You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/intacct-tutorial.md
+45-33Lines changed: 45 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 03/16/2022
12
+
ms.date: 07/14/2022
13
13
ms.author: jeedes
14
14
---
15
15
@@ -57,7 +57,7 @@ To configure and test Azure AD SSO with Sage Intacct, perform the following step
57
57
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58
58
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
59
59
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60
-
2.**[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the Single Sign-On settings on application side.
60
+
2.**[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the single sign-on settings on application side.
61
61
1.**[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
62
62
6.**[Test SSO](#test-sso)** - to verify whether the configuration works.
63
63
@@ -71,52 +71,61 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
b. In the **Reply URL** text box, add the following URLs:
86
79
87
-
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
80
+
| Reply URL |
81
+
| ------------- |
82
+
| `https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.) |
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
88
90
89
91

90
92
91
-
1. In addition to above, Sage Intacct application expects few more attributes to be passed back in SAML response. In the **User Attributes & Claims** dialog, perform the following steps to add SAML token attribute as shown in the below table:
93
+
1. In the **Attributes & Claims** dialog, perform the following steps:
92
94
95
+
a. Edit **Unique User Identifier (Name ID)** and set source attribute to user.mail and verify Name identifier format is set to Email address and click **Save**
96
+
97
+
b. Remove all default Additional claims attributes by clicking ***...*** and Delete.
98
+
93
99
| Attribute Name | Source Attribute|
94
100
| ---------------| --------------- |
95
101
| Company Name | **Sage Intacct Company ID** |
96
102
| name | `<User ID>`|
97
103
98
104
> [!NOTE]
99
-
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial
105
+
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial. Usually, this is the prefix of the email address. In this case, you can set the source as a transformation and use ExtractMailPrefix() on user.mail parameter.
100
106
101
-
a. Click **Add new claim** to open the **Manage user claims** dialog.
107
+
c. Click **Add new claim** to open the **Manage user claims** dialog.
102
108
103
-
b. In the **Name** textbox, type the attribute name shown for that row.
109
+
d. In the **Name** textbox, type the attribute name shown for that row.
104
110
105
-
c. Leave the **Namespace** blank.
111
+
e. Leave the **Namespace** blank.
106
112
107
-
d. Select Source as **Attribute**.
113
+
f. Select Source as **Attribute**.
108
114
109
-
e. From the **Source attribute** list, type or select the attribute value shown for that row.
115
+
g. From the **Source attribute** list, type or select the attribute value shown for that row.
110
116
111
-
f. Click **Ok**
117
+
h. Click **Ok**
112
118
113
-
g. Click **Save**.
119
+
i. Click **Save**.
120
+
121
+
> Repeat steps c-i to add both custom attibutes.
122
+
114
123
115
-
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)**and select **Download** to download the certificate and save it on your computer.
124
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Edit** to open the dialog. Click **...** next to the Active certificate and select **PEM certificate download** to download the certificate and save it to your local drive.
@@ -164,35 +173,38 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
164
173
165
174
b. As **Identity provider type**, select **SAML 2.0**.
166
175
167
-
c. In **Issuer URL** textbox, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
176
+
c. In **Issuer URL** textbox, paste the value of **Identifier (Entity ID)**, which you created in the Basic SAML Configuration dialog.
168
177
169
178
d. In **Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
170
179
171
-
e. Open your **base-64** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
180
+
e. Open your **PEM** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
172
181
173
182
f. Set **Requested authentication content type** to **Exact**.
174
183
175
184
g. Click **Save**.
176
185
177
186
### Set up individual users in Intacct
178
187
179
-
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and will be authenticated by your SSO identity provider as being an authorized user. Any users who aren't set up for SSO can continue to log in to your company using the basic signin page.
188
+
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and be authenticated by your SSO identity provider as an authorized user. Any users who are not set up for SSO can continue to log in to your company using the basic sign-in page.
180
189
181
190
**To enable SSO for a user, perform the following steps:**
182
191
183
-
1. Sign in to your **Sage Intacct**tenant.
192
+
1. Sign in to your **Sage Intacct**company.
184
193
185
194
1. Go to **Company**, click the **Admin** tab, then click **Users**.
186
195
187
196

188
197
189
198
1. Locate the desired user and click **Edit** next to it.
190
199
191
-

200
+

201
+
202
+
1. Click the **Single sign-on** tab and type the **Federated SSO user ID**.
192
203
193
-
1. Click **Single sign-on** tab and make sure that the **Federated SSO user ID** in below screenshot and the **Source Attribute** value which is mapped with the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier` in the **User Attributes** section in the Azure portal should be same.
204
+
> [!NOTE]
205
+
> This value is mapped with the Unique User Identifier found in Azure's Attributes & Claims dialog.
194
206
195
-

207
+

196
208
197
209
> [!NOTE]
198
210
> To provision Azure AD user accounts, you can use other Sage Intacct user account creation tools or APIs that are provided by Sage Intacct.
@@ -207,4 +219,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
207
219
208
220
## Next steps
209
221
210
-
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
222
+
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments