You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'Tutorial: Azure Active Directory integration with Percolate | Microsoft Docs'
3
-
description: Learn how to configure single sign-on between Azure Active Directory and Percolate.
3
+
description: In this tutorial, you'll learn how to configure single sign-on between Azure Active Directory and Percolate.
4
4
services: active-directory
5
5
documentationCenter: na
6
6
author: jeevansd
@@ -20,219 +20,214 @@ ms.author: jeedes
20
20
---
21
21
# Tutorial: Azure Active Directory integration with Percolate
22
22
23
-
In this tutorial, you learn how to integrate Percolate with Azure Active Directory (Azure AD).
24
-
Integrating Percolate with Azure AD provides you with the following benefits:
23
+
In this tutorial, you'll learn how to integrate Percolate with Azure Active Directory (Azure AD).
25
24
26
-
* You can control in Azure AD who has access to Percolate.
27
-
* You can enable your users to be automatically signed-in to Percolate (Single Sign-On) with their Azure AD accounts.
28
-
* You can manage your accounts in one central location - the Azure portal.
25
+
This integration provides these benefits:
29
26
30
-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
31
-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
27
+
* You can use Azure AD to control who has access to Percolate.
28
+
* You can enable your users to be automatically signed in to Percolate (single sign-on) with their Azure AD accounts.
29
+
* You can manage your accounts in one central location: the Azure portal.
30
+
31
+
To learn more about SaaS app integration with Azure AD, see [Single sign-on to applications in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32
+
33
+
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you start.
32
34
33
35
## Prerequisites
34
36
35
-
To configure Azure AD integration with Percolate, you need the following items:
37
+
To configure Azure AD integration with Percolate, you need to have:
36
38
37
39
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
38
-
* Percolate single sign-on enabled subscription
40
+
*A Percolate subscription that has single sign-on enabled.
39
41
40
42
## Scenario description
41
43
42
-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
44
+
In this tutorial, you'll configure and test Azure AD single sign-on in a test environment.
43
45
44
-
* Percolate supports **SP** and **IDP**initiated SSO
46
+
* Percolate supports SP-initiated and IdP-initiated SSO.
45
47
46
-
## Adding Percolate from the gallery
48
+
## Add Percolate from the gallery
47
49
48
50
To configure the integration of Percolate into Azure AD, you need to add Percolate from the gallery to your list of managed SaaS apps.
49
51
50
-
**To add Percolate from the gallery, perform the following steps:**
51
-
52
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
52
+
1. In the [Azure portal](https://portal.azure.com), in the left pane, select **Azure Active Directory**:
53
53
54
-

54
+

55
55
56
-
2.Navigate to **Enterprise Applications**and then select the **All Applications** option.
56
+
2.Go to **Enterprise applications**> **All applications**:
3. To add new application, click**New application**button on the top of dialog.
60
+
3. To add an application, select**New application**at the top of the window:
61
61
62
-

62
+

63
63
64
-
4. In the search box, type**Percolate**, select**Percolate**from result panel then click**Add** button to add the application.
64
+
4. In the search box, enter**Percolate**. Select**Percolate**in the search results and then select**Add**.
65
65
66
-

66
+

67
67
68
68
## Configure and test Azure AD single sign-on
69
69
70
-
In this section, you configure and test Azure AD single sign-on with Percolate based on a test user called **Britta Simon**.
71
-
For single sign-onto work, a link relationship between an Azure AD user and the related user in Percolate needs to be established.
70
+
In this section, you'll configure and test Azure AD single sign-on with Percolate by using a test user named Britta Simon.
71
+
To enable single sign-on, you need to establish a relationship between an Azure AD user and the corresponding user in Percolate.
72
72
73
-
To configure and test Azure AD single sign-on with Percolate, you need to complete the following building blocks:
73
+
To configure and test Azure AD single sign-on with Percolate, you need to complete these steps:
74
74
75
-
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)**- to enable your users to use this feature.
76
-
2.**[Configure Percolate Single Sign-On](#configure-percolate-single-sign-on)**- to configure the Single Sign-On settings on application side.
77
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)**- to test Azure AD single sign-on with Britta Simon.
78
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)**- to enable Britta Simon to use Azure AD single sign-on.
79
-
5.**[Create Percolate test user](#create-percolate-test-user)**- to have a counterpart of Britta Simon in Percolate that is linked to the Azure AD representation of user.
80
-
6.**[Test single sign-on](#test-single-sign-on)**- to verify whether the configuration works.
75
+
1.**[Configure Azure AD single sign-on](#configure-azure-ad-single-sign-on)** to enable the feature for your users.
76
+
2.**[Configure Percolate single sign-on](#configure-percolate-single-sign-on)**on the application side.
77
+
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on.
78
+
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Azure AD single sign-on for the user.
79
+
5.**[Create a Percolate test user](#create-a-percolate-test-user)** that's linked to the Azure AD representation of the user.
80
+
6.**[Test single sign-on](#test-single-sign-on)** to verify that the configuration works.
81
81
82
82
### Configure Azure AD single sign-on
83
83
84
-
In this section, you enable Azure AD single sign-on in the Azure portal.
84
+
In this section, you'll enable Azure AD single sign-on in the Azure portal.
85
85
86
-
To configure Azure AD single sign-on with Percolate, perform the following steps:
86
+
To configure Azure AD single sign-on with Percolate, take these steps:
87
87
88
-
1. In the [Azure portal](https://portal.azure.com/), on the **Percolate** application integration page, select **Single sign-on**.
88
+
1. In the [Azure portal](https://portal.azure.com/), on the **Percolate** application integration page, select **Single sign-on**:
89
89
90
-

90
+

91
91
92
-
2.On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
92
+
2.In the **Select a single sign-on method** dialog box, select **SAML/WS-Fed** mode to enable single sign-on:
4.On the **Basic SAML Configuration**section, if you wish to configure the application in **IDP**initiated mode the user does not have to perform any step as the app is already pre-integrated with Azure.
100
+
4.In the **Basic SAML Configuration**dialog box, you don't need to take any action to configure the application in IdP-initiated mode. The app is already integrated with Azure.
101
101
102
102

103
103
104
-
5.Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
104
+
5.If you want to configure the application in SP-initiated mode, select **Set additional URