You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
76
+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
77
77
78
-
In the **Sign on URL** text box, type a URL using the following pattern:
79
-
`https://<ENVIRONMENT>.ehr.com/microsoftbenefits`
78
+
a. In the **Identifier** text box, type a URL using the following pattern:
79
+
`https://<ENVIRONMENT>.ehr.com`
80
+
81
+
b. In the **Reply URL** text box, type a URL using the following pattern:
82
+
`https://<ENVIRONMENT>.ehr.com`
83
+
84
+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
85
+
86
+
In the **Sign on URL** text box, type a URL using the following pattern:
87
+
`https://<ENVIRONMENT>.ehr.com`
80
88
81
89
> [!NOTE]
82
-
> The Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Embark support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Embark support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
83
91
84
-
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration..
92
+
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration.
85
93
86
94

87
95
96
+
1. In addition to above, Embark platform application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
97
+
98
+
| Name | Source Attribute|
99
+
| --------| --------- |
100
+
| EmployeeID | user.employeeid |
88
101
89
102
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
90
103
@@ -126,11 +139,18 @@ In this section, you create a user called Britta Simon in Embark. Work with [Em
126
139
127
140
In this section, you test your Azure AD single sign-on configuration with following options.
128
141
129
-
* Click on **Test this application** in Azure portal. This will redirect to Embark Sign-on URL where you can initiate the login flow.
142
+
#### SP initiated:
143
+
144
+
* Click on **Test this application** in Azure portal. This will redirect to Embark platform Sign-on URL where you can initiate the login flow.
145
+
146
+
* Go to Embark platform Sign-on URL directly and initiate the login flow from there.
147
+
148
+
#### IDP initiated:
149
+
150
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Embark platform for which you set up the SSO.
130
151
131
-
* Go to Embark Sign-on URL directly and initiate the login flow from there.
152
+
You can also use Microsoft My Apps to test the application in any mode. When you click the Embark platform tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Embark platform for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
132
153
133
-
* You can use Microsoft My Apps. When you click the Embark tile in the My Apps, this will redirect to Embark Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
0 commit comments