教學課程:Azure Active Directory 單一登入 (SSO) 與 BIC Cloud Design 整合Tutorial: Azure Active Directory single sign-on (SSO) integration with BIC Cloud Design

在本教學課程中,您會了解如何整合 BIC Cloud Design 與 Azure Active Directory (Azure AD)。In this tutorial, you'll learn how to integrate BIC Cloud Design with Azure Active Directory (Azure AD). 在整合 BIC Cloud Design 與 Azure AD 時,您可以︰When you integrate BIC Cloud Design with Azure AD, you can:

  • 在 Azure AD 中控制可存取 BIC Cloud Design 的人員。Control in Azure AD who has access to BIC Cloud Design.
  • 讓使用者使用其 Azure AD 帳戶自動登入 BIC Cloud Design。Enable your users to be automatically signed-in to BIC Cloud Design with their Azure AD accounts.
  • 在 Azure 入口網站集中管理您的帳戶。Manage your accounts in one central location - the Azure portal.

必要條件Prerequisites

若要開始,您需要下列項目:To get started, you need the following items:

  • Azure AD 訂用帳戶。An Azure AD subscription. 如果沒有訂用帳戶,您可以取得免費帳戶If you don't have a subscription, you can get a free account.
  • 已啟用 BIC Cloud Design 單一登入 (SSO) 的訂用帳戶。BIC Cloud Design single sign-on (SSO) enabled subscription.

注意

也可以在 Azure AD 美國政府雲端環境中使用此整合。This integration is also available to use from Azure AD US Government Cloud environment. 您可以在 Azure AD 美國政府雲端應用程式庫中找到此應用程式,並以與公用雲端相同的方式進行設定。You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.

案例描述Scenario description

在本教學課程中,您會在測試環境中設定和測試 Azure AD SSO。In this tutorial, you configure and test Azure AD SSO in a test environment.

  • BIC Cloud Design 支援 SP 起始的 SSOBIC Cloud Design supports SP initiated SSO

若要設定將 BIC Cloud Design 整合到 Azure AD 中,您需要從資源庫將 BIC Cloud Design 新增到受控 SaaS 應用程式清單。To configure the integration of BIC Cloud Design into Azure AD, you need to add BIC Cloud Design from the gallery to your list of managed SaaS apps.

  1. 使用公司或學校帳戶或個人的 Microsoft 帳戶登入 Azure 入口網站。Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
  2. 在左方瀏覽窗格上,選取 [Azure Active Directory] 服務。On the left navigation pane, select the Azure Active Directory service.
  3. 巡覽至 [企業應用程式],然後選取 [所有應用程式]。Navigate to Enterprise Applications and then select All Applications.
  4. 若要新增應用程式,請選取 [新增應用程式]。To add new application, select New application.
  5. 在 [從資源庫新增] 區段的搜尋方塊中輸入 BIC Cloud DesignIn the Add from the gallery section, type BIC Cloud Design in the search box.
  6. 從結果面板選取 [BIC Cloud Design],然後新增應用程式。Select BIC Cloud Design from results panel and then add the app. 當應用程式新增至您的租用戶時,請等候幾秒鐘。Wait a few seconds while the app is added to your tenant.

設定和測試 BIC Cloud Design 的 Azure AD SSOConfigure and test Azure AD SSO for BIC Cloud Design

以名為 B.Simon 的測試使用者,設定及測試與 BIC Cloud Design 搭配運作的 Azure AD SSO。Configure and test Azure AD SSO with BIC Cloud Design using a test user called B.Simon. 若要讓 SSO 能夠運作,您必須建立 Azure AD 使用者與 BIC Cloud Design 中相關使用者之間的連結關聯性。For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in BIC Cloud Design.

若要設定及測試與 BIC Cloud Design 搭配運作的 Azure AD SSO,請執行下列步驟:To configure and test Azure AD SSO with BIC Cloud Design, perform the following steps:

  1. 設定 Azure AD SSO - 讓您的使用者能夠使用此功能。Configure Azure AD SSO - to enable your users to use this feature.
  2. 設定 BIC Cloud Design SSO - 在應用程式端設定單一登入設定。Configure BIC Cloud Design SSO - to configure the single sign-on settings on application side.
  3. 測試 SSO - 驗證組態是否能運作。Test SSO - to verify whether the configuration works.

設定 Azure AD SSOConfigure Azure AD SSO

依照下列步驟在 Azure 入口網站中啟用 Azure AD SSO。Follow these steps to enable Azure AD SSO in the Azure portal.

