Skip to content

Commit 346cca4

Browse files
authored
Merge pull request MicrosoftDocs#1615 from Microsoft/FromPrivateRepo
From private repo
2 parents 7e878a9 + 4afb40d commit 346cca4

File tree

93 files changed

+1959
-1125
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+1959
-1125
lines changed
Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
---
2+
title: 'Tutorial: Configuring LinkedIn Elevate for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to LinkedIn Elevate.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: asmalser-msft
7+
writer: asmalser-msft
8+
manager: stevenpo
9+
10+
ms.assetid: d4ca2365-6729-48f7-bb7f-c0f5ffe740a3
11+
ms.service: active-directory
12+
ms.workload: identity
13+
ms.tgt_pltfrm: na
14+
ms.devlang: na
15+
ms.topic: article
16+
ms.date: 04/15/2017
17+
ms.author: asmalser-msft
18+
---
19+
20+
# Tutorial: Configuring LinkedIn Elevate for Automatic User Provisioning
21+
22+
23+
The objective of this tutorial is to show you the steps you need to perform in LinkedIn Elevate and Azure AD to automatically provision and de-provision user accounts from Azure AD to LinkedIn Elevate.
24+
25+
## Prerequisites
26+
27+
The scenario outlined in this tutorial assumes that you already have the following items:
28+
29+
* An Azure Active Directory tenant
30+
* A LinkedIn Elevate tenant
31+
* An administrator account in LinkedIn Elevate with access to the LinkedIn Account Center
32+
33+
> [!NOTE]
34+
> Azure Active Directory integrates with LinkedIn Elevate using the [SCIM](http://www.simplecloud.info/) protocol.
35+
36+
## Assigning users to LinkedIn Elevate
37+
38+
Azure Active Directory uses a concept called "assignments" to determine which users should receive access to selected apps. In the context of automatic user account provisioning, only the users and groups that have been "assigned" to an application in Azure AD will be synchronized.
39+
40+
Before configuring and enabling the provisioning service, you will need to decide what users and/or groups in Azure AD represent the users who need access to LinkedIn Elevate. Once decided, you can assign these users to LinkedIn Elevate by following the instructions here:
41+
42+
[Assign a user or group to an enterprise app](active-directory-coreapps-assign-user-azure-portal.md)
43+
44+
### Important tips for assigning users to LinkedIn Elevate
45+
46+
* It is recommended that a single Azure AD user be assigned to LinkedIn Elevate to test the provisioning configuration. Additional users and/or groups may be assigned later.
47+
48+
* When assigning a user to LinkedIn Elevate, you must select the **User** role in the assignment dialog. The "Default Access" role does not work for provisioning.
49+
50+
51+
## Configuring user provisioning to LinkedIn Elevate
52+
53+
This section guides you through connecting your Azure AD to LinkedIn Elevate's SCIM user account provisioning API, and configuring the provisioning service to create, update and disable assigned user accounts in LinkedIn Elevate based on user and group assignment in Azure AD.
54+
55+
**Tip:** You may also choose to enabled SAML-based Single Sign-On for LinkedIn Elevate, following the instructions provided in [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features complement each other.
56+
57+
58+
### To configure automatic user account provisioning to LinkedIn Elevate in Azure AD:
59+
60+
61+
The first step is to retrieve your LinkedIn access token. If you are an Enterprise administrator, you can self-provision an
62+
access token. In your account center, go to **Settings > Global Settings** and open the **SCIM Setup** panel.
63+
64+
> [!NOTE]
65+
> If you are accessing the account center directly rather than through a link, you can reach it using the following steps.
66+
67+
1) Sign in to Account Center.
68+
69+
2) Select **Admin > Admin Settings** .
70+
71+
3) Click **Advanced Integrations** on the left sidebar. You are
72+
directed to the account center.
73+
74+
4) Click **+ Add new SCIM configuration** and follow the procedure by
75+
filling in each field.
76+
77+
> When auto­assign licenses is not enabled, it means that only user
78+
> data is synced.
79+
80+
![LinkedIn Elevate Provisioning](./media/active-directory-saas-linkedin-elevate-provisioning-tutorial/linkedin_elevate1.PNG)
81+
82+
> When auto­license assignment is enabled, you need to note the
83+
> application instance and license type. Licenses are assigned on a
84+
> first come, first serve basis until all the licenses are taken.
