Skip to content

Commit 1f4139f

Browse files
authored
Merge pull request #190557 from bhavana-129/us-bank-update
Product Backlog Item 1795218: SaaS App Tutorial: U.S. Bank Prepaid Up…
2 parents 1e08a7f + 6782025 commit 1f4139f

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/saas-apps/us-bank-prepaid-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/03/2022
12+
ms.date: 03/04/2022
1313
ms.author: jeedes
1414

1515
---
@@ -79,14 +79,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979
a. In the **Identifier** text box, type the value:
8080
`USBank:SAML2.0:Prepaid_SP`
8181

82-
b. In the **Reply URL** text box, type the URL:
83-
`https://uat-federation.usbank.com/sp/ACS.saml2`
82+
b. In the **Reply URL** text box, type a URL using the following pattern:
83+
`https://<Environment>.usbank.com/sp/ACS.saml2`
8484

8585
c. In the **Sign-on URL** text box, type a URL using the following pattern:
8686
`https://<Environment>.usbank.com/sp/startSSO.ping?PartnerIdpId=<ID>`
8787

8888
> [!NOTE]
89-
> The value is not real. Update this value with the actual Sign-on URL. Contact [U.S. Bank Prepaid Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
> These values are not real. Update these values with the actual Reply URL and Sign-on URL. Contact [U.S. Bank Prepaid Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9090

9191
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
9292

@@ -138,8 +138,8 @@ In this section, you test your Azure AD single sign-on configuration with follow
138138

139139
* Click on **Test this application** in Azure portal and you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO.
140140

141-
You can also use Microsoft My Apps to test the application in any mode. When you click the U.S. Bank Prepaid tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
141+
You can also use Microsoft My Apps to test the application in any mode. When you click the U.S. Bank Prepaid tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the U.S. Bank Prepaid for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
142142

143143
## Next steps
144144

145-
Once you configure U.S. Bank Prepaid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
145+
Once you configure U.S. Bank Prepaid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)