Skip to content

Commit 326ed5c

Browse files
authored
Merge pull request #79128 from v-viinde/expenseinoneclickupdate
Product Backlog Item 739684: SaaS App Tutorial: ExpenseIn One Click S…
2 parents 63d7e7f + 245e0a7 commit 326ed5c

File tree

2 files changed

+28
-18
lines changed

2 files changed

+28
-18
lines changed

articles/active-directory/saas-apps/expensein-tutorial.md

Lines changed: 28 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 05/31/2019
17+
ms.date: 06/11/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -54,15 +54,15 @@ To configure the integration of ExpenseIn into Azure AD, you need to add Expense
5454

5555
## Configure and test Azure AD single sign-on
5656

57-
Configure and test Azure AD SSO with ExpenseIn using a test user called **B. Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
57+
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
5858

5959
To configure and test Azure AD SSO with ExpenseIn, complete the following building blocks:
6060

6161
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
6262
2. **[Configure ExpenseIn](#configure-expensein)** to configure the SSO settings on application side.
63-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
64-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
65-
5. **[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B. Simon in ExpenseIn that is linked to the Azure AD representation of user.
63+
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64+
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65+
5. **[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
6666
6. **[Test SSO](#test-sso)** to verify whether the configuration works.
6767

6868
### Configure Azure AD SSO
@@ -99,41 +99,51 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9999

100100
### Configure ExpenseIn
101101

102-
1. In a different web browser window, sign in to ExpenseIn as an Administrator.
102+
1. To automate the configuration within ExpenseIn, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
103103

104-
2. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
104+
![My apps extension](common/install-myappssecure-extension.png)
105+
106+
2. After adding extension to the browser, click on **Setup ExpenseIn** will direct you to the ExpenseIn application. From there, provide the admin credentials to sign into ExpenseIn. The browser extension will automatically configure the application for you and automate steps 3-5.
107+
108+
![Setup configuration](common/setup-sso.png)
109+
110+
3. If you want to setup ExpenseIn manually, open a new web browser window and sign into your ExpenseIn company site as an administrator and perform the following steps:
111+
112+
4. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
105113

106114
![ExpenseIn configuration](./media/expenseIn-tutorial/config01.png)
107115

108-
3. On the **New Identity Provider** pop-up, Perform the following steps:
116+
5. On the **New Identity Provider** pop-up, Perform the following steps:
109117

110118
![ExpenseIn configuration](./media/expenseIn-tutorial/config02.png)
111119

112120
a. In the **Provider Name** text box, type the name like ex:Azure.
113121

114-
b. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
122+
b. Select **Yes** as **Allow Provider Intitated Sign-On**.
123+
124+
c. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
115125

116-
c. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
126+
d. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
117127

118-
d. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
128+
e. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
119129

120-
e. Click **Create**.
130+
f. Click **Create**.
121131

122132
### Create an Azure AD test user
123133

124-
In this section, you'll create a test user in the Azure portal called B. Simon.
134+
In this section, you'll create a test user in the Azure portal called B.Simon.
125135

126136
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
127137
1. Select **New user** at the top of the screen.
128138
1. In the **User** properties, follow these steps:
129-
1. In the **Name** field, enter `B. Simon`.
130-
1. In the **User name** field, enter the [email protected]. For example, `BrittaSimon@contoso.com`.
139+
1. In the **Name** field, enter `B.Simon`.
140+
1. In the **User name** field, enter the [email protected]. For example, `B.Simon@contoso.com`.
131141
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
132142
1. Click **Create**.
133143

134144
### Assign the Azure AD test user
135145

136-
In this section, you'll enable B. Simon to use Azure single sign-on by granting access to ExpenseIn.
146+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
137147

138148
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
139149
1. In the applications list, select **ExpenseIn**.
@@ -145,7 +155,7 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
145155

146156
![The Add User link](common/add-assign-user.png)
147157

148-
1. In the **Users and groups** dialog, select **B. Simon** from the Users list, then click the **Select** button at the bottom of the screen.
158+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
149159
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
150160
1. In the **Add Assignment** dialog, click the **Assign** button.
151161

@@ -169,7 +179,7 @@ To enable Azure AD users to sign in to ExpenseIn, they must be provisioned into
169179

170180
b. In **Last Name** text box, enter the last name of user like **Simon**.
171181

172-
c. In **Email** text box, enter the email of user like `B. [email protected]`.
182+
c. In **Email** text box, enter the email of user like `[email protected]`.
173183

174184
d. Click **Create**.
175185

6.77 KB
Loading

0 commit comments

Comments
 (0)