Skip to content

Commit 541bb46

Browse files
authored
Merge pull request #133365 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 50802bf + b99bb0b commit 541bb46

File tree

115 files changed

+706
-477
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+706
-477
lines changed

articles/active-directory/saas-apps/apple-business-manager-provision-tutorial.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ Once you've configured provisioning, use the following resources to monitor your
158158
* [Manage existing SCIM token and connections in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdc9a823611)
159159
* [Disconnect the SCIM connection in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd609be3a61)
160160
* [Manage existing SCIM token and connections in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apdc9a8236e9)
161-
* [Troubleshooting the SCIM connection in Apple Business Manager](URL=https://support.apple.com/guide/apple-business-manager/apd403a0f3bd)
161+
* [Troubleshooting the SCIM connection in Apple Business Manager](https://support.apple.com/guide/apple-business-manager/apd403a0f3bd/web)
162162

163163
## Next steps
164164

articles/active-directory/saas-apps/cinode-provisioning-tutorial.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
5151

5252
3. Navigate to **Tokens** and create a new token.
5353

54-
4. Enter a unique name, select https://api.cinode.app/scim/v2 as Audience, and set an expiry date appropriately.
54+
4. Enter a unique name, select **'https://api.cinode.app/scim/v2'** as Audience, and set an expiry date appropriately.
5555

5656
5. Click **Create token**.
5757

articles/active-directory/saas-apps/mimecast-admin-console-tutorial.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -150,23 +150,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150150

151151
1. Navigate to **Administration** > **Services** > **Applications**.
152152

153-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/services.png)
153+
![Screenshot shows Mimecast window with Applications selected.](./media/mimecast-admin-console-tutorial/services.png)
154154

155155
1. Click **Authentication Profiles** tab.
156156

157-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/authentication-profiles.png)
157+
![Screenshot shows the Application tab with Authentication Profiles selected.](./media/mimecast-admin-console-tutorial/authentication-profiles.png)
158158

159159
1. Click **New Authentication Profile** tab.
160160

161-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/new-authenticatio-profile.png)
161+
![Screenshot shows New Authentication Profile selected.](./media/mimecast-admin-console-tutorial/new-authenticatio-profile.png)
162162

163163
1. Provide a valid description in the **Description** textbox and select **Enforce SAML Authentication for Administration Console** checkbox.
164164

165-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/selecting-admin-consle.png)
165+
![Screenshot shows where to select Enforce SAML Authentication for Administration Console.](./media/mimecast-admin-console-tutorial/selecting-admin-consle.png)
166166

167167
1. On the **SAML Configuration for Administration Console** page, perform the following steps:
168168

169-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/sso-settings.png)
169+
![Screenshot shows the SAML Configuration for Administration Console page where you can enter the values described.](./media/mimecast-admin-console-tutorial/sso-settings.png)
170170

171171
a. For **Provider**, select **Azure Active Directory** from the Dropdown.
172172

@@ -184,19 +184,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184184

185185
1. Navigate to **Administration** > **Directories** > **Internal Directories**.
186186

187-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/internal-directories.png)
187+
![Screenshot shows Mimecast window with Internal Directories selected.](./media/mimecast-admin-console-tutorial/internal-directories.png)
188188

189189
1. Select on your domain, if the domain is mentioned below, otherwise please create a new domain by clicking on the **New Domain**.
190190

191-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/domain-name.png)
191+
![Screenshot shows the domain selected.](./media/mimecast-admin-console-tutorial/domain-name.png)
192192

193193
1. Click **New Address** tab.
194194

195-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/new-address.png)
195+
![Screenshot shows New Address selected.](./media/mimecast-admin-console-tutorial/new-address.png)
196196

197197
1. Provide the required user information on the following page:
198198

199-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/user-information.png)
199+
![Screenshot shows the page where you can enter the values described.](./media/mimecast-admin-console-tutorial/user-information.png)
200200

201201
a. In the **Email Address** textbox, enter the email address of the user like `[email protected]`.
202202

@@ -210,7 +210,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210210

211211
f. To assign roles to the user, click on **Role Edit** and assign the required role to user as per your organization requirement.
212212

213-
![Mimecast Admin Console Configuration](./media/mimecast-admin-console-tutorial/assign-role.png)
213+
![Screenshot shows Address Settings where you can select Role Edit.](./media/mimecast-admin-console-tutorial/assign-role.png)
214214

215215
## Test SSO
216216

articles/active-directory/saas-apps/mimecast-personal-portal-tutorial.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -150,23 +150,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150150

151151
1. Navigate to **Administration** > **Services** > **Applications**.
152152

153-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/services.png)
153+
![Screenshot shows Mimecast window with Applications selected.](./media/mimecast-personal-portal-tutorial/services.png)
154154

