You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/contentful-tutorial.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 10/22/2019
17
+
ms.date: 04/20/2020
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -43,6 +43,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
43
43
44
44
* Contentful supports **SP and IDP** initiated SSO
45
45
* Contentful supports **Just In Time** user provisioning
46
+
* Once you configure Contentful you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46
47
47
48
> [!NOTE]
48
49
> The identifier of this application is a fixed string value. Only one instance can be configured in one tenant.
@@ -94,6 +95,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
94
95
> [!NOTE]
95
96
> These values are not real. Update these values with the actual Reply URL and Sign-On URL by copying the ACS (Assertion Consumer Service) URL from the SSO setup page in Contentful.
96
97
98
+
1. Contentful application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
99
+
100
+

101
+
102
+
1. In addition to above, Contentful application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
103
+
104
+
| Name | Source Attribute|
105
+
| --------------- | --------- |
106
+
| email | user.userprincipalname |
107
+
97
108
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
0 commit comments