85+
86+
![LinkedIn Elevate Provisioning](./media/active-directory-saas-linkedin-elevate-provisioning-tutorial/linkedin_elevate2.PNG)
87+
88+
5) Click **Generate token**. You should see your access token display
89+
under the **Access token** field.
90+
91+
6) Save your access token to your clipboard or computer before leaving
92+
the page.
93+
94+
7) Next, sign in to the [Azure portal](https://portal.azure.com), and browse to the **Azure Active Directory > Enterprise Apps > All applications** section.
95+
96+
8) If you have already configured LinkedIn Elevate for single sign-on, search for your instance of LinkedIn Elevate using the search field. Otherwise, select **Add** and search for **LinkedIn Elevate** in the application gallery. Select LinkedIn Elevate from the search results, and add it to your list of applications.
97+
98+
9) Select your instance of LinkedIn Elevate, then select the **Provisioning** tab.
99+
100+
10) Set the **Provisioning Mode** to **Automatic**.
101+
102+
![LinkedIn Elevate Provisioning](./media/active-directory-saas-linkedin-elevate-provisioning-tutorial/linkedin_elevate3.PNG)
103+
104+
11) Fill in the following fields under **Admin Credentials** :
105+
106+
* In the **Tenant URL** field, enter https://api.linkedin.com.
107+
108+
* In the **Secret Token** field, enter the access token you generated in step 1 and click **Test Connection** .
109+
110+
* You should see a success notification on the upper­right side of
111+
your portal.
112+
113+
12) Enter the email address of a person or group who should receive provisioning error notifications in the **Notification Email** field, and check the checkbox below.
114+
115+
13) Click **Save**.
116+
117+
14) In the **Attribute Mappings** section, review the user and group attributes that will be synchronized from Azure AD to LinkedIn Elevate. Note that the attributes selected as **Matching** properties will be used to match the user accounts and groups in LinkedIn Elevate for update operations. Select the Save button to commit any changes.
118+
119+
![LinkedIn Elevate Provisioning](./media/active-directory-saas-linkedin-elevate-provisioning-tutorial/linkedin_elevate4.PNG)
120+
121+
15) To enable the Azure AD provisioning service for LinkedIn Elevate, change the **Provisioning Status** to **On** in the **Settings** section
122+
123+
16) Click **Save**.
124+
125+
This will start the initial synchronization of any users and/or groups assigned to LinkedIn Elevate in the Users and Groups section. Note that the initial sync will take longer to perform than subsequent syncs, which occur approximately every 20 minutes as long as the service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity reports, which describe all actions performed by the provisioning service on your LinkedIn Elevate app.
126+
127+
128+
## Additional Resources
129+
130+
* [Managing user account provisioning for Enterprise Apps](active-directory-enterprise-apps-manage-provisioning.md)
131+
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)
Lines changed: 225 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,225 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory integration with Wingspan eTMF | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Wingspan eTMF.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: femila
8+
9+
ms.assetid: ace320d3-521c-449c-992f-feabe7538de7
10+
ms.service: active-directory
11+
ms.workload: identity
12+
ms.tgt_pltfrm: na
13+
ms.devlang: na
14+
ms.topic: article
15+
ms.date: 04/19/2017
16+
ms.author: jeedes
17+
18+
---
19+
# Tutorial: Azure Active Directory integration with Wingspan eTMF
20+
21+
In this tutorial, you learn how to integrate Wingspan eTMF with Azure Active Directory (Azure AD).
22+
23+
Integrating Wingspan eTMF with Azure AD provides you with the following benefits:
24+
25+
- You can control in Azure AD who has access to Wingspan eTMF
26+
- You can enable your users to automatically get signed-on to Wingspan eTMF (Single Sign-On) with their Azure AD accounts
27+
- You can manage your accounts in one central location - the Azure portal
28+
29+
If you want to know more details about SaaS app integration with Azure AD, see [what is application access and single sign-on with Azure Active Directory](active-directory-appssoaccess-whatis.md).
30+
31+
## Prerequisites
32+
33+
To configure Azure AD integration with Wingspan eTMF, you need the following items:
34+
35+
- An Azure AD subscription
36+
