Skip to content

Commit bd7fc59

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 9309979 + ba7fafe commit bd7fc59

File tree

112 files changed

+2303
-528
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+2303
-528
lines changed

articles/active-directory-b2c/jwt-issuer-technical-profile.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following example shows a technical profile for `JwtIssuer`:
2929
```xml
3030
<TechnicalProfile Id="JwtIssuer">
3131
<DisplayName>JWT Issuer</DisplayName>
32-
<Protocol Name="OpenIdConnect" />
32+
<Protocol Name="None" />
3333
<OutputTokenFormat>JWT</OutputTokenFormat>
3434
<Metadata>
3535
<Item Key="client_id">{service:te}</Item>

articles/active-directory/saas-apps/grovo-tutorial.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -136,11 +136,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136136

137137
2. Go to **Admin** > **Integrations**.
138138

139-
![Grovo Configuration](./media/grovo-tutorial/tutorial_grovo_admin.png)
139+
![Screenshot that shows the "Admin" menu with "Integrations" selected.](./media/grovo-tutorial/tutorial_grovo_admin.png)
140140

141141
3. Click **SET UP** under **SP Initiated SAML 2.0** section.
142142

143-
![Grovo Configuration](./media/grovo-tutorial/tutorial_grovo_setup.png)
143+
![Screenshot that shows the "S P initiated S A M L 2.0" section with the "Set up" button selected.](./media/grovo-tutorial/tutorial_grovo_setup.png)
144144

145145
4. In **SP Initiated SAML 2.0** popup window perform the following steps:
146146

articles/active-directory/saas-apps/gtnexus-sso-module-tutorial.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -95,11 +95,11 @@ To configure Azure AD single sign-on with GTNexus SSO System, perform the follow
9595

9696
a. Click **Upload metadata file**.
9797

98-
![image](common/upload-metadata.png)
98+
![Screenshot that shows the "Basic S A M L Configuration" page with the "Upload metadata file" action selected.](common/upload-metadata.png)
9999

100100
b. Click on **folder logo** to select the metadata file and click **Upload**.
101101

102-
![image](common/browse-upload-metadata.png)
102+
![Screenshot that shows the "Select a file" field with the "folder" logo and "Upload" button selected.](common/browse-upload-metadata.png)
103103

104104
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in GTNexus SSO System section textbox:
105105

articles/active-directory/saas-apps/hackerone-tutorial.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ To configure Azure AD single sign-on with HackerOne, perform the following steps
122122

123123
2. In the menu on the top, click the **Settings**.
124124

125-
![Configure Single Sign-On](./media/hackerone-tutorial/tutorial_hackerone_001.png)
125+
![Screenshot that shows "Settings" selected in the menu.](./media/hackerone-tutorial/tutorial_hackerone_001.png)
126126

127127
3. Navigate to **Authentication** and click **Add SAML settings**.
128128

129-
![Configure Single Sign-On](./media/hackerone-tutorial/tutorial_hackerone_003.png)
129+
![Screenshot that shows the "Authentication Settings" page with the "Add S A M L settings" button selected.](./media/hackerone-tutorial/tutorial_hackerone_003.png)
130130

131131
4. On the **SAML Settings** dialog, perform the following steps:
132132

@@ -142,7 +142,7 @@ To configure Azure AD single sign-on with HackerOne, perform the following steps
142142

143143
5. On the Authentication Settings dialog, perform the following steps:
144144

145-
![Configure Single Sign-On](./media/hackerone-tutorial/tutorial_hackerone_005.png)
145+
![Screenshot that shows the "Authentication Settings" dialog with the "Run test" button selected.](./media/hackerone-tutorial/tutorial_hackerone_005.png)
146146

147147
a. Click **Run test**.