155155
1. Click **Authentication Profiles** tab.
156156

157-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/authentication-profiles.png)
157+
![Screenshot shows the Application tab with Authentication Profiles selected.](./media/mimecast-personal-portal-tutorial/authentication-profiles.png)
158158

159159
1. Click **New Authentication Profile** tab.
160160

161-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/new-authenticatio-profile.png)
161+
![Screenshot shows new Authentication Profile selected.](./media/mimecast-personal-portal-tutorial/new-authenticatio-profile.png)
162162

163163
1. Provide a valid description in the **Description** textbox and select **Enforce SAML Authentication for Mimecast Personal Portal** checkbox.
164164

165-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/selecting-personal-portal.png)
165+
![Screenshot shows New Authentication Profile selected.](./media/mimecast-personal-portal-tutorial/selecting-personal-portal.png)
166166

167167
1. On the **SAML Configuration for Mimecast Personal Portal** page, perform the following steps:
168168

169-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/sso-settings.png)
169+
![Screenshot shows where to select Enforce SAML Authentication for Administration Console.](./media/mimecast-personal-portal-tutorial/sso-settings.png)
170170

171171
a. For **Provider**, select **Azure Active Directory** from the Dropdown.
172172

@@ -184,19 +184,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184184

185185
1. Navigate to **Administration** > **Directories** > **Internal Directories**.
186186

187-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/internal-directories.png)
187+
![Screenshot shows the SAML Configuration for Mimecast Personal Portal where you can enter the values described.](./media/mimecast-personal-portal-tutorial/internal-directories.png)
188188

189189
1. Select on your domain, if the domain is mentioned below, otherwise please create a new domain by clicking on the **New Domain**.
190190

191-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/domain-name.png)
191+
![Screenshot shows Mimecast window with Internal Directories selected.](./media/mimecast-personal-portal-tutorial/domain-name.png)
192192

193193
1. Click **New Address** tab.
194194

195-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/new-address.png)
195+
![Screenshot shows the domain selected.](./media/mimecast-personal-portal-tutorial/new-address.png)
196196

197197
1. Provide the required user information on the following page:
198198

199-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/user-information.png)
199+
![Screenshot shows the page where you can enter the values described.](./media/mimecast-personal-portal-tutorial/user-information.png)
200200

201201
a. In the **Email Address** textbox, enter the email address of the user like `[email protected]`.
202202

@@ -210,7 +210,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210210

211211
f. To assign roles to the user, click on **Role Edit** and assign the required role to user as per your organization requirement.
212212

213-
![Mimecast Personal Portal Configuration](./media/mimecast-personal-portal-tutorial/assign-role.png)
213+
![Screenshot shows Address Settings where you can select Role Edit.](./media/mimecast-personal-portal-tutorial/assign-role.png)
214214

215215

216216
## Test SSO

articles/active-directory/saas-apps/mitel-connect-tutorial.md

+15-15
Original file line numberDiff line numberDiff line change
@@ -106,15 +106,15 @@ To configure MiCloud Connect with SSO for Azure AD, it is easiest to open the Az
106106

107107
4. In the Azure portal, select the **Edit** icon in the **Basic SAML Configuration** section.
108108

109-
![image](common/edit-urls.png)
109+
![Screenshot shows the Set up Single Sign-On with SAML page with the edit icon selected.](common/edit-urls.png)
110110

111111
The Basic SAML Configuration dialog box appears.
112112

113113
5. Copy the URL from the **Mitel Identifier (Entity ID)** field in the Mitel Account portal and paste it into the **Identifier (Entity ID)** field in the Azure portal.
114114

115115
6. Copy the URL from the **Reply URL (Assertion Consumer Service URL)** field in the Mitel Account portal and paste it into the **Reply URL (Assertion Consumer Service URL)** field in the Azure portal.
116116

117-
![image](./media/mitel-connect-tutorial/mitel-azure-basic-configuration.png)
117+
![Screenshot shows Basic SAML Configuration in the Azure portal and the Set Up Identity Provider section in the Mitel Account portal with lines indicating the relationship between them.](./media/mitel-connect-tutorial/mitel-azure-basic-configuration.png)
118118

119119
7. In the **Sign-on URL** text box, type one of the following URLs:
120120

@@ -128,19 +128,19 @@ To configure MiCloud Connect with SSO for Azure AD, it is easiest to open the Az
128128

129129
9. In the **SAML Signing Certificate** section on the **SAML-based sign-on** page in the Azure portal, select **Download** next to **Certificate (Base64)** to download the **Signing Certificate** and save it to your computer.
130130

131-
![image](./media/mitel-connect-tutorial/azure-signing-certificate.png)
131+
![Screenshot shows the SAML Signing Certificate pane where you can download a certificate.](./media/mitel-connect-tutorial/azure-signing-certificate.png)
132132

