Notice: Trying to get property 'post_excerpt' of non-object in /home/n3svtp4r09fz/technet.vn/wp-content/themes/darknews/single.php on line 43
Module2. Lab 03 – Implement Self-Service Password Reset
Lab Scenario
Adatum Corporation wants to take advantage of Azure AD Premium features
Objectives
After completing this lab, you will be able to:
- Manage Azure AD users and groups
- Manage Azure AD-integrated SaaS applications
Estimated timing: 50 minutes
Exercise 1: Manage Azure AD users and groups
The main tasks for this exercise are as follows:
- Create a new Azure AD tenant
- Activate Azure AD Premium v2 trial
- Create and configure Azure AD users
- Assign Azure AD Premium v2 licenses to Azure AD users
- Manage Azure AD group membership
- Configure self-service password reset functionality
- Validate self-service password reset functionality
Task 1: Create a new Azure AD tenant
- From the lab virtual machine, start Microsoft Edge, browse to the Azure portal at http://portal.azure.com and sign in by using a Microsoft account that has the Owner role in the Azure subscription you intend to use in this lab.
- In the Azure portal, navigate to the New blade.
- From the New blade, search Azure Marketplace for Azure Active Directory.
- Use the list of search results to navigate to the Create directory blade.
- From the Create directory blade, create a new Azure AD tenant with the following settings:
- Organization name: AdatumLab303-2a
- Initial domain name: a unique name consisting of a combination of letters and digits.
- Country or region: United States
Note: Take a note of the initial domain name. You will need it later in this lab.
Task 2: Activate Azure AD Premium v2 trial
- In the Azure portal, set the Directory + subscription filter to the newly created Azure AD tenant.
Note: The Directory + subscription filter appears to the right of the Cloud Shell icon in the toolbar of the Azure portal
Note: You might need to refresh the browser window if the AdatumLab303-2a entry does not appear in the Directory + subscription filter list.
- In the Azure portal, navigate to the AdatumLab303-2a – Overview blade.
- From the AdatumLab303-2a – Overview blade, navigate to the Licenses – Overview blade.
- From the Licenses – Overview blade, navigate to the Products blade.
- From the Licenses – All products blade, click Try/Buy. Under Azure AD Premium P2 expand Free trial, and then click Activate.
Task 3: Create and configure Azure AD users
- In the Azure portal, navigate to the Users – All users blade of the AdatumLab303-2a Azure AD tenant.
- From the Users – All users blade, create a new user with the following settings:
- User name: aaduser1@<DNS-domain-name>.onmicrosoft.com where <DNS-domain-name> represents the initial domain name you specified in the first task of this exercise.
Note: Take a note of this user name. You will need it later in this lab.
- Name: aaduser1
- Password: select the checkbox Show Password and note the string appearing in the Password text box. You will need it later in this lab.
- Groups and roles:
- Groups: 0 groups selected
- Roles: User
- Settings:
- Usage location: United States
Note: In order to assign Azure AD Premium v2 licenses to Azure AD users, you first have to set their location attribute.
- Job info:
- Department: Sales
- From the Users – All users blade, create a new user with the following settings:
- User name: aaduser2@<DNS-domain-name>.onmicrosoft.com where <DNS-domain-name> represents the initial domain name you specified in the first task of this exercise.
Note: Take a note of this user name. You will need it later in this lab.
- Name: aaduser2
- Password: select the checkbox Show Password and note the string appearing in the Password text box. You will need it later in this lab.
- Groups and roles:
- Groups: 0 groups selected
- Roles: User
- Settings:
- Usage location: United States
Note: In order to assign Azure AD Premium v2 licenses to Azure AD users, you first have to set their location attribute.
- Job info:
- Department: Finance
Task 4: Assign Azure AD Premium v2 licenses to Azure AD users
- Return to the Users – All users blade, navigate to the aaduser1 – Licenses blade and assign to the user an Azure Active Directory Premium P2 license with all licensing options enabled.
- Return to the Users – All users blade, navigate to the aaduser2 – Licenses blade and assign to the user an Azure Active Directory Premium P2 license with all licensing options enabled.
- Return to the Users – All users blade, navigate to the Profile entry of your user account and set the Usage location to United States.
Note: In order to assign Azure AD Premium v2 licenses to Azure AD users, you first have to set their location attribute.
- Navigate to Licenses blade of your user account and assign to it an Azure Active Directory Premium P2 license with all licensing options enabled.
- Sign out from the portal and sign back in using the same account you are using for this lab.
Note: This step is necessary in order for the license assignment to take effect.
Task 5: Manage Azure AD group membership
- In the Azure portal, navigate to the Groups – All groups blade of the AdatumLab303-2a directory.
- From the Groups – All groups blade, create a new group with the following settings:
- Group type: Security
- Group name: Sales
- Group description: All users in the Sales department
- Membership type: Dynamic User
- Owners: No owners selected
- Dynamic user members:
- Click Add dynamic query and create a rule with the following settings:
- Property: department
- Operator: Equals
- Value: Sales
- Click Add dynamic query and create a rule with the following settings:
- From the Groups – All groups blade, create a new group with the following settings:
- Group type: Security
- Group name: Sales and Finance
- Group description: All users in the Sales and Finance departments
- Membership type: Dynamic User
- Owners: No owners selected
- Dynamic user members:
- Click Add dynamic query and create a rule with the following settings:
- Property: department
- Operator: Equals
- Value: Sales
- Click Add expression
- And/Or: Or
- Property: department
- Operator: Equals
- Value: Finance
- Click Add dynamic query and create a rule with the following settings:
Note: The Rule syntax should show: (user.department -eq “Sales”) or (user.department -eq “Finance”)
- From the Groups – All groups blade, navigate to the blades of Sales and Sales and Finance groups, and note that the group membership evaluation is in progress. Wait until the evalution completes, then navigate to the Members blade, and verify that the group membership is correct.
