Skip to content

Commit 82d07a2

Browse files
Merge pull request #71 from netwrix/hassaan/1Secure-sidebar
merging the branch into dev
2 parents 41161a1 + 8a5885d commit 82d07a2

File tree

26 files changed

+59
-341
lines changed

26 files changed

+59
-341
lines changed

docs/1secure/admin/_category_.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"label": "Introducing Netwrix 1Secure",
2+
"label": "Admin",
33
"position": 50,
44
"collapsed": true,
55
"collapsible": true,
Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,10 @@
11
{
2-
"label": "Datacollection",
2+
"label": "Data collection",
33
"position": 50,
44
"collapsed": true,
5-
"collapsible": true
5+
"collapsible": true,
6+
"link": {
7+
"type": "doc",
8+
"id": "overview"
9+
}
610
}

docs/1secure/admin/datacollection/computer/_category_.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"label": "Computer Auditing",
2+
"label": "Computer",
33
"position": 60,
44
"collapsed": true,
55
"collapsible": true,

docs/1secure/admin/datacollection/gmsa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Using Group Managed Service Account (gMSA)"
2+
title: "GMSA"
33
description: "Using Group Managed Service Account (gMSA)"
44
sidebar_position: 80
55
---

docs/1secure/admin/datacollection/logonactivity/_category_.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"label": "Logon Activity Auditing",
2+
"label": "Logon Activity",
33
"position": 70,
44
"collapsed": true,
55
"collapsible": true,

docs/1secure/admin/datacollection/overview.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,12 @@ Currently, the following data sources are supported:
2323
| Computer | File Server Activity | [Computer Auditing](/docs/1secure/admin/datacollection/computer/overview.md) |
2424
| SharePoint Online | SharePoint Online Activity | [SharePoint Online Auditing](/docs/1secure/admin/datacollection/sharepointonline.md) |
2525
| Exchange Online | Exchange Online Activity | [Exchange Online Auditing](/docs/1secure/admin/datacollection/exchangeonline.md) |
26+
27+
## Data Collection Workflow
28+
The Netwrix 1Secure data collection workflow is as follows:
29+
30+
**Step 1 –** Add organizations. See the [Add Organizations](docs\1secure\admin\organizations\addorganizations.md) topic for additional information.
31+
32+
**Step 2 –** Install the agent. See the [Install Agent](docs\1secure\install\installagent.md) topic for additional information.
33+
34+
Once you have added the organization and selected the domain for collecting the data, Netwrix 1Secure starts collecting audit data from the managed Active Directory, Azure AD domain, a computer, an Exchange Online, or a SharePoint Online collection.

docs/1secure/admin/login/_category_.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"label": "First Login to 1Secure",
2+
"label": "Login",
33
"position": 10,
44
"collapsed": true,
55
"collapsible": true,

docs/1secure/admin/login/login.md

Lines changed: 1 addition & 135 deletions
Original file line numberDiff line numberDiff line change
@@ -109,138 +109,4 @@ click **Continue**. The Enter Your Password page is displayed.
109109

110110
**Step 7 –** Click the **Reset Password** button. The password of the account has been reset.
111111