133133
10. Open the Signing Certificate file in a text editor, copy all data in the file, and then paste the data in the **Signing Certificate** field in the Mitel Account portal.
134134

135-
![image](./media/mitel-connect-tutorial/mitel-connect-signing-certificate.png)
135+
![Screenshot shows the Signing Certificate field.](./media/mitel-connect-tutorial/mitel-connect-signing-certificate.png)
136136

137137
11. In the **Setup Mitel Connect** section on the **SAML-based sign-on** page of the Azure portal:
138138

139139
1. Copy the URL from the **Login URL** field and paste it into the **Sign-in URL** field in the Mitel Account portal.
140140

141141
1. Copy the URL from the **Azure AD Identifier** field and paste it into the **Entity ID** field in the Mitel Account portal.
142142

143-
![image](./media/mitel-connect-tutorial/mitel-azure-set-up-connect.png)
143+
![Screenshot shows the relationship between the SAML-based sign-on page of the Azure portal and the Mitel Account portal.](./media/mitel-connect-tutorial/mitel-azure-set-up-connect.png)
144144

145145
12. Select **Save** on the **Connect Single Sign-On Settings** dialog box in the Mitel Account portal.
146146

@@ -235,7 +235,7 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
235235

236236
The **SAML-based Sign-on** page opens, displaying the **Basic SAML Configuration** section.
237237

238-
![image](./media/mitel-connect-tutorial/mitel-azure-saml-settings.png)
238+
![Screenshot shows the SAML-based Sign-on page with Basic SAML Configuration.](./media/mitel-connect-tutorial/mitel-azure-saml-settings.png)
239239

240240
2. To access the **Azure AD Single Sign On** configuration panel in the CloudLink Accounts portal:
241241

@@ -245,33 +245,33 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
245245

246246
1. Select the **3rd party** tab. A list of supported third-party applications is displayed. Select the **Add** button associated with **Azure AD Single Sign On**, and select **Done**.
247247

248-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-integrations.png)
248+
![Screenshot shows the Integrations page where you can add Azure A D Single Sign-On.](./media/mitel-connect-tutorial/mitel-cloudlink-integrations.png)
249249

250250
The **Azure AD Single Sign On** is enabled for the customer account and is added to the **Integrations** section of the **Account Information** page.
251251

252252
1. Select **Complete Setup**.
253253

254-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-complete-setup.png)
254+
![Screenshot shows the Complete Setup option for Azure A D Single Sign-On.](./media/mitel-connect-tutorial/mitel-cloudlink-complete-setup.png)
255255

256256
The **Azure AD Single Sign On** configuration panel opens.
257257

258-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-sso-setup.png)
258+
![Screenshot shows Azure A D Single Sign-On configuration.](./media/mitel-connect-tutorial/mitel-cloudlink-sso-setup.png)
259259

260260
Mitel recommends that the **Enable Mitel Credentials (Optional)** check box in the **Optional Mitel credentials** section is not selected. Select this check box only if you want the user to sign in to the CloudLink application using the Mitel credentials in addition to the single sign-on option.
261261

262262
3. In the Azure portal, from the **SAML-based Sign-on** page, select the **Edit** icon in the **Basic SAML Configuration** section. The **Basic SAML Configuration** panel opens.
263263

264-
![image](./media/mitel-connect-tutorial/mitel-azure-saml-basic.png)
264+
![Screenshot shows the Basic SAML Configuration pane with the Edit icon selected.](./media/mitel-connect-tutorial/mitel-azure-saml-basic.png)
265265

266266
4. Copy the URL from the **Mitel Identifier (Entity ID)** field in the CloudLink Accounts portal and paste it into the **Identifier (Entity ID)** field in the Azure portal.
267267

268268
5. Copy the URL from the **Reply URL (Assertion Consumer Service URL)** field in the CloudLink Accounts portal and paste it into the **Reply URL (Assertion Consumer Service URL)** field in the Azure portal.
269269

270-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-saml-mapping.png)
270+
![Screenshot shows the relation between pages in the CloudLink Accounts portal and the Azure portal.](./media/mitel-connect-tutorial/mitel-cloudlink-saml-mapping.png)
271271

272272
6. In the **Sign-on URL** text box, type the URL `https://accounts.mitel.io` to use the CloudLink Accounts portal as your default Mitel application.
273273

274-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-sign-on-url.png)
274+
![Screenshot shows the Sign on U R L text box.](./media/mitel-connect-tutorial/mitel-cloudlink-sign-on-url.png)
275275

276276
> [!NOTE]
277277
> The default Mitel application is the application that opens when a user selects the Mitel Connect tile in the Access Panel. This is also the application accessed when the user configures a test setup from Azure AD.
@@ -280,22 +280,22 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
280280

