Skip to content

Commit 2439ace

Browse files
authored
Merge pull request #208798 from v-hgampala/embark-update
Product Backlog Item 2039038: SaaS App Tutorial: Embark Update
2 parents 45112df + fbda707 commit 2439ace

File tree

1 file changed

+30
-10
lines changed

1 file changed

+30
-10
lines changed

articles/active-directory/saas-apps/embark-tutorial.md

Lines changed: 30 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 02/11/2022
12+
ms.date: 08/23/2022
1313
ms.author: jeedes
1414

1515
---
@@ -33,7 +33,7 @@ To get started, you need the following items:
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* Embark supports **SP** initiated SSO.
36+
* Embark supports **SP and IDP** initiated SSO.
3737

3838
> [!NOTE]
3939
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -73,18 +73,31 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373

7474
![Edit Basic SAML Configuration](common/edit-urls.png)
7575

76-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
76+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
7777

78-
In the **Sign on URL** text box, type a URL using the following pattern:
79-
`https://<ENVIRONMENT>.ehr.com/microsoftbenefits`
78+
a. In the **Identifier** text box, type a URL using the following pattern:
79+
`https://<ENVIRONMENT>.ehr.com`
80+
81+
b. In the **Reply URL** text box, type a URL using the following pattern:
82+
`https://<ENVIRONMENT>.ehr.com`
83+
84+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
85+
86+
In the **Sign on URL** text box, type a URL using the following pattern:
87+
`https://<ENVIRONMENT>.ehr.com`
8088

8189
> [!NOTE]
82-
> The Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Embark support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Embark support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8391

84-
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration..
92+
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration.
8593

8694
![image](common/default-attributes.png)
8795

96+
1. In addition to above, Embark platform application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
97+
98+
| Name | Source Attribute|
99+
| --------| --------- |
100+
| EmployeeID | user.employeeid |
88101

89102
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
90103

@@ -126,11 +139,18 @@ In this section, you create a user called Britta Simon in Embark. Work with [Em
126139

127140
In this section, you test your Azure AD single sign-on configuration with following options.
128141

129-
* Click on **Test this application** in Azure portal. This will redirect to Embark Sign-on URL where you can initiate the login flow.
142+
#### SP initiated:
143+
144+
* Click on **Test this application** in Azure portal. This will redirect to Embark platform Sign-on URL where you can initiate the login flow.
145+
146+
* Go to Embark platform Sign-on URL directly and initiate the login flow from there.
147+
148+
#### IDP initiated:
149+
150+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Embark platform for which you set up the SSO.
130151

131-
* Go to Embark Sign-on URL directly and initiate the login flow from there.
152+
You can also use Microsoft My Apps to test the application in any mode. When you click the Embark platform tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Embark platform for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
132153

133-
* You can use Microsoft My Apps. When you click the Embark tile in the My Apps, this will redirect to Embark Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
134154

135155
## Next steps
136156

0 commit comments

Comments
 (0)