Skip to content

Commit 32785e5

Browse files
authored
Merge pull request #75298 from v-albemi/saas-apps-tutorials
edit pass: Saas apps tutorials
2 parents 082b023 + 23b8ed2 commit 32785e5

File tree

6 files changed

+612
-622
lines changed

6 files changed

+612
-622
lines changed

articles/active-directory/saas-apps/pegasystems-tutorial.md

Lines changed: 133 additions & 132 deletions
Large diffs are not rendered by default.
Lines changed: 103 additions & 108 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Tutorial: Azure Active Directory integration with Percolate | Microsoft Docs'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Percolate.
3+
description: In this tutorial, you'll learn how to configure single sign-on between Azure Active Directory and Percolate.
44
services: active-directory
55
documentationCenter: na
66
author: jeevansd
@@ -20,219 +20,214 @@ ms.author: jeedes
2020
---
2121
# Tutorial: Azure Active Directory integration with Percolate
2222

23-
In this tutorial, you learn how to integrate Percolate with Azure Active Directory (Azure AD).
24-
Integrating Percolate with Azure AD provides you with the following benefits:
23+
In this tutorial, you'll learn how to integrate Percolate with Azure Active Directory (Azure AD).
2524

26-
* You can control in Azure AD who has access to Percolate.
27-
* You can enable your users to be automatically signed-in to Percolate (Single Sign-On) with their Azure AD accounts.
28-
* You can manage your accounts in one central location - the Azure portal.
25+
This integration provides these benefits:
2926

30-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
31-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
27+
* You can use Azure AD to control who has access to Percolate.
28+
* You can enable your users to be automatically signed in to Percolate (single sign-on) with their Azure AD accounts.
29+
* You can manage your accounts in one central location: the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [Single sign-on to applications in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you start.
3234

3335
## Prerequisites
3436

35-
To configure Azure AD integration with Percolate, you need the following items:
37+
To configure Azure AD integration with Percolate, you need to have:
3638

3739
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
38-
* Percolate single sign-on enabled subscription
40+
* A Percolate subscription that has single sign-on enabled.
3941

4042
## Scenario description
4143

42-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
44+
In this tutorial, you'll configure and test Azure AD single sign-on in a test environment.
4345

44-
* Percolate supports **SP** and **IDP** initiated SSO
46+
* Percolate supports SP-initiated and IdP-initiated SSO.
4547

46-
## Adding Percolate from the gallery
48+
## Add Percolate from the gallery
4749

4850
To configure the integration of Percolate into Azure AD, you need to add Percolate from the gallery to your list of managed SaaS apps.
4951

50-
**To add Percolate from the gallery, perform the following steps:**
51-
52-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
52+
1. In the [Azure portal](https://portal.azure.com), in the left pane, select **Azure Active Directory**:
5353

54-
![The Azure Active Directory button](common/select-azuread.png)
54+
![Select Azure Active Directory](common/select-azuread.png)
5555

56-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
56+
2. Go to **Enterprise applications** > **All applications**:
5757

5858
![The Enterprise applications blade](common/enterprise-applications.png)
5959

60-
3. To add new application, click **New application** button on the top of dialog.
60+
3. To add an application, select **New application** at the top of the window:
6161

62-
![The New application button](common/add-new-app.png)
62+
![Select New application](common/add-new-app.png)
6363

64-
4. In the search box, type **Percolate**, select **Percolate** from result panel then click **Add** button to add the application.
64+
4. In the search box, enter **Percolate**. Select **Percolate** in the search results and then select **Add**.
6565

66-
![Percolate in the results list](common/search-new-app.png)
66+
![Search results](common/search-new-app.png)
6767

6868
## Configure and test Azure AD single sign-on
6969

70-
In this section, you configure and test Azure AD single sign-on with Percolate based on a test user called **Britta Simon**.
71-
For single sign-on to work, a link relationship between an Azure AD user and the related user in Percolate needs to be established.
70+
In this section, you'll configure and test Azure AD single sign-on with Percolate by using a test user named Britta Simon.
71+
To enable single sign-on, you need to establish a relationship between an Azure AD user and the corresponding user in Percolate.
7272