148148

articles/active-directory/saas-apps/halogen-software-tutorial.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -129,15 +129,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
129129

130130
2. Click the **Options** tab.
131131

132-
![What is Azure AD Connect](./media/halogen-software-tutorial/tutorial-halogen-12.png)
132+
![Screenshot that shows the "saba TalentSpace" home page with the "Options" tab selected.](./media/halogen-software-tutorial/tutorial-halogen-12.png)
133133

134134
3. In the left navigation pane, click **SAML Configuration**.
135135

136-
![What is Azure AD Connect](./media/halogen-software-tutorial/tutorial-halogen-13.png)
136+
![Screenshot that shows the "User Interface" left navigation pane with "S A M L Configuration" selected.](./media/halogen-software-tutorial/tutorial-halogen-13.png)
137137

138138
4. On the **SAML Configuration** page, perform the following steps:
139139

140-
![What is Azure AD Connect](./media/halogen-software-tutorial/tutorial-halogen-14.png)
140+
![Screenshot that shows the "S A M L Configuration" page with the "Settings" options highlighted.](./media/halogen-software-tutorial/tutorial-halogen-14.png)
141141

142142
a. As **Unique Identifier**, select **NameID**.
143143

@@ -164,7 +164,7 @@ The objective of this section is to create a user called Britta Simon in Saba Ta
164164

165165
2. Click the **User Center** tab, and then click **Create User**.
166166

167-
![What is Azure AD Connect](./media/halogen-software-tutorial/tutorial-halogen-300.png)
167+
![Screenshot that shows the "User Center" tab and "Create User" selected.](./media/halogen-software-tutorial/tutorial-halogen-300.png)
168168

169169
3. On the **New User** dialog page, perform the following steps:
170170

articles/active-directory/saas-apps/happyfox-tutorial.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -128,19 +128,19 @@ To configure Azure AD single sign-on with HappyFox, perform the following steps:
128128

129129
2. Navigate to **Manage**, click on **Integrations** tab.
130130

131-
![Configure Single Sign-On](./media/happyfox-tutorial/header.png)
131+
![Screenshot that shows the "Manage" page with the "Integrations" tab selected.](./media/happyfox-tutorial/header.png)
132132

133133
3. In the Integrations tab, click **Configure** under **SAML Integration** to open the Single Sign On Settings.
134134

135-
![Configure Single Sign-On](./media/happyfox-tutorial/configure.png)
135+
![Screenshot that shows the "S A M L Integration" setting with the "configure" action selected.](./media/happyfox-tutorial/configure.png)
136136

137137
4. Inside SAML configuration section, paste the **Login URL** value, which you have copied from Azure portal into **SSO Target URL** textbox.
138138

139-
![Configure Single Sign-On](./media/happyfox-tutorial/targeturl.png)
139+
![Screenshot that shows the "S A M L Configuration" section with the "S S O Target U R L" textbox highlighted.](./media/happyfox-tutorial/targeturl.png)
140140

141141
5. Open the certificate downloaded from Azure portal in notepad and paste its content in **IdP Signature** section.
142142

143-
![Configure Single Sign-On](./media/happyfox-tutorial/cert.png)
143+
![Screenshot that shows the "I d P Signature" section highlighted.](./media/happyfox-tutorial/cert.png)
144144

145145
6. Click **Save Settings** button.
146146

articles/active-directory/saas-apps/harness-tutorial.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -135,15 +135,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
135135

136136
4. On the top-right of the page, click on **Continuous Security** > **Access Management** > **Authentication Settings**.
137137

138-
![Harness configuration](./media/harness-tutorial/configure01.png)
138+
![Screenshot that shows the "Continuous Security" menu with "Access Management" and "Authentication Settings" selected.](./media/harness-tutorial/configure01.png)
139139

140140
5. On the **SSO Providers** section, click on **+ Add SSO Providers** > **SAML**.
141141

142-
![Harness configuration](./media/harness-tutorial/configure03.png)
142+
![Screenshot that shows the "S S O Providers" with "+ Add S S O Providers - S A M L" selected.](./media/harness-tutorial/configure03.png)
143143

144144
6. On the **SAML Provider** pop-up, perform the following steps:
145145

146-
![Harness configuration](./media/harness-tutorial/configure02.png)
146+
![Screenshot that shows teh "S A M L Provider" pop-up with the "U R L" and "Display Name" fields highlighted, and the "Choose File" and "Submit" buttons selected.](./media/harness-tutorial/configure02.png)
147147

148148
a. Copy the **In your SSO Provider, please enable SAML-based login, then enter the following URL** instance and paste it in Reply URL textbox in **Basic SAML Configuration** section on Azure portal.
