Skip to content

Commit 04d8a17

Browse files
committed
Product Backlog Item 1628630: SaaS App Tutorial: FileOrbis
1 parent f5c97ee commit 04d8a17

File tree

2 files changed

+141
-0
lines changed

2 files changed

+141
-0
lines changed
Lines changed: 139 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,139 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with FileOrbis'
3+
description: Learn how to configure single sign-on between Azure Active Directory and FileOrbis.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 10/21/2021
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with FileOrbis
18+
19+
In this tutorial, you'll learn how to integrate FileOrbis with Azure Active Directory (Azure AD). When you integrate FileOrbis with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to FileOrbis.
22+
* Enable your users to be automatically signed-in to FileOrbis with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* FileOrbis single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Azure AD SSO in a test environment.
35+
36+
* FileOrbis supports **SP** initiated SSO.
37+
* FileOrbis supports **Just In Time** user provisioning.
38+
39+
## Add FileOrbis from the gallery
40+
41+
To configure the integration of FileOrbis into Azure AD, you need to add FileOrbis from the gallery to your list of managed SaaS apps.
42+
43+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
44+
1. On the left navigation pane, select the **Azure Active Directory** service.
45+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
46+
1. To add new application, select **New application**.
47+
1. In the **Add from the gallery** section, type **FileOrbis** in the search box.
48+
1. Select **FileOrbis** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
49+
50+
## Configure and test Azure AD SSO for FileOrbis
51+
52+
Configure and test Azure AD SSO with FileOrbis using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in FileOrbis.
53+
54+
To configure and test Azure AD SSO with FileOrbis, perform the following steps:
55+
56+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
57+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
58+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
59+
1. **[Configure FileOrbis SSO](#configure-fileorbis-sso)** - to configure the single sign-on settings on application side.
60+
1. **[Create FileOrbis test user](#create-fileorbis-test-user)** - to have a counterpart of B.Simon in FileOrbis that is linked to the Azure AD representation of user.
61+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
62+
63+
## Configure Azure AD SSO
64+
65+
Follow these steps to enable Azure AD SSO in the Azure portal.
66+
67+
1. In the Azure portal, on the **FileOrbis** application integration page, find the **Manage** section and select **single sign-on**.
68+
1. On the **Select a single sign-on method** page, select **SAML**.
69+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
70+
71+
![Edit Basic SAML Configuration](common/edit-urls.png)
72+
73+
1. On the **Basic SAML Configuration** section, perform the following steps:
74+
75+
a. In the **Identifier** box, type a URL using the following pattern:
76+
`https://<ApplicationURL>/portal`
77+
78+
b. In the **Reply URL** text box, type a URL using the following pattern:
79+
`https://<ApplicationURL>/portal/tr/Account/LoginSAMLConsume`
80+
81+
c. In the **Sign-on URL** text box, type a URL using the following pattern:
82+
`https://<ApplicationURL>/portal`
83+
84+
> [!NOTE]
85+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [FileOrbis Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
87+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
88+
89+
![The Certificate download link](common/metadataxml.png)
90+
91+
1. On the **Set up FileOrbis** section, copy the appropriate URL(s) based on your requirement.
92+
93+
![Copy configuration URLs](common/copy-configuration-urls.png)
94+
95+
### Create an Azure AD test user
96+
97+
In this section, you'll create a test user in the Azure portal called B.Simon.
98+
99+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
100+
1. Select **New user** at the top of the screen.
101+
1. In the **User** properties, follow these steps:
102+
1. In the **Name** field, enter `B.Simon`.
103+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
104+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
105+
1. Click **Create**.
106+
107+
### Assign the Azure AD test user
108+
109+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to FileOrbis.
110+
111+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
112+
1. In the applications list, select **FileOrbis**.
113+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
114+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
115+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
116+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
117+
1. In the **Add Assignment** dialog, click the **Assign** button.
118+
119+
## Configure FileOrbis SSO
120+
121+
To configure single sign-on on **FileOrbis** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [FileOrbis support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
122+
123+
### Create FileOrbis test user
124+
125+
In this section, a user called Britta Simon is created in FileOrbis. FileOrbis supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in FileOrbis, a new one is created after authentication.
126+
127+
## Test SSO
128+
129+
In this section, you test your Azure AD single sign-on configuration with following options.
130+
131+
* Click on **Test this application** in Azure portal. This will redirect to FileOrbis Sign-on URL where you can initiate the login flow.
132+
133+
* Go to FileOrbis Sign-on URL directly and initiate the login flow from there.
134+
135+
* You can use Microsoft My Apps. When you click the FileOrbis tile in the My Apps, this will redirect to FileOrbis Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
136+
137+
## Next steps
138+
139+
Once you configure FileOrbis you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -746,6 +746,8 @@
746746
href: figma-tutorial.md
747747
- name: FileCloud
748748
href: filecloud-tutorial.md
749+
- name: FileOrbis
750+
href: fileorbis-tutorial.md
749751
- name: FilesAnywhere
750752
href: filesanywhere-tutorial.md
751753
- name: Finvari

0 commit comments

Comments
 (0)