73-
To configure and test Azure AD single sign-on with Percolate, you need to complete the following building blocks:
73+
To configure and test Azure AD single sign-on with Percolate, you need to complete these steps:
7474

75-
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
76-
2. **[Configure Percolate Single Sign-On](#configure-percolate-single-sign-on)** - to configure the Single Sign-On settings on application side.
77-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
78-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
79-
5. **[Create Percolate test user](#create-percolate-test-user)** - to have a counterpart of Britta Simon in Percolate that is linked to the Azure AD representation of user.
80-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
75+
1. **[Configure Azure AD single sign-on](#configure-azure-ad-single-sign-on)** to enable the feature for your users.
76+
2. **[Configure Percolate single sign-on](#configure-percolate-single-sign-on)** on the application side.
77+
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on.
78+
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Azure AD single sign-on for the user.
79+
5. **[Create a Percolate test user](#create-a-percolate-test-user)** that's linked to the Azure AD representation of the user.
80+
6. **[Test single sign-on](#test-single-sign-on)** to verify that the configuration works.
8181

8282
### Configure Azure AD single sign-on
8383

84-
In this section, you enable Azure AD single sign-on in the Azure portal.
84+
In this section, you'll enable Azure AD single sign-on in the Azure portal.
8585

86-
To configure Azure AD single sign-on with Percolate, perform the following steps:
86+
To configure Azure AD single sign-on with Percolate, take these steps:
8787

88-
1. In the [Azure portal](https://portal.azure.com/), on the **Percolate** application integration page, select **Single sign-on**.
88+
1. In the [Azure portal](https://portal.azure.com/), on the **Percolate** application integration page, select **Single sign-on**:
8989

90-
![Configure single sign-on link](common/select-sso.png)
90+
![Select single sign-on](common/select-sso.png)
9191

92-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
92+
2. In the **Select a single sign-on method** dialog box, select **SAML/WS-Fed** mode to enable single sign-on:
9393

94-
![Single sign-on select mode](common/select-saml-option.png)
94+
![Select a single sign-on method](common/select-saml-option.png)
9595

96-
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
96+
3. On the **Set up Single Sign-On with SAML** page, select the **Edit** icon to open the **Basic SAML Configuration** dialog box:
9797

98-
![Edit Basic SAML Configuration](common/edit-urls.png)
98+
![Edit icon](common/edit-urls.png)
9999

100-
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode the user does not have to perform any step as the app is already pre-integrated with Azure.
100+
4. In the **Basic SAML Configuration** dialog box, you don't need to take any action to configure the application in IdP-initiated mode. The app is already integrated with Azure.
101101

102102
![Percolate Domain and URLs single sign-on information](common/preintegrated.png)
103103

104-
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
104+
5. If you want to configure the application in SP-initiated mode, select **Set additional URLs** and, in the **Sign on URL** box, enter **https://percolate.com/app/login**:
105105

106-
![Percolate Domain and URLs single sign-on information](common/metadata-upload-additional-signon.png)
106+
![Percolate Domain and URLs single sign-on information](common/metadata-upload-additional-signon.png)
107+
6. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select the **Copy** icon to copy the **App Federation Metadata Url**. Save this URL.
107108

108-
In the **Sign-on URL** text box, type a URL:
109-
`https://percolate.com/app/login`
109+
![Copy the App Federation Metadata URL](common/copy-metadataurl.png)
110110

111-
6. On the **Set up Single Sign-On with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
111+
7. In the **Set up Percolate** section, copy the appropriate URLs, based on your requirements.
112112

113-
![The Certificate download link](common/copy-metadataurl.png)
113+
![Copy the configuration URLs](common/copy-configuration-urls.png)
114114

