Case of Crisis - Mobile for single sign-on
1. Navigate to the **Manage** section on left side of page, click on **Properties tab** then copy the **User access URL** and save it on your computer.
![Single sign-on properties](./media/properties.png)
1. To configure single sign-on on **In Case of Crisis - Mobile** side, you need to send the **[Downloaded Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)** and copied **User access URL** from Azure portal to [In Case of Crisis - Mobile support team](https://www.rockdovesolutions.com/features/enterprise-ready). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Login URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate In Case of Crisis - Mobile with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/in-case-of-crisis-mobile-tutorial)

Просмотреть файл

@ -0,0 +1,32 @@
## Prerequisites
To configure Azure AD integration with Juno Journey, you need the following items:
- An Azure AD subscription
- A Juno Journey single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Juno Journey for single sign-on
To configure single sign-on on **Juno Journey** side, you need to send the **[Downloaded Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)** and appropriate copied URLs from Azure portal to [Juno Journey support team](mailto:support@the-juno.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Login URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate Juno Journey with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/juno-journey-tutorial)

Просмотреть файл

@ -0,0 +1,32 @@
## Prerequisites
To configure Azure AD integration with Learnster, you need the following items:
- An Azure AD subscription
- A Learnster single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Learnster for single sign-on
To configure single sign-on on **Learnster** side, you need to send the **[Downloaded SAML Metadata file](%metadata:metadataDownloadUrl%)** and appropriate copied URLs from Azure portal to [Learnster support team](mailto:support@learnster.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Login URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate Learnster with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/learnster-tutorial)

Просмотреть файл

@ -0,0 +1,30 @@
## Prerequisites
To configure Azure AD integration with Netskope Cloud Security, you need the following items:
- An Azure AD subscription
- A Netskope Cloud Security single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Netskope Cloud Security for single sign-on
To configure single sign-on on **Netskope Cloud Security** side, you need to send the **[Downloaded Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)** and appropriate copied URLs from Azure portal to [Netskope Cloud Security support team](mailto:support@netskope.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate Netskope Cloud Security with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/netskope-cloud-security-tutorial)

Просмотреть файл

@ -0,0 +1,30 @@
## Prerequisites
To configure Azure AD integration with ShipHazmat, you need the following items:
- An Azure AD subscription
- A ShipHazmat single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring ShipHazmat for single sign-on
To configure single sign-on on **ShipHazmat** side, you need to send the **App Federation Metadata Url** to [ShipHazmat support team](mailto:support@bureaudg.com). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
* **[Download SAML Metadata file](%metadata:metadataDownloadUrl%)**
## Additional Resources
* [How to integrate ShipHazmat with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/shiphazmat-tutorial)

Просмотреть файл

@ -0,0 +1,28 @@
## Prerequisites
To configure Azure AD integration with Visit.org, you need the following items:
- An Azure AD subscription
- A Visit.org single sign-on enabled subscription
> **Note:**
> To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a [free account](https://azure.microsoft.com/free/).
### Configuring Visit.org for single sign-on
To configure single sign-on on **Visit.org** side, you need to send the **[Downloaded Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)** and appropriate copied URLs from Azure portal to [Visit.org support team](mailto:tech@visit.org). They set this setting to have the SAML SSO connection set properly on both sides.
## Quick Reference
* **Azure AD Single Sign-On Service URL** : %metadata:singleSignOnServiceUrl%
* **[Download Azure AD Signing Certifcate](%metadata:CertificateDownloadRawUrl%)**
## Additional Resources
* [How to integrate Visit.org with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/visitorg-tutorial)