149149

@@ -163,11 +163,11 @@ To enable Azure AD users to sign in to Harness, they must be provisioned into Ha
163163

164164
1. On the top-right of the page, click on **Continuous Security** > **Access Management** > **Users**.
165165

166-
![Harness configuration](./media/harness-tutorial/configure04.png)
166+
![Screenshot that shows the "Continuous Security" menu with "Access Management" and "Users" selected.](./media/harness-tutorial/configure04.png)
167167

168168
1. On the right side of page, click on **+ Add User**.
169169

170-
![Harness configuration](./media/harness-tutorial/configure05.png)
170+
![Screenshot that shows the "Users" page with the "+ Add User" action selected.](./media/harness-tutorial/configure05.png)
171171

172172
1. On the **Add User** pop-up, perform the following steps:
173173

articles/active-directory/saas-apps/header-citrix-netscaler-tutorial.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -390,7 +390,7 @@ To bind a rewrite policy to a virtual server by using the GUI:
390390

391391
1. On the **Load Balancing Virtual Server** pane, under **Advanced Settings**, select **Policies**. All policies that are configured for your NetScaler instance appear in the list.
392392

393-
![Citrix NetScaler configuration - Load Balancing Virtual Server pane](./media/header-citrix-netscaler-tutorial/header05.png)
393+
![Screenshot that shows the "Configuration" tab with the "Name", "Action", and "Expression" fields highlighted and "Create" button selected.](./media/header-citrix-netscaler-tutorial/header05.png)
394394

395395
![Citrix NetScaler configuration - Load Balancing Virtual Server pane](./media/header-citrix-netscaler-tutorial/header06.png)
396396

articles/active-directory/saas-apps/kantegassoforconfluence-tutorial.md

+19-19
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ To configure Azure AD single sign-on with Kantega SSO for Confluence, perform th
9393

9494
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
9595

96-
![Kantega SSO for Confluence Domain and URLs single sign-on information](common/idp-intiated.png)
96+
![Screenshot that shows the "Basic S A M L Configuration" section with the "Identifier" and "Reply U R L" fields highlighted and the "Save" button selected.](common/idp-intiated.png)
9797

9898
a. In the **Identifier** text box, type a URL using the following pattern:
9999
`https://<server-base-url>/plugins/servlet/no.kantega.saml/sp/<uniqueid>/login`
@@ -131,87 +131,87 @@ To configure Azure AD single sign-on with Kantega SSO for Confluence, perform th
131131

132132
1. Hover on cog and click the **Add-ons**.
133133

134-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon1.png)
134+
![Screenshot that shows the "Cog" menu icon and "Add-ons" selected.](./media/kantegassoforconfluence-tutorial/addon1.png)
135135

136136
1. Under **ATLASSIAN MARKETPLACE** tab, click **Find new add-ons**.
137137

138-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon.png)
138+
![Screenshot that shows the "ATTLASSIAN MARKETPLACE" tab with "Find new add-ons" selected.](./media/kantegassoforconfluence-tutorial/addon.png)
139139

140140
1. Search **Kantega SSO for Confluence SAML Kerberos** and click **Install** button to install the new SAML plugin.
141141

142-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon2.png)
142+
![Screenshot that shows the "Find new add-ons" page with "Kantega S S O for Confluence S A M L Kerberos" in the search box and the "Install" button selected.](./media/kantegassoforconfluence-tutorial/addon2.png)
143143

144144
1. The plugin installation starts.
145145

146-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon3.png)
146+
![Screenshot that shows the plugin "Installing" screen.](./media/kantegassoforconfluence-tutorial/addon3.png)
147147

148148
1. Once the installation is complete. Click **Close**.
149149

150-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon33.png)
150+
![Screenshot that shows the "Installed and ready to go" screen with the "Close" action selected.](./media/kantegassoforconfluence-tutorial/addon33.png)
151151

152152
1. Click **Manage**.
153153

154-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon34.png)
154+
![Screenshot that shows the "Kantega Single Sign-on with Kerberos and S A M L" plugin with the "Manage" button selected.](./media/kantegassoforconfluence-tutorial/addon34.png)
155155

156156
1. Click **Configure** to configure the new plugin.
157157

158-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon35.png)
158+
![Screenshot that shows the "Kantega Single Sign-on with Kerberos and S A M L" page with the "Configure" button selected.](./media/kantegassoforconfluence-tutorial/addon35.png)
159159