281281
8. In the **SAML Signing Certificate** section on the **SAML-based sign-on** page in the Azure portal, select **Download** beside **Certificate (Base64)** to download the **Signing Certificate**. Save the certificate on your computer.
282282

283-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-save-certificate.png)
283+
![Screenshot shows the SAML Signing Certificate section where you can download a Base64 certificate.](./media/mitel-connect-tutorial/mitel-cloudlink-save-certificate.png)
284284

285285
9. Open the Signing Certificate file in a text editor, copy all data in the file, and then paste the data into the **Signing Certificate** field in the CloudLink Accounts portal.
286286

287287
> [!NOTE]
288288
> If you have more than one certificate, we recommend that you paste them one after the other.
289289
290-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-enter-certificate.png)
290+
![Screenshot shows Step two of the procedure where you fill in values from your Azure A D integration.](./media/mitel-connect-tutorial/mitel-cloudlink-enter-certificate.png)
291291

292292
10. In the **Set up Mitel Connect** section on the **SAML-based sign-on** page of the Azure portal:
293293

294294
1. Copy the URL from the **Login URL** field and paste it into the **Sign-in URL** field in the CloudLink Accounts portal.
295295

296296
1. Copy the URL from the **Azure AD Identifier** field and paste it into the **IDP Identifier (Entity ID)** field in the CloudLink Accounts portal.
297297

298-
![image](./media/mitel-connect-tutorial/mitel-cloudlink-copy-settings.png)
298+
![Screenshot shows the source for the values described here in Mintel Connect.](./media/mitel-connect-tutorial/mitel-cloudlink-copy-settings.png)
299299

300300
11. Select **Save** on the **Azure AD Single Sign On** panel in the CloudLink Accounts portal.
301301

articles/active-directory/saas-apps/mixpanel-tutorial.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -125,15 +125,15 @@ To configure Azure AD single sign-on with Mixpanel, perform the following steps:
125125

126126
3. Click the **Access security** tab, and then click **Change settings**.
127127

128-
![Mixpanel Settings](./media/mixpanel-tutorial/tutorial_mixpanel_08.png)
128+
![Screenshot shows the Access security tab where you can change settings.](./media/mixpanel-tutorial/tutorial_mixpanel_08.png)
129129

130130
4. On the **Change your certificate** dialog page, click **Choose file** to upload your downloaded certificate, and then click **NEXT**.
131131

132-
![Mixpanel Settings](./media/mixpanel-tutorial/tutorial_mixpanel_09.png)
132+
![Screenshot shows the Change your certificate dialog box where you can choose a certificate file.](./media/mixpanel-tutorial/tutorial_mixpanel_09.png)
133133

134134
5. In the authentication URL textbox on the **Change your authentication URL** dialog page, paste the value of **Login URL** which you have copied from Azure portal, and then click **NEXT**.
135135

136-
![Mixpanel Settings](./media/mixpanel-tutorial/tutorial_mixpanel_10.png)
136+
![Screenshot shows the Change your authentication U R L pane where you can copy your Login U R L.](./media/mixpanel-tutorial/tutorial_mixpanel_10.png)
137137

138138
6. Click **Done**.
139139

@@ -200,7 +200,7 @@ The objective of this section is to create a user called Britta Simon in Mixpane
200200

201201
4. In the **team member** textbox, type Britta's email address in the Azure.
202202

203-
![Mixpanel Settings](./media/mixpanel-tutorial/tutorial_mixpanel_11.png)
203+
![Screenshot shows the Team tab where you add an address to Invite.](./media/mixpanel-tutorial/tutorial_mixpanel_11.png)
204204

205205
5. Click **Invite**.
206206

articles/active-directory/saas-apps/mobi-tutorial.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ To configure Azure AD single sign-on with MOBI, perform the following steps:
9393

9494
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
9595

96-
![MOBI Domain and URLs single sign-on information](common/idp-intiated.png)
96+
![Screenshot shows the Basic SAML Configuration, where you can enter Identifier, Reply U R L, and select Save.](common/idp-intiated.png)
9797

9898
a. In the **Identifier** text box, type a URL using the following pattern:
9999
`https://<subdomain>.thefutureis.mobi`
@@ -103,7 +103,7 @@ To configure Azure AD single sign-on with MOBI, perform the following steps:
103103

104104
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
105105

106-
![MOBI Domain and URLs single sign-on information](common/metadata-upload-additional-signon.png)
106+
![Screenshot shows Set additional U R Ls where you can enter a Sign on U R L.](common/metadata-upload-additional-signon.png)
107107

108108
In the **Sign-on URL** text box, type a URL using the following pattern:
109109
`https://<subdomain>.thefutureis.mobi/login`

0 commit comments

Comments
 (0)