112-
Once you have reset your account password, log in to 1Secure with your new credentials.
113-
114-
## Single Sign On
115-
116-
Single Sign On (SSO) is a powerful authentication process that enhances security and improves user
117-
experience by allowing users to access multiple applications with a single set of login credentials.
118-
Single Sign On (SSO) allows you to log in to 1Secure using Microsoft Entra ID or Open ID Connect
119-
credentials. It enhances the user experience by enabling access with existing organizational
120-
credentials.
121-
122-
### Log In Through Single Sign On
123-
124-
Users can log in to the 1Secure tenant using Single Sign On (SSO) if their accounts are added to the
125-
authentication provider configured for the tenant. For example, if Microsoft Entra ID is configured
126-
as the authentication provider and its users are added to 1Secure, they can log in to the 1Secure
127-
tenant with their Microsoft Entra ID credentials.
128-
129-
When the Netwrix team adds a new user account for your organization, you will receive an email
130-
invitation. This email will be sent from "[email protected]" and will have the subject
131-
"Welcome to Netwrix 1Secure".
132-
133-
![1Secure Invitation Email](/img/product_docs/1secure/admin/login/1secureinvitation-sso.webp)
134-
135-
**Step 1 –** Click **Access 1Secure** button in the invitation email. You are navigated to the
136-
1Secure login page.
137-
138-
![Log In page](/img/product_docs/1secure/admin/login/companylogin.webp)
139-
140-
**Step 2 –** On the login page, click the **Log In** button.
141-
142-
**Step 3 –** In the Email address field, specify a valid email address registered with 1Secure, then
143-
click **Continue**. Based on your authentication status, one of the following will occur:
144-
145-
- If you are logged out of your authentication provider, you will be redirected to the
146-
authentication provider's login page. For example, if you are using Microsoft Entra ID, you will
147-
be redirected to the Microsoft Entra ID login page. Authenticate using your credentials. After
148-
successful authentication, you will be logged in to 1Secure.
149-
- If you are already logged in to your authentication provider, then you will be directly logged in
150-
to 1Secure application.
151-
152-
### SSO Configuration with Authentication Services
153-
154-
To enable Single Sign-On (SSO) for tenant users, an MSP must configure SSO using one of the
155-
following authentication services:
156-
157-
- [Configure SSO with Microsoft Entra ID Authentication](#configure-sso-with-microsoft-entra-id-authentication)
158-
- [Configure SSO with OpenID Connect Authentication](#configure-sso-with-openid-connect-authentication)
159-
160-
**NOTE:** When you first log in to 1Secure, SSO is not enabled, and 1Secure Authentication is
161-
applied by default. This method requires Multi-factor authentication (MFA) to verify your identity
162-
for secure access. See the [Log In](/docs/1secure/admin/overview.md) topic for additional information on
163-
Multi-factor authentication.
164-
165-
#### Configure SSO with Microsoft Entra ID Authentication
166-
167-
Follow the steps to configure SSO with Microsoft Entra ID authentication.
168-
169-
**Step 1 –** Click **Configuration** in the top bar. The Managed organizations page is displayed,
170-
that lists the managed organizations defined in 1Secure.
171-
172-
**Step 2 –** In the left pane, click **My organization**. The My organization page is displayed
173-
174-
![My Organization page](/img/product_docs/1secure/admin/login/myorg_authentication.webp)
175-
176-
**Step 3 –** Under Authentication section, click **Edit Settings**. The Authentication settings pane
177-
is displayed.
178-
179-
**Step 4 –** In Method drop-down menu, select **Entra ID**.
180-
181-
![Authentication Settings pane](/img/product_docs/1secure/admin/login/entraidauth.webp)
182-
183-
**Step 5 –** In Client ID field, specify the client ID of the app registered in Microsoft Entra ID.
184-
See the
185-
[Register an App in Microsoft Entra ID For Authentication](#register-an-app-in-microsoft-entra-id-for-authentication) topic
186-
for additional information.
187-
188-
**Step 6 –** Click **Save**. The Single Sing-On (SSO) is configured with Microsoft Entra ID
189-
authentication.
190-
191-
#### Configure SSO with OpenID Connect Authentication
192-
193-
Follow the steps to configure SSO with OpenID Connect authentication.
194-
195-
**Step 1 –** Click **Configuration** in the top bar. The Managed organizations page is displayed,
196-
that lists the managed organizations defined in 1Secure.
197-
198-
**Step 2 –** In the left pane, click **My organization**. The My organization page is displayed
199-
200-
![My Organization page](/img/product_docs/1secure/admin/login/myorg_authentication.webp)
201-
202-
**Step 3 –** Under Authentication section, click **Edit Settings**. The Authentication settings pane
203-
is displayed.
204-
205-
**Step 4 –** In Method drop-down menu, select **OpenID Connect**.
206-
207-
![Authentication Settings pane](/img/product_docs/1secure/admin/login/openidconnectauth.webp)
208-
209-
**Step 5 –** In Client ID field, specify the client ID of the OpenID application that 1Secure uses
210-
to communicate with the OpenID provider.
211-
212-
**Step 6 –** In Discovery url field, specify the Discovery URL of the OpenID application.
213-
214-
**Step 7 –** Click **Save**. The Single Sign On (SSO) is configured with OpenID Connect
215-
authentication.
216-
217-
#### Register an App in Microsoft Entra ID For Authentication
218-
219-
To configure Single Sign On (SSO) with Microsoft Entra ID authentication, register an application in
220-
the Microsoft Microsoft Entra ID by following the steps mentioned below.
221-
222-
**Step 1 –** Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
223-
224-
**Step 2 –** On the left navigation menu, navigate to **Identity** > **Applications** > **App
225-
registrations** page.
226-
227-
**Step 3 –** On the App registrations page, click **New registration** in the top toolbar. The
228-
Register an application page is displayed.
229-
230-
**Step 4 –** Specify the following information on the Register an application page:
231-
232-
- Name – Enter a user-facing display name for the application, for example, Netwrix 1Secure Entra ID
233-
- Supported account types – Select **Accounts in this organizational directory only**
234-
- Platform – Select the **Web** platform in the drop-down menu
235-
- Redirect URL (optional) – Enter **https://auth.netwrix.com/login/callback**
236-
237-
**Step 5 –** Click **Register**.
238-
239-
The Overview page for the newly registered application opens. The following settings of the
240-
registered application are required while configuring Single Sign on (SSO) with Entra ID in 1Secure.
241-
It is recommended to copy these settings and keep them safe.
242-
243-
- Application (client) ID – A client ID for the registered application
244-
- Directory (tenant) ID – A tenant ID for the registered application
245-
- Client Secret – A client secret value generated when a new client secret key is created for the
246-
registered application. See the [Generate Client Secret Value](/docs/1secure/configuration/registerconfig/registerconfig.md#generate-client-secret-value) topic for additional information.
112+
Once you have reset your account password, log in to 1Secure with your new credentials.

docs/1secure/admin/organizations/_category_.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"label": "Manage Organizations",
2+
"label": "Organizations",
33
"position": 30,
44
"collapsed": true,
55
"collapsible": true,

docs/1secure/admin/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: "Introducing Netwrix 1Secure"
2+
title: "Overview"
33
description: "Introducing Netwrix 1Secure"
44
sidebar_position: 50
55
---
66

7-
# Introducing Netwrix 1Secure
7+
# Overview
88

99
Netwrix 1Secure is a Microsoft Azure-hosted, multi-tenant SaaS application that provides a single
1010
location to manage both on-premises and cloud environments. The system collects data from the user environments and notifies you on any actions made to the organization. These could include deletion or adding accounts, working with group memberships, changes to the organization, etc.

0 commit comments

Comments
 (0)