160160
1. This new plugin can also be found under **USERS & SECURITY** tab.
161161

162-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon36.png)
162+
![Screenshot that shows the "USERS & SECURITY" tab with the "Kantega Single Sign-on" action selected.](./media/kantegassoforconfluence-tutorial/addon36.png)
163163

164164
1. In the **SAML** section. Select **Azure Active Directory (Azure AD)** from the **Add identity provider** dropdown.
165165

166-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon4.png)
166+
![Screenshot that shows the "S A M L" section with "Add Identity provider" and "Azure Active Directory (Azure AD)" selected.](./media/kantegassoforconfluence-tutorial/addon4.png)
167167

168168
1. Select subscription level as **Basic**.
169169

170-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon5.png)
170+
![Screenshot that shows the "Preparing Azure AD" page with "Basic" selected.](./media/kantegassoforconfluence-tutorial/addon5.png)
171171

172172
1. On the **App properties** section, perform following steps:
173173

174-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon6.png)
174+
![Screenshot that shows the "App properties" section with the "App I D U R L" field and "Copy" button highlighted, and the "Next" button selected.](./media/kantegassoforconfluence-tutorial/addon6.png)
175175

176176
a. Copy the **App ID URI** value and use it as **Identifier, Reply URL, and Sign-On URL** on the **Basic SAML Configuration** section in Azure portal.
177177

178178
b. Click **Next**.
179179

180180
1. On the **Metadata import** section, perform following steps:
181181

182-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon7.png)
182+
![Screenshot that shows the "Metadata import" section with "Metadata file on my computer" selected.](./media/kantegassoforconfluence-tutorial/addon7.png)
183183

184184
a. Select **Metadata file on my computer**, and upload metadata file, which you have downloaded from Azure portal.
185185

186186
b. Click **Next**.
187187

188188
1. On the **Name and SSO location** section, perform following steps:
189189

190-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon8.png)
190+
![Screenshot that shows the "Name and S S O location" with the "Identity provider name" textbox highlighted, and the "Next" button selected.](./media/kantegassoforconfluence-tutorial/addon8.png)
191191

192192
a. Add Name of the Identity Provider in **Identity provider name** textbox (e.g Azure AD).
193193

194194
b. Click **Next**.
195195

196196
1. Verify the Signing certificate and click **Next**.
197197

198-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon9.png)
198+
![Screenshot that shows the "Signature verification" section with the "Next" button selected.](./media/kantegassoforconfluence-tutorial/addon9.png)
199199

200200
1. On the **Confluence user accounts** section, perform following steps:
201201

202-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon10.png)
202+
![Screenshot that shows the "Confluence user accounts" section with the"Create users in Confluence's Internal Directory if needed" option and "Next" button selected.](./media/kantegassoforconfluence-tutorial/addon10.png)
203203

204204
a. Select **Create users in Confluence's internal Directory if needed** and enter the appropriate name of the group for users (can be multiple no. of groups separated by comma).
205205

206206
b. Click **Next**.
207207

208208
1. Click **Finish**.
209209

210-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon11.png)
210+
![Screenshot of the "Summary" page with the "Finish" button selected.](./media/kantegassoforconfluence-tutorial/addon11.png)
211211

212212
1. On the **Known domains for Azure AD** section, perform following steps:
213213

214-
![Configure Single Sign-On](./media/kantegassoforconfluence-tutorial/addon12.png)
214+
![Screenshot that shows the "Known domains for Azure AD" page with the "Known domains" textbox highlighted and the "Save" button selected.](./media/kantegassoforconfluence-tutorial/addon12.png)
215215

216216
a. Select **Known domains** from the left panel of the page.
217217

@@ -280,7 +280,7 @@ To enable Azure AD users to sign in to Confluence, they must be provisioned into
280280

281281
1. Hover on cog and click the **User management**.
282282

283-
![Add Employee](./media/kantegassoforconfluence-tutorial/user1.png)
283+
![Screenshot that shows the "Cog" icon and "User management" selected.](./media/kantegassoforconfluence-tutorial/user1.png)
284284

285285
1. Under Users section, click **Add Users** tab. On the **Add a User** dialog page, perform the following steps:
286286

0 commit comments

Comments
 (0)