- A Wingspan eTMF single-sign on enabled subscription
37+
38+
> [!NOTE]
39+
> To test the steps in this tutorial, we do not recommend using a production environment.
40+
41+
To test the steps in this tutorial, you should follow these recommendations:
42+
43+
- Do not use your production environment, unless it is necessary.
44+
- If you don't have an Azure AD trial environment, you can get a one-month trial [here](https://azure.microsoft.com/pricing/free-trial/).
45+
46+
## Scenario description
47+
In this tutorial, you test Azure AD single sign-on in a test environment.
48+
The scenario outlined in this tutorial consists of two main building blocks:
49+
50+
1. Adding Wingspan eTMF from the gallery
51+
2. Configuring and testing Azure AD single sign-on
52+
53+
## Adding Wingspan eTMF from the gallery
54+
To configure the integration of Wingspan eTMF into Azure AD, you need to add Wingspan eTMF from the gallery to your list of managed SaaS apps.
55+
56+
**To add Wingspan eTMF from the gallery, perform the following steps:**
57+
58+
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
59+
60+
![Active Directory][1]
61+
62+
2. Navigate to **Enterprise applications**. Then go to **All applications**.
63+
64+
![Applications][2]
65+
66+
3. To add new application, click **New application** button on the top of dialog.
67+
68+
![Applications][3]
69+
70+
4. In the search box, type **Wingspan eTMF**.
71+
72+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_search.png)
73+
74+
5. In the results panel, select **Wingspan eTMF**, and then click **Add** button to add the application.
75+
76+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_addfromgallery.png)
77+
78+
## Configuring and testing Azure AD single sign-on
79+
In this section, you configure and test Azure AD single sign-on with Wingspan eTMF based on a test user called "Britta Simon."
80+
81+
For single sign-on to work, Azure AD needs to know what the counterpart user in Wingspan eTMF is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in Wingspan eTMF needs to be established.
82+
83+
This link relationship is established by assigning the value of the **user name** in Azure AD as the value of the **Username** in Wingspan eTMF.
84+
85+
To configure and test Azure AD single sign-on with Wingspan eTMF, you need to complete the following building blocks:
86+
87+
1. **[Configuring Azure AD Single Sign-On](#configuring-azure-ad-single-sign-on)** - to enable your users to use this feature.
88+
2. **[Creating an Azure AD test user](#creating-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
89+
3. **[Creating a Wingspan eTMF test user](#creating-a-wingspan-etmf-test-user)** - to have a counterpart of Britta Simon in Wingspan eTMF that is linked to the Azure AD representation of user.
90+
4. **[Assigning the Azure AD test user](#assigning-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
91+
5. **[Testing Single Sign-On](#testing-single-sign-on)** - to verify whether the configuration works.
92+
93+
### Configuring Azure AD single sign-on
94+
95+
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your Wingspan eTMF application.
96+
97+
**To configure Azure AD single sign-on with Wingspan eTMF, perform the following steps:**
98+
99+
1. In the Azure portal, on the **Wingspan eTMF** application integration page, click **Single sign-on**.
100+
101+
![Configure Single Sign-On][4]
102+
103+
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
104+
105+
![Configure Single Sign-On](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_samlbase.png)
106+
107+
3. On the **Wingspan eTMF Domain and URLs** section, perform the following steps:
108+
109+
![Configure Single Sign-On](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_url11.png)
110+
111+
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<customer name>.<instance name>.mywingspan.com/saml`
112+
113+
b. In the **Identifier** textbox, type a URL using the following pattern: `http://saml.<instance name>.wingspan.com/shibboleth`
114+
115+
c. In the **Reply URL** textbox, type a URL using the following pattern: `https://<customer name>.<instance name>.mywingspan.com/`
116+
117+
> [!NOTE]
118+
> These values are not the real. Update these values with the actual Sign-On URL, Identifier and Reply URL including the actual customer name and instance name. Contact [Wingspan eTMF Client support team](http://www.wingspan.com/contact-us/) to get these values.
119+
120+
4. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer.
121+
122+
