Skip to content

Commit 053e7e7

Browse files
authored
Merge pull request #196096 from v-hgampala/floqast
Product Backlog Item 1879154: SaaS App Tutorial: FloQast Update
2 parents 991d199 + dc97c66 commit 053e7e7

File tree

1 file changed

+29
-9
lines changed

1 file changed

+29
-9
lines changed

articles/active-directory/saas-apps/floqast-tutorial.md

Lines changed: 29 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with FloQast | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with FloQast'
33
description: Learn how to configure single sign-on between Azure Active Directory and FloQast.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/10/2021
12+
ms.date: 04/26/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with FloQast
16+
# Tutorial: Azure AD SSO integration with FloQast
1717

1818
In this tutorial, you'll learn how to integrate FloQast with Azure Active Directory (Azure AD). When you integrate FloQast with Azure AD, you can:
1919

@@ -73,13 +73,33 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373

7474
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
7575

76-
In the **Identifier** text box, type the URL:
77-
`https://go.floqast.com/`
76+
a. In the **Identifier** text box, type one of the following URLs:
77+
78+
| Identifier |
79+
| ---------- |
80+
| `https://go.floqast.com/` |
81+
| `https://eu.floqast.app/` |
82+
|
83+
84+
b. In the **Reply URL** text box, type one of the following URLs:
85+
86+
| Reply URL |
87+
| ---------- |
88+
| `https://go.floqast.com/api/sso/saml/azure` |
89+
| ` ttps://eu.floqast.app/api/sso/saml/azure` |
90+
|
91+
7892

7993
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8094

81-
In the **Sign-on URL** text box, type the URL:
82-
`https://go.floqast.com/login/sso`
95+
In the **Sign-on URL** text box, type one of the following URLs:
96+
97+
| Sign-on URL |
98+
| ---------- |
99+
| `https://go.floqast.com/login/sso` |
100+
| `https://eu.floqast.app/login/sso` |
101+
|
102+
83103

84104
1. FloQast application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
85105

@@ -139,7 +159,7 @@ To configure single sign-on on **FloQast** side, you need to send the downloaded
139159

140160
### Create FloQast test user
141161

142-
In this section, you create a user called B.Simon in FloQast. Work with [FloQast support team](mailto:[email protected]) to add the users in the FloQast platform. Users must be created and activated before you use single sign-on.
162+
In this section, you create a user called B.Simon in FloQast. Work with [FloQast support team](mailto:[email protected]) to add the users in the FloQast platform. Users must be created and activated before you use single sign-on.
143163

144164
## Test SSO
145165

@@ -159,4 +179,4 @@ You can also use Microsoft My Apps to test the application in any mode. When you
159179

160180
## Next steps
161181

162-
Once you configure FloQast you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
182+
Once you configure FloQast you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)