Skip to content

Commit 1f6e79e

Browse files
authored
Merge pull request #239062 from bhavana-129/servusconnect
Product Backlog Item 2584362: SaaS App Tutorial: ServusConnect
2 parents 62b6cac + d485c0e commit 1f6e79e

File tree

2 files changed

+109
-0
lines changed

2 files changed

+109
-0
lines changed
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Azure Active Directory SSO integration with ServusConnect
3+
description: Learn how to configure single sign-on between Azure Active Directory and ServusConnect.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 05/23/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with ServusConnect
18+
19+
In this article, you'll learn how to integrate ServusConnect with Azure Active Directory (Azure AD). ServusConnect use Azure AD to manage user access and enable single sign-on with the ServusConnect maintenance operations platform and also requires an existing ServusConnect subscription. When you integrate ServusConnect with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to ServusConnect.
22+
* Enable your users to be automatically signed-in to ServusConnect with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You'll configure and test Azure AD single sign-on for ServusConnect in a test environment. ServusConnect supports **SP** initiated single sign-on and **Just In Time** user provisioning.
26+
27+
## Prerequisites
28+
29+
To integrate Azure Active Directory with ServusConnect, you need:
30+
31+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34+
* ServusConnect single sign-on (SSO) enabled subscription.
35+
36+
## Add application and assign a test user
37+
38+
Before you begin the process of configuring single sign-on, you need to add the ServusConnect application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
39+
40+
### Add ServusConnect from the Azure AD gallery
41+
42+
Add ServusConnect from the Azure AD application gallery to configure single sign-on with ServusConnect. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
43+
44+
### Create and assign Azure AD test user
45+
46+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
47+
48+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
49+
50+
## Configure Azure AD SSO
51+
52+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
53+
54+
1. In the Azure portal, on the **ServusConnect** application integration page, find the **Manage** section and select **single sign-on**.
55+
1. On the **Select a single sign-on method** page, select **SAML**.
56+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
57+
58+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
59+
60+
1. On the **Basic SAML Configuration** section, perform the following steps:
61+
62+
a. In the **Identifier** textbox, type a value using the following pattern:
63+
`urn:amazon:cognito:sp:us-east-<ID>`
64+
65+
b. In the **Reply URL** textbox, type the URL:
66+
`https://login.servusconnect.com/saml2/idpresponse`
67+
68+
c. In the **Sign on URL** textbox, type the URL:
69+
`https://app.servusconnect.com`
70+
71+
> [!Note]
72+
> The Identifier value is not real. Update the value with the actual Identifier. Contact [ServusConnect support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.
73+
74+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
75+
76+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
77+
78+
1. On the **Set up ServusConnect** section, copy the appropriate URL(s) based on your requirement.
79+
80+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
81+
82+
## Configure ServusConnect SSO
83+
84+
To configure single sign-on on **ServusConnect** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [ServusConnect support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
85+
86+
### Create ServusConnect test user
87+
88+
In this section, a user called B.Simon is created in ServusConnect. ServusConnect supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in ServusConnect, a new one is commonly created after authentication.
89+
90+
## Test SSO
91+
92+
In this section, you test your Azure AD single sign-on configuration with following options.
93+
94+
* Click on **Test this application** in Azure portal. This will redirect to ServusConnect Sign-on URL where you can initiate the login flow.
95+
96+
* Go to ServusConnect Sign-on URL directly and initiate the login flow from there.
97+
98+
* You can use Microsoft My Apps. When you click the ServusConnect tile in the My Apps, this will redirect to ServusConnect Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
99+
100+
## Additional resources
101+
102+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
103+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
104+
105+
## Next steps
106+
107+
Once you configure ServusConnect you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2237,6 +2237,8 @@
22372237
href: servicechannel-tutorial.md
22382238
- name: ServiceNow
22392239
href: servicenow-tutorial.md
2240+
- name: ServusConnect
2241+
href: servusconnect-tutorial.md
22402242
- name: Settling music
22412243
href: settlingmusic-tutorial.md
22422244
- name: SevOne Network Monitoring System (NMS)

0 commit comments

Comments
 (0)