![Configure Single Sign-On](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_certificate.png)
123+
124+
5. Click **Save** button.
125+
126+
![Configure Single Sign-On](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_400.png)
127+
128+
6. To configure single sign-on on **Wingspan eTMF** side, you need to send the downloaded **Metadata XML** to [Wingspan eTMF support](http://www.wingspan.com/contact-us/). They set this up to have the SAML SSO connection set properly on both sides.
129+
130+
> [!TIP]
131+
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
132+
133+
134+
### Creating an Azure AD test user
135+
The objective of this section is to create a test user in the Azure portal called Britta Simon.
136+
137+
![Create Azure AD User][100]
138+
139+
**To create a test user in Azure AD, perform the following steps:**
140+
141+
1. In the **Azure portal**, on the left navigation pane, click **Azure Active Directory** icon.
142+
143+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/create_aaduser_01.png)
144+
145+
2. To display the list of users, go to **Users and groups** and click **All users**.
146+
147+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/create_aaduser_02.png)
148+
149+
3. To open the **User** dialog, click **Add** on the top of the dialog.
150+
151+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/create_aaduser_03.png)
152+
153+
4. On the **User** dialog page, perform the following steps:
154+
155+
![Creating an Azure AD test user](./media/active-directory-saas-wingspanetmf-tutorial/create_aaduser_04.png)
156+
157+
a. In the **Name** textbox, type **BrittaSimon**.
158+
159+
b. In the **User name** textbox, type the **email address** of BrittaSimon.
160+
161+
c. Select **Show Password** and write down the value of the **Password**.
162+
163+
d. Click **Create**.
164+
165+
### Creating a Wingspan eTMF test user
166+
167+
In this section, you create a user called Britta Simon in Wingspan eTMF. Work with [Wingspan eTMF support](http://www.wingspan.com/contact-us/) to add the users in the Wingspan eTMF application. Users must be created and activated before you use single sign-on.
168+
169+
### Assigning the Azure AD test user
170+
171+
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Wingspan eTMF.
172+
173+
![Assign User][200]
174+
175+
**To assign Britta Simon to Wingspan eTMF, perform the following steps:**
176+
177+
1. In the Azure portal, open the applications view, and then navigate to the directory view and go to **Enterprise applications** then click **All applications**.
178+
179+
![Assign User][201]
180+
181+
2. In the applications list, select **Wingspan eTMF**.
182+
183+
![Configure Single Sign-On](./media/active-directory-saas-wingspanetmf-tutorial/tutorial_wingspanetmf_app.png)
184+
185+
3. In the menu on the left, click **Users and groups**.
186+
187+
![Assign User][202]
188+
189+
4. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog.
190+
191+
![Assign User][203]
192+
193+
5. On **Users and groups** dialog, select **Britta Simon** in the Users list.
194+
195+
6. Click **Select** button on **Users and groups** dialog.
196+
197+
7. Click **Assign** button on **Add Assignment** dialog.
198+
199+
### Testing single sign-on
200+
201+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
202+
203+
Click the Wingspan eTMF tile in the Access Panel, you will be redirected to Organization sign on page. After successful login, you will be signed-on to your Wingspan eTMF application. For more information about the Access Panel, see [Introduction to the Access Panel](https://msdn.microsoft.com/library/dn308586).
204+
205+
## Additional resources
206+
207+
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
208+
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)
209+
210+
211+
212+
<!--Image references-->
213+
214+
[1]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_01.png
215+
[2]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_02.png
216+
[3]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_03.png
217+
[4]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_04.png
218+
219+
[100]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_100.png
220+
221+
[200]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_200.png
222+
[201]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_201.png
223+
[202]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_202.png
224+
[203]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_203.png
225+

0 commit comments

Comments
 (0)