You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/expensein-tutorial.md
+28-18Lines changed: 28 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 05/31/2019
17
+
ms.date: 06/11/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -54,15 +54,15 @@ To configure the integration of ExpenseIn into Azure AD, you need to add Expense
54
54
55
55
## Configure and test Azure AD single sign-on
56
56
57
-
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
57
+
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
58
58
59
59
To configure and test Azure AD SSO with ExpenseIn, complete the following building blocks:
60
60
61
61
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
62
62
2.**[Configure ExpenseIn](#configure-expensein)** to configure the SSO settings on application side.
63
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65
-
5.**[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
63
+
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64
+
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65
+
5.**[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
66
66
6.**[Test SSO](#test-sso)** to verify whether the configuration works.
67
67
68
68
### Configure Azure AD SSO
@@ -99,41 +99,51 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
99
99
100
100
### Configure ExpenseIn
101
101
102
-
1.In a different web browser window, sign in to ExpenseIn as an Administrator.
102
+
1.To automate the configuration within ExpenseIn, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
103
103
104
-
2. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
2. After adding extension to the browser, click on **Setup ExpenseIn** will direct you to the ExpenseIn application. From there, provide the admin credentials to sign into ExpenseIn. The browser extension will automatically configure the application for you and automate steps 3-5.
107
+
108
+

109
+
110
+
3. If you want to setup ExpenseIn manually, open a new web browser window and sign into your ExpenseIn company site as an administrator and perform the following steps:
111
+
112
+
4. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
a. In the **Provider Name** text box, type the name like ex:Azure.
113
121
114
-
b. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
122
+
b. Select **Yes** as **Allow Provider Intitated Sign-On**.
123
+
124
+
c. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
115
125
116
-
c. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
126
+
d. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
117
127
118
-
d. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
128
+
e. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
119
129
120
-
e. Click **Create**.
130
+
f. Click **Create**.
121
131
122
132
### Create an Azure AD test user
123
133
124
-
In this section, you'll create a test user in the Azure portal called B.Simon.
134
+
In this section, you'll create a test user in the Azure portal called B.Simon.
125
135
126
136
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
127
137
1. Select **New user** at the top of the screen.
128
138
1. In the **User** properties, follow these steps:
129
-
1. In the **Name** field, enter `B.Simon`.
130
-
1. In the **User name** field, enter the [email protected]. For example, `BrittaSimon@contoso.com`.
139
+
1. In the **Name** field, enter `B.Simon`.
140
+
1. In the **User name** field, enter the [email protected]. For example, `B.Simon@contoso.com`.
131
141
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
132
142
1. Click **Create**.
133
143
134
144
### Assign the Azure AD test user
135
145
136
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
146
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
137
147
138
148
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
139
149
1. In the applications list, select **ExpenseIn**.
@@ -145,7 +155,7 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
145
155
146
156

147
157
148
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
158
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
149
159
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
150
160
1. In the **Add Assignment** dialog, click the **Assign** button.
151
161
@@ -169,7 +179,7 @@ To enable Azure AD users to sign in to ExpenseIn, they must be provisioned into
169
179
170
180
b. In **Last Name** text box, enter the last name of user like **Simon**.
171
181
172
-
c. In **Email** text box, enter the email of user like `B.[email protected]`.
182
+
c. In **Email** text box, enter the email of user like `[email protected]`.
0 commit comments