Task 6: Configure self-service password reset functionality
- In the Azure portal, navigate to the AdatumLab303-2a – Overview blade.
- From the AdatumLab303-2a – Overview blade, navigate to the Password reset – Properties blade.
- On the Password reset – Properties blade, configure the following settings:
- Self service password reset enabled: Selected
- Selected group: Sales
- From the Password reset – Properties blade, navigate to the Password reset – Authentication methods blade, configure and save the following settings:
- Number of methods required to reset: 1
- Methods available to users:
- Mobile phone
- Security questions
- Number of security questions required to register: 5
- Number of security questions required to reset: 3
- Select security questions: select Predefined and add any combination of 5 predefined security questions
- From the Password reset – Authentication methods blade, navigate to the Password reset – Registration blade, and ensure that the following settings are configured:
- Require users to register when signing in?: Yes
- Number of days before users are asked to re-confirm their authentication information: 180
Task 7: Validate self-service password reset functionality
- Open an InPrivate Microsoft Edge window.
- In the new browser window, navigate to the Azure portal and sign in using the aaduser1 user account. When prompted, change the password to a new value.
Note: You will need to provide a fully qualified name: aaduser1@<DNS-domain-name>.onmicrosoft.com where <DNS-domain-name> represents the initial domain name you specified in the first task of this exercise.
- When prompted with the More information required message, click Next to continue to the don’t lose access to your account page.
- On the don’t lose access to your account page, note that you need to set up at least one of the following options:
- Authentication Phone
- Authentication Email
- Security Questions
- From the don’t lose access to your account page, configure answers to 5 security questions you selected in the previous task
Note: Take note of these answers; You will need them in the next steps.
- Verify that you successfully signed in to the Azure portal.
- Sign out as aaduser1 and close the InPrivate browser window.
- Open an InPrivate Microsoft Edge window.
- In the new browser window, navigate to the Azure portal and, on the Pick an account page, type in: aaduser1@<DNS-domain-name>.onmicrosoft.com where <DNS-domain-name> represents the initial domain name you specified in the first task of this exercise.
- On the Enter password page, click the Forgot my password link.
- On the Get back into your account page, verify the User ID, enter the characters in the picture or the words in the audio, and proceed to the next page.
- On the next page, provide answers to three security questions using answers you specified in the previous task.
- On the next page, enter twice a new password and complete the password reset process.
- Verify that you can sign in to the Azure portal by using the newly reset password.
- Sign out as aaduser1 and close the InPrivate browser window.
Result: After you completed this exercise, you have created a new Azure AD tenant, activated Azure AD Premium v2 trial, created and configured Azure AD users, assigned Azure AD Premium v2 licenses to Azure AD users, managed Azure AD group membership, as well as configured and validated self-service password reset functionality
Exercise 2: Manage Azure AD-integrated SaaS applications
The main tasks for this exercise are as follows:
- Add an application from the Azure AD gallery
- Configure the application for a single sign-on
- Assign users to the application
- Validate single sign-on for the application
Task 1: Add an application from the Azure AD gallery
- In the Azure portal, navigate to the AdatumLab303-2a – Overview blade.
- From the AdatumLab303-2a – Overview blade, navigate to the Enterprise applications – All applications blade.
- From the Enterprise applications – All applications blade, click New application.
- On the Add an application blade, search the application gallery for the Microsoft OneDrive.
- Use the list of search results to navigate to the Microsoft OneDrive add app blade and add the app.
Task 2: Configure the application for a single sign-on
- On the Microsoft OneDrive – Overview blade, select Set up single sign on.
- On the Microsoft OneDrive – Single sign-on blade, select the Password-based option and Save the configuration.
Task 3: Assign users to the application
- Navigate to the Microsoft OneDrive – Overview blade and click Assign users and groups
- From the Users and groups blade for Microsoft OneDrive, navigate to the Add Assignment blade and add the following assignment:
- Users and groups: Sales and Finance
- Select role: Default access
- Assign Credentials:
- Assign credentials to be shared among all group members: Yes
- loginfmt: the name of the Microsoft Account you are using for this lab
- passwd: the password of the Microsoft Account you are using for this lab
- Sign out from the Azure portal and close the Microsoft Edge window.
Task 4: Validate single sign-on for the application
- Open a Microsoft Edge window.
- In the Microsoft Edge window, navigate to the Application Access Panel at http://myapps.microsoft.com and sign in by using the aaduser2 user account. When prompted, change the password to a new value.
Note: You will need to provide a fully qualified name: aaduser2@<DNS-domain-name>.onmicrosoft.com where <DNS-domain-name> represents the initial domain name you specified in the first task of this exercise.
- On the Access Panel Applications page, click the Microsoft OneDrive icon.
- When prompted, add the My Apps Secure Sign-in Extension and enable it, including the Allow for InPrivate browsing option.
- Navigate again to the Application Access Panel at http://myapps.microsoft.com and sign in by using the aaduser2 user account.
- On the Access Panel Applications page, click the Microsoft OneDrive icon.
- Verify that you have successfully accessed the Microsoft OneDrive application without having to re-authenticate.
- Sign out from the Application Access Panel and close the Microsoft Edge window.
Note: Make sure to launch Microsoft Edge again, browse to the Azure portal, sign in by using the Microsoft account that has the Owner role in the Azure subscription you were using in this lab, and use the Directory + subscription filter to switch to your Default Domain Azure AD tenant once you complete this lab.
Result: After you completed this exercise, you have added an application from the Azure AD gallery, configured the application for a single sign-on, assigned users to the application, and validated single sign-on for the application.