Skip to content

Commit fb39d07

Browse files
authored
Merge pull request MicrosoftDocs#3937 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents b662576 + 37af015 commit fb39d07

File tree

231 files changed

+2728
-1929
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

231 files changed

+2728
-1929
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15373,7 +15373,13 @@
1537315373
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-tutorial.md",
1537415374
"redirect_url": "/azure/sql-data-warehouse/load-data-from-azure-blob-storage-using-polybase",
1537515375
"redirect_document_id": false
15376+
},
15377+
{
15378+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-provision.md",
15379+
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-portal",
15380+
"redirect_document_id": false
1537615381
}
1537715382

15383+
1537815384
]
1537915385
}

articles/active-directory/active-directory-groups-dynamic-membership-azure-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,7 @@ Allowed operators
162162
| companyName | Any string value or *null* | (user.companyName -eq "value") |
163163
| department |Any string value or *null* |(user.department -eq "value") |
164164
| displayName |Any string value |(user.displayName -eq "value") |
165+
| employeeId |Any string value |(user.employeeId -eq "value")<br>(user.employeeId -ne *null*) |
165166
| facsimileTelephoneNumber |Any string value or *null* |(user.facsimileTelephoneNumber -eq "value") |
166167
| givenName |Any string value or *null* |(user.givenName -eq "value") |
167168
| jobTitle |Any string value or *null* |(user.jobTitle -eq "value") |

articles/active-directory/active-directory-saas-cezannehrsoftware-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 11/22/2017
16+
ms.date: 11/28/2017
1717
ms.author: jeedes
1818

1919
---
@@ -106,11 +106,14 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
106106

107107
![Cezanne HR Software Domain and URLs single sign-on information](./media/active-directory-saas-cezannehrsoftware-tutorial/tutorial_cezannehrsoftware_url.png)
108108

109-
a. In the **Sign-on URL** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/-/optyma`
109+
a. In the **Sign-on URL** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/-/<tenantidentifier>`
110110

111111
b. In the **Identifier** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/`
112112

113-
c. In the **Reply URL** textbox, type the URL: `https://w3.cezanneondemand.com:443/cezanneondemand/-/optyma/Saml/samlp`
113+
c. In the **Reply URL** textbox, type the URL: `https://w3.cezanneondemand.com:443/cezanneondemand/-/<tenantidentifier>/Saml/samlp`
114+
115+
> [!NOTE]
116+
> These values are not real. Update these values with the actual Sign-On URL and Reply URL. Contact [Cezanne HR Software Client support team](https://cezannehr.com/services/support/) to get these values.
114117

115118
4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
116119

@@ -144,7 +147,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
144147

145148
a. Enter the name of your Identity Provider as the **Display Name**.
146149

147-
b. In the **Entity Identifier** textbox, paste the value of **SAML Entity ID** which you have copied from the Azure portal .
150+
b. In the **Entity Identifier** textbox, paste the value of **SAML Entity ID** which you have copied from the Azure portal.
148151

149152
c. Change the **SAML Binding** to 'POST'.
150153

articles/active-directory/active-directory-saas-druva-tutorial.md

Lines changed: 27 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 07/20/2017
16+
ms.date: 11/23/2017
1717
ms.author: jeedes
1818

1919
---
@@ -102,21 +102,27 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
102102

103103
![Single sign-on dialog box](./media/active-directory-saas-druva-tutorial/tutorial_druva_samlbase.png)
104104

105-
3. On the **Druva Domain and URLs** section, perform the following steps:
105+
3. On the **Druva Domain and URLs** section, If you wish to configure the application in **IDP** initiated mode:
106106

107107
![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_url.png)
108108

109-
In the **Sign-on URL** textbox, type the URL: `https://cloud.druva.com/home`
109+
In the **Identifier** textbox, type the string value: `druva-cloud`
110+
111+
4. Check **Show advanced URL settings**. If you wish to configure the application in **SP** initiated mode:
112+
113+
![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_url1.png)
114+
115+
In the **Sign-on URL** textbox, type the URL: `https://cloud.druva.com/home`
110116