  1. 在 Azure 入口網站的 BIC Cloud Design 應用程式整合頁面上,尋找 管理 區段並選取 [單一登入]。In the Azure portal, on the BIC Cloud Design application integration page, find the Manage section and select single sign-on.

  2. 在 [選取單一登入方法] 頁面上,選取 [SAML]。On the Select a single sign-on method page, select SAML.

  3. 在 [以 SAML 設定單一登入] 頁面上,按一下 [基本 SAML 設定] 的鉛筆圖示,以編輯設定。On the Set up single sign-on with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings.

    編輯基本 SAML 組態

  4. 如果您有 服務提供者中繼資料檔案,請在 [基本 SAML 設定] 區段上執行下列步驟:On the Basic SAML Configuration section, if you have Service Provider metadata file, perform the following steps:

    a.a. 按一下 [上傳中繼資料檔案] 。Click Upload metadata file.

    上傳中繼資料檔案

    b.b. 按一下 資料夾圖示 以選取中繼資料檔案,然後按一下 [上傳] 。Click on folder logo to select the metadata file and click Upload.

    選擇中繼資料檔案

    c.c. 成功上傳中繼資料檔案後,就會在 [基本 SAML 設定] 區段中自動填入 [識別碼] 值。After the metadata file is successfully uploaded, the Identifier value gets auto populated in Basic SAML Configuration section.

    BIC Cloud Design 網域和 URL 單一登入資訊

    在 [登入 URL] 文字方塊中,以下列模式輸入 URL︰In the Sign-on URL text box, type a URL using the following pattern:

    https://<customer-specific-name/tenant>.biccloud.com
    https://<customer-specific-name/tenant>.biccloud.de
    

    注意

    如果 [識別碼] 值未自動填入,請根據您的需求手動填入這些值。If the Identifier value does not get auto polulated, then please fill in the value manually according to your requirement. [登入 URL] 的值不是真正的值。The Sign-on URL value is not real. 使用實際的「登入 URL」來更新此值。Update this value with the actual Sign-on URL. 請連絡 BIC Cloud Design 用戶端支援小組以取得此值。Contact BIC Cloud Design Client support team to get this value. 您也可以參考 Azure 入口網站中 基本 SAML 組態 區段所示的模式。You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.

  5. BIC Cloud Design 應用程式預期應有特定格式的 SAML 判斷提示,因此您必須將自訂屬性對應新增至 SAML 權杖屬性設定。BIC Cloud Design application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. 以下螢幕擷取畫面顯示預設屬性清單。The following screenshot shows the list of default attributes.

    image

  6. 除了上述屬性外,BIC Cloud Design 應用程式還需要在 SAML 回應中多傳回幾個屬性,如下所示。In addition to above, BIC Cloud Design application expects few more attributes to be passed back in SAML response which are shown below. 這些屬性也會預先填入,但您可以根據您的需求來檢閱這些屬性。These attributes are also pre populated but you can review them as per your requirements.

    名稱Name 來源屬性Source Attribute
    名稱Name user.nameuser.name
    電子郵件地址E-Mail Address user.mailuser.mail
    名稱識別碼Name ID user.userprincipalnameuser.userprincipalname
    電子郵件email user.mailuser.mail
    nametestnametest user.displaynameuser.displayname
  7. 在 [以 SAML 設定單一登入] 頁面的 [SAML 簽署憑證] 區段中,按一下 [複製] 按鈕以複製 [應用程式同盟中繼資料 URL],並將資料儲存在您的電腦上。On the Set up single sign-on with SAML page, In the SAML Signing Certificate section, click copy button to copy App Federation Metadata Url and save it on your computer.

    憑證下載連結

建立 Azure AD 測試使用者Create an Azure AD test user

在本節中,您將在 Azure 入口網站中建立名為 B.Simon 的測試使用者。In this section, you'll create a test user in the Azure portal called B.Simon.

  1. 在 Azure 入口網站的左窗格中,依序選取 [Azure Active Directory] 、[使用者] 和 [所有使用者] 。From the left pane in the Azure portal, select Azure Active Directory, select Users, and then select All users.
  2. 在畫面頂端選取 [新增使用者] 。Select New user at the top of the screen.
  3. 在 [使用者] 屬性中,執行下列步驟:In the User properties, follow these steps:
    1. 在 [名稱] 欄位中,輸入 B.SimonIn the Name field, enter B.Simon.
    2. 在 [使用者名稱] 欄位中,輸入 username@companydomain.extension。In the User name field, enter the username@companydomain.extension. 例如: B.Simon@contoso.comFor example, B.Simon@contoso.com.
    3. 選取 [顯示密碼] 核取方塊,然後記下 [密碼] 方塊中顯示的值。Select the Show password check box, and then write down the value that's displayed in the Password box.
    4. 按一下頁面底部的 [新增] 。Click Create.

