Skip to content

Commit 2abb396

Browse files
committed
update
1 parent fa8eaae commit 2abb396

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

articles/active-directory/saas-apps/mindwireless-tutorial.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8888
> [!NOTE]
8989
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [mindWireless Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9090

91-
1. mindWireless application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. The claim name always be **Employee ID** and the value of which we have mapped to **user.employeeid**, which contains the EmployeeID of the user. Here the user mapping from Azure AD to mindWireless is done on the EmployeeID but you can map it to a different value also based on your application settings. You can work with the [mindWireless support team](mailto:[email protected]) first to use the correct identifier of a user and map that value with the **Employee ID** claim.
92-
93-
![image](common/edit-attribute.png)
91+
1. On the **User Attributes** section, the claim **Employee ID** and the value of the claim that is **user.employeeid** will be pre populated. Here the user mapping from Azure AD to mindWireless is done on the EmployeeID value but you can map it to a different value also based on your application settings. You can work with the [mindWireless support team](mailto:[email protected]) to get the correct identifier of a user and map that value with the **Employee ID** claim.
9492

9593
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
9694

0 commit comments

Comments
 (0)