Skip to content

Commit 20b6035

Browse files
authored
Merge pull request #111960 from v-nagta/contentfulv
Product Backlog Item 989167: SaaS App Tutorial: Contentful update
2 parents 2675cec + 645dcc6 commit 20b6035

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

articles/active-directory/saas-apps/contentful-tutorial.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 10/22/2019
17+
ms.date: 04/20/2020
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -43,6 +43,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4343

4444
* Contentful supports **SP and IDP** initiated SSO
4545
* Contentful supports **Just In Time** user provisioning
46+
* Once you configure Contentful you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4647

4748
> [!NOTE]
4849
> The identifier of this application is a fixed string value. Only one instance can be configured in one tenant.
@@ -94,6 +95,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9495
> [!NOTE]
9596
> These values are not real. Update these values with the actual Reply URL and Sign-On URL by copying the ACS (Assertion Consumer Service) URL from the SSO setup page in Contentful.
9697

98+
1. Contentful application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
99+
100+
![image](common/default-attributes.png)
101+
102+
1. In addition to above, Contentful application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
103+
104+
| Name | Source Attribute|
105+
| --------------- | --------- |
106+
| email | user.userprincipalname |
107+
97108
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
98109

99110
![The Certificate download link](common/certificatebase64.png)
@@ -163,4 +174,4 @@ When you click the Contentful tile in the Access Panel, you should be automatica
163174

164175
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
165176

166-
- [Try Contentful with Azure AD](https://aad.portal.azure.com/)
177+
- [Try Contentful with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)