115-
7. On the **Set up Percolate** section, copy the appropriate URL(s) as per your requirement.
115+
1. **Login URL**.
116116

117-
![Copy configuration URLs](common/copy-configuration-urls.png)
117+
1. **Azure AD Identifier**.
118118

119-
a. Login URL
119+
1. **Logout URL**.
120120

121-
b. Azure AD Identifier
121+
### Configure Percolate single sign-on
122122

123-
c. Logout URL
123+
1. In a new web browser window, sign in to Percolate as an admin.
124124

125-
### Configure Percolate Single Sign-On
126-
127-
1. In a different web browser window, sign in to Percolate as an Administrator.
128-
129-
2. On the left of the home page, click on **Settings**.
125+
2. On the left side of the home page, select **Settings**:
130126

131-
![Configure Single Sign-On](./media/percolate-tutorial/configure01.png)
127+
![Select Settings](./media/percolate-tutorial/configure01.png)
132128

133-
3. From the left side of menubar, click on **SSO** under **Organization**.
129+
3. In the left pane, select **SSO** under **Organization**:
134130

135-
![Configure Single Sign-On](./media/percolate-tutorial/configure02.png)
131+
![Select SSO under Organization](./media/percolate-tutorial/configure02.png)
136132

137-
a. In the **Login URL** textbox, paste the value of **Login URL** which you have copied from Azure portal.
133+
1. In the **Login URL** box, paste the **Login URL** value that you copied from the Azure portal.
138134

139-
b. In the **Entity ID** textbox, paste the value of **Azure AD Identifier** which you have copied from Azure portal.
135+
1. In the **Entity ID** box, paste the **Azure AD Identifier** value that you copied from the Azure portal.
140136

141-
c. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal, copy its content, and then paste it into the **x509 certificates** box.
137+
1. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal. Copy its content and paste it into the **x509 certificates** box.
142138

143-
d. In the **Email attribute** textbox, type **emailaddress**.
139+
1. In the **Email attribute** box, enter **emailaddress**.
144140

145-
e. **Identity provider metadata URL** field is optional and if you have **App federation Metadata url** which you have copied from Azure portal, paste it in the **Identity provider metadata URL** textbox.
141+
1. The **Identity provider metadata URL** box is an optional field. If you copied an **App Federation Metadata Url** from the Azure portal, you can paste it into this box.
146142

147-
f. Select **No** as **Should AuthNRequests be signed?**.
143+
1. In the **Should AuthNRequests be signed?** list, select **No**.
148144

149-
g. Select **No** as **Enable SSO auto-Provisioning**.
145+
1. In the **Enable SSO auto-provisioning** list, select **No**.
150146

151-
h. Click **Save**.
147+
1. Select **Save**.
152148

153-
### Create an Azure AD test user
149+
### Create an Azure AD test user
154150

155-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
151+
In this section, you'll create a test user named Britta Simon in the Azure portal.
156152

157-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
153+
1. In the Azure portal, select **Azure Active Directory** in the left pane, select **Users**, and then select **All users**:
158154

159-
![The "Users and groups" and "All users" links](common/users.png)
155+
![Select All users](common/users.png)
160156

161-
2. Select **New user** at the top of the screen.
157+
2. Select **New user** at the top of the screen:
162158

163-
![New user Button](common/new-user.png)
159+
![Select New user](common/new-user.png)
164160

165-
3. In the User properties, perform the following steps.
161+
3. In the **User** dialog box, take the following steps.
166162

167-
![The User dialog box](common/user-properties.png)
163+
![User dialog box](common/user-properties.png)
168164

169-
a. In the **Name** field enter **BrittaSimon**.
165+
1. In the **Name** box, enter **BrittaSimon**.
170166

171-
b. In the **User name** field type brittasimon@yourcompanydomain.extension. For example, [email protected]
167+
1. In the **User name** box, enter **BrittaSimon@\<yourcompanydomain>.\<extension>**. (For example, [email protected].)
172168