指派 Azure AD 測試使用者Assign the Azure AD test user

在本節中,您會將 BIC Cloud Design 的存取權授與 B.Simon,讓其能夠使用 Azure 單一登入。In this section, you'll enable B.Simon to use Azure single sign-on by granting access to BIC Cloud Design.

  1. 在 Azure 入口網站中,選取 [企業應用程式],然後選取 [所有應用程式]。In the Azure portal, select Enterprise Applications, and then select All applications.
  2. 在應用程式清單中,選取 [BIC Cloud Design]。In the applications list, select BIC Cloud Design.
  3. 在應用程式的概觀頁面中尋找 [管理] 區段,然後選取 [使用者和群組]。In the app's overview page, find the Manage section and select Users and groups.
  4. 選取 [新增使用者] ,然後在 [新增指派] 對話方塊中選取 [使用者和群組] 。Select Add user, then select Users and groups in the Add Assignment dialog.
  5. 在 [使用者和群組] 對話方塊的 [使用者] 清單中選取 [B.Simon],然後按一下畫面底部的 [選取] 按鈕。In the Users and groups dialog, select B.Simon from the Users list, then click the Select button at the bottom of the screen.
  6. 如果您需要將角色指派給使用者,您可以從 [選取角色] 下拉式清單中選取。If you are expecting a role to be assigned to the users, you can select it from the Select a role dropdown. 如果未設定此應用程式的角色,您會看到已選取 [預設存取] 角色。If no role has been set up for this app, you see "Default Access" role selected.
  7. 在 [新增指派] 對話方塊中,按一下 [指派] 按鈕。In the Add Assignment dialog, click the Assign button.

設定 BIC Cloud Design SSOConfigure BIC Cloud Design SSO

若要在 BIC Cloud Design 端設定單一登入,您必須將 應用程式同盟中繼資料 Url 傳送給 BIC Cloud Design 支援小組To configure single sign-on on BIC Cloud Design side, you need to send the App Federation Metadata Url to BIC Cloud Design support team. 他們會進行此設定,讓兩端的 SAML SSO 連線都設定正確。They set this setting to have the SAML SSO connection set properly on both sides.

建立 BIC Cloud Design 測試使用者Create BIC Cloud Design test user

在本節中,您要在 BIC Cloud Design 中建立名為 B.Simon 的使用者。In this section, you create a user called B.Simon in BIC Cloud Design. 請與 BIC Cloud Design 支援小組合作,在 BIC Cloud Design 平台中新增使用者。Work with BIC Cloud Design support team to add the users in the BIC Cloud Design platform. 您必須先建立和啟動使用者,然後才能使用單一登入。Users must be created and activated before you use single sign-on.

測試 SSOTest SSO

在本節中,您會使用下列選項來測試您的 Azure AD 單一登入組態。In this section, you test your Azure AD single sign-on configuration with following options.

  • 在 Azure 入口網站中按一下 [測試此應用程式]。Click on Test this application in Azure portal. 這會重新導向您可以在其中起始登入流程的 BIC Cloud Design 登入 URL。This will redirect to BIC Cloud Design Sign-on URL where you can initiate the login flow.

  • 直接移至 BIC Cloud Design 登入 URL,然後從該處起始登入流程。Go to BIC Cloud Design Sign-on URL directly and initiate the login flow from there.

  • 您可以使用 Microsoft 的「我的應用程式」。You can use Microsoft My Apps. 當您按一下「我的應用程式」中的 [BIC Cloud Design] 圖格時,將會重新導向至 BIC Cloud Design 登入 URL。When you click the BIC Cloud Design tile in the My Apps, this will redirect to BIC Cloud Design Sign-on URL. 如需「我的應用程式」的詳細資訊,請參閱我的應用程式簡介For more information about the My Apps, see Introduction to the My Apps.

後續步驟Next steps

設定 BIC Cloud Design 後,您可以強制執行工作階段控制項,以即時防止組織的敏感資料遭到外洩和滲透。Once you configure the BIC Cloud Design you can enforce session controls, which protects exfiltration and infiltration of your organization’s sensitive data in real time. 工作階段控制項會從條件式存取延伸。Session controls extends from Conditional Access. 了解如何使用 Microsoft Cloud App Security 來強制執行工作階段控制項Learn how to enforce session control with Microsoft Cloud App Security.