111-
4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
117+
5. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
112118

113119
![The Certificate download link](./media/active-directory-saas-druva-tutorial/tutorial_druva_certificate.png)
114120

115-
5. Your Druva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your **SAML Token Attributes** configuration.
121+
6. Your Druva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your **SAML Token Attributes** configuration.
116122

117123
![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_attribute.png)
118124

119-
6. In the **User Attributes** section on the **Single sign-on** dialog, configure SAML token attribute as shown in the preceding image and perform the following steps:
125+
7. In the **User Attributes** section on the **Single sign-on** dialog, configure SAML token attribute as shown in the preceding image and perform the following steps:
120126

121127
| Attribute Name | Attribute Value |
122128
| ------------------- | -------------------- |
@@ -134,47 +140,47 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
134140

135141
d. Click **Ok**.
136142

137-
7. Click **Save** button.
143+
8. Click **Save** button.
138144

139145
![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_general_400.png)
140146

141-
8. On the **Druva Configuration** section, click **Configure Druva** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
147+
9. On the **Druva Configuration** section, click **Configure Druva** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
142148

143149
![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_configure.png)
144150

145-
9. In a different web browser window, log in to your Druva company site as an administrator.
151+
10. In a different web browser window, log in to your Druva company site as an administrator.
146152

147-
10. Go to **Manage \> Settings**.
153+
11. Go to **Manage \> Settings**.
148154

149155
![Settings](./media/active-directory-saas-druva-tutorial/ic795091.png "Settings")
150156

151-
11. On the Single Sign-On Settings dialog, perform the following steps:
157+
12. On the Single Sign-On Settings dialog, perform the following steps:
152158

153159
![Single Sign-On Settings](./media/active-directory-saas-druva-tutorial/ic795092.png "Single Sign-On Settings")
154160

155-
a. Paste **SAML Single Sign-On Service URL** value, which you have copied from the Azure portal into the **ID Provider Login URL** textbox.
156-
157-
b. Paste **Sign-Out URL** value, which you have copied from the Azure portal into the **ID Provider Logout URL** textbox.
158-
159-
c. Open your base-64 encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **ID Provider Certificate** textbox
161+
a. In **ID Provider Login URL** textbox, paste the value of **Single Sign-On Service URL**, which you have copied from Azure portal.
162+
163+
b. In **ID Provider Logout URL** textbox, paste the value of **Sign-Out URL**, which you have copied from Azure portal
164+
165+
c. Open your base-64 encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **ID Provider Certificate** textbox
160166

161-
d. To open the **Settings** page, click **Save**.
167+
d. To open the **Settings** page, click **Save**.
162168

163-
12. On the **Settings** page, click **Generate SSO Token**.
169+
13. On the **Settings** page, click **Generate SSO Token**.
164170

165171
![Settings](./media/active-directory-saas-druva-tutorial/ic795093.png "Settings")
166172

167-
13. On the **Single Sign-on Authentication Token** dialog, perform the following steps:
173+
14. On the **Single Sign-on Authentication Token** dialog, perform the following steps:
168174

169175
![SSO Token](./media/active-directory-saas-druva-tutorial/ic795094.png "SSO Token")
170176

171-
a. Click **Copy**, Paste copied value in the **Value** textbox in the **Add Attribute** section.
177+
a. Click **Copy**, Paste copied value in the **Value** textbox in the **Add Attribute** section in the Azure portal.
172178

173179
b. Click **Close**.
174180

175181
> [!TIP]
176182
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
177-
>
183+
178184

179185
### Create an Azure AD test user
180186

@@ -279,8 +285,6 @@ For more information about the Access Panel, see [Introduction to the Access
279285
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
280286
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)
281287

282-
283-
284288
<!--Image references-->
285289

286290
[1]: ./media/active-directory-saas-druva-tutorial/tutorial_general_01.png

0 commit comments

Comments
 (0)