173-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
169+
1. Select **Show Password**, and then write down the value that's in the **Password** box.
174170

175-
d. Click **Create**.
171+
1. Select **Create**.
176172

177173
### Assign the Azure AD test user
178174

179-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Percolate.
175+
In this section, you'll enable Britta Simon to use Azure AD single sign-on by granting her access to Percolate.
180176

181-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **Percolate**.
177+
1. In the Azure portal, select **Enterprise applications**, select **All applications**, and then select **Percolate**.
182178

183179
![Enterprise applications blade](common/enterprise-applications.png)
184180

185-
2. In the applications list, select **Percolate**.
181+
2. In the list of applications, select **Percolate**.
186182

187-
![The Percolate link in the Applications list](common/all-applications.png)
183+
![List of applications](common/all-applications.png)
188184

189-
3. In the menu on the left, select **Users and groups**.
185+
3. In the left pane, select **Users and groups**:
190186

191-
![The "Users and groups" link](common/users-groups-blade.png)
187+
![Select Users and groups](common/users-groups-blade.png)
192188

193-
4. Click the **Add user** button, then select **Users and groups** in the **Add Assignment** dialog.
189+
4. Select **Add user**, and then select **Users and groups** in the **Add Assignment** dialog box.
194190

195-
![The Add Assignment pane](common/add-assign-user.png)
191+
![Select Users and groups](common/add-assign-user.png)
196192

197-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
193+
5. In the **Users and groups** dialog box, select **Britta Simon** in the users list, and then click the **Select** button at the bottom of the screen.
198194

199-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
195+
6. If you expect a role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Click the **Select** button at the bottom of the screen.
200196

201-
7. In the **Add Assignment** dialog click the **Assign** button.
197+
7. In the **Add Assignment** dialog box, select **Assign**.
202198

203-
### Create Percolate test user
199+
### Create a Percolate test user
204200

205-
To enable Azure AD users to sign in to Percolate, they must be provisioned into Percolate. In Percolate, provisioning is a manual task.
201+
To enable Azure AD users to sign in to Percolate, you need to add them to Percolate. You need to add them manually.
206202

207-
**To provision a user account, perform the following steps:**
203+
To create a user account, take these steps:
208204

209-
1. Sign in to Percolate as an Administrator.
205+
1. Sign in to Percolate as an admin.
210206

211-
2. From the left side of menubar, click on **Users** under **Organization** and navigate to **New users**.
207+
2. In the left pane, select **Users** under **Organization**. Select **New users**:
212208

213-
![Configure Single Sign-On](./media/percolate-tutorial/configure03.png)
209+
![Select New users](./media/percolate-tutorial/configure03.png)
214210

215-
3. On the **Create users** page, perform the following steps:
211+
3. On the **Create users** page, take the following steps.
216212

217-
![Configure Single Sign-On](./media/percolate-tutorial/configure04.png)
213+
![Create users page](./media/percolate-tutorial/configure04.png)
218214

219-
a. In **Email** text box, enter the email of user like [email protected].
215+
1. In the **Email** box, enter the email address of the user. For example, [email protected].
220216

221-
b. In **Fullname** text box, enter the name of user like **Brittasimon**.
217+
1. In the **Full name** box, enter the name of the user. For example, **Brittasimon**.
222218

223-
c. Click **Create users**.
219+
1. Select **Create users**.
224220

225-
### Test single sign-on
221+
### Test single sign-on
226222

227-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
223+
Now you need to test your Azure AD single sign-on configuration by using the Access Panel.
228224

229-
When you click the Percolate tile in the Access Panel, you should be automatically signed in to the Percolate for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
225+
When you select the Percolate tile in the Access Panel, you should be automatically signed in to the Percolate instance for which you set up SSO. For more information, see [Access and use apps on the My Apps portal](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
230226

231-
## Additional Resources
227+
## Additional resources
232228

233-
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
229+
- [Tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
234230

235231
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
236232

237-
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
238-
233+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)

0 commit comments

Comments
 (0)