Skip to content

Commit 10cec51

Browse files
Merge pull request #204694 from v-hgampala/intacct-pr
Product Backlog Item 1981014: SaaS App Tutorial: Sage Intacct Update
2 parents 8b8d452 + a00eee3 commit 10cec51

File tree

1 file changed

+45
-33
lines changed

1 file changed

+45
-33
lines changed

articles/active-directory/saas-apps/intacct-tutorial.md

Lines changed: 45 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/16/2022
12+
ms.date: 07/14/2022
1313
ms.author: jeedes
1414
---
1515

@@ -57,7 +57,7 @@ To configure and test Azure AD SSO with Sage Intacct, perform the following step
5757
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5858
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
5959
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60-
2. **[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the Single Sign-On settings on application side.
60+
2. **[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the single sign-on settings on application side.
6161
1. **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
6262
6. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6363

@@ -71,52 +71,61 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7171

7272
![Edit Basic SAML Configuration](common/edit-urls.png)
7373

74-
1. On the **Basic SAML Configuration** section, perform the following step:
74+
1. On the **Basic SAML Configuration** section, perform the following steps:
7575

76-
In the **Reply URL** text box, type one of the following URLs:
76+
a. In the **Identifier (Entity ID)** text box, type a unique identifier for your Sage Intacct company, such as `https://saml.intacct.com`.
7777

78-
| Reply URL |
79-
| ------------- |
80-
| `https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.) |
81-
| `https://www-p02.intacct.com/ia/acct/sso_response.phtml` |
82-
| `https://www-p03.intacct.com/ia/acct/sso_response.phtml` |
83-
| `https://www-p04.intacct.com/ia/acct/sso_response.phtml` |
84-
| `https://www-p05.intacct.com/ia/acct/sso_response.phtml` |
85-
|
78+
b. In the **Reply URL** text box, add the following URLs:
8679

87-
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
80+
| Reply URL |
81+
| ------------- |
82+
| `https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.) |
83+
| `https://www-p02.intacct.com/ia/acct/sso_response.phtml` |
84+
| `https://www-p03.intacct.com/ia/acct/sso_response.phtml` |
85+
| `https://www-p04.intacct.com/ia/acct/sso_response.phtml` |
86+
| `https://www-p05.intacct.com/ia/acct/sso_response.phtml` |
87+
88+
89+
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
8890

8991
![image](common/edit-attribute.png)
9092

91-
1. In addition to above, Sage Intacct application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** dialog, perform the following steps to add SAML token attribute as shown in the below table:
93+
1. In the **Attributes & Claims** dialog, perform the following steps:
9294

95+
a. Edit **Unique User Identifier (Name ID)** and set source attribute to user.mail and verify Name identifier format is set to Email address and click **Save**
96+
97+
b. Remove all default Additional claims attributes by clicking ***...*** and Delete.
98+
9399
| Attribute Name | Source Attribute|
94100
| ---------------| --------------- |
95101
| Company Name | **Sage Intacct Company ID** |
96102
| name | `<User ID>`|
97103

98104
> [!NOTE]
99-
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial
105+
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial. Usually, this is the prefix of the email address. In this case, you can set the source as a transformation and use ExtractMailPrefix() on user.mail parameter.
100106

101-
a. Click **Add new claim** to open the **Manage user claims** dialog.
107+
c. Click **Add new claim** to open the **Manage user claims** dialog.
102108

103-
b. In the **Name** textbox, type the attribute name shown for that row.
109+
d. In the **Name** textbox, type the attribute name shown for that row.
104110

105-
c. Leave the **Namespace** blank.
111+
e. Leave the **Namespace** blank.
106112

107-
d. Select Source as **Attribute**.
113+
f. Select Source as **Attribute**.
108114

109-
e. From the **Source attribute** list, type or select the attribute value shown for that row.
115+
g. From the **Source attribute** list, type or select the attribute value shown for that row.
110116

111-
f. Click **Ok**
117+
h. Click **Ok**
112118

113-
g. Click **Save**.
119+
i. Click **Save**.
120+
121+
> Repeat steps c-i to add both custom attibutes.
122+
114123

115-
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
124+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Edit** to open the dialog. Click **...** next to the Active certificate and select **PEM certificate download** to download the certificate and save it to your local drive.
116125

117-
![The Certificate download link](common/certificatebase64.png)
126+
![The Certificate download link](common/certificate-base64-download.png)
118127

119-
1. On the **Set up Sage Intacct** section, copy the appropriate URL(s) based on your requirement.
128+
1. On the **Set up Sage Intacct** section, copy the Login URL as you will use it within Sage Intacct configuration.
120129

121130
![Copy configuration URLs](common/copy-configuration-urls.png)
122131

@@ -164,35 +173,38 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
164173

165174
b. As **Identity provider type**, select **SAML 2.0**.
166175

167-
c. In **Issuer URL** textbox, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
176+
c. In **Issuer URL** textbox, paste the value of **Identifier (Entity ID)**, which you created in the Basic SAML Configuration dialog.
168177

169178
d. In **Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
170179

171-
e. Open your **base-64** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
180+
e. Open your **PEM** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
172181

173182
f. Set **Requested authentication content type** to **Exact**.
174183

175184
g. Click **Save**.
176185

177186
### Set up individual users in Intacct
178187

179-
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and will be authenticated by your SSO identity provider as being an authorized user. Any users who aren't set up for SSO can continue to log in to your company using the basic signin page.
188+
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and be authenticated by your SSO identity provider as an authorized user. Any users who are not set up for SSO can continue to log in to your company using the basic sign-in page.
180189

181190
**To enable SSO for a user, perform the following steps:**
182191

183-
1. Sign in to your **Sage Intacct** tenant.
192+
1. Sign in to your **Sage Intacct** company.
184193

185194
1. Go to **Company**, click the **Admin** tab, then click **Users**.
186195

187196
![Screenshot for Users](./media/intacct-tutorial/users.png "Users")
188197

189198
1. Locate the desired user and click **Edit** next to it.
190199

191-
![Edit the user](./media/intacct-tutorial/user-edit.png "edit")
200+
![Screenshot to Edit the user](./media/intacct-tutorial/user-edit.png "edit")
201+
202+
1. Click the **Single sign-on** tab and type the **Federated SSO user ID**.
192203

193-
1. Click **Single sign-on** tab and make sure that the **Federated SSO user ID** in below screenshot and the **Source Attribute** value which is mapped with the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier` in the **User Attributes** section in the Azure portal should be same.
204+
> [!NOTE]
205+
> This value is mapped with the Unique User Identifier found in Azure's Attributes & Claims dialog.
194206
195-
![Screenshot shows the User Information section where you can enter the Federated S S O user i d.](./media/intacct-tutorial/user-information.png "User Information")
207+
![Screenshot shows the User Information section where you can enter the Federated S S O user i d.](./media/intacct-tutorial/user-information.png "User Information")
196208

197209
> [!NOTE]
198210
> To provision Azure AD user accounts, you can use other Sage Intacct user account creation tools or APIs that are provided by Sage Intacct.
@@ -207,4 +219,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
207219

208220
## Next steps
209221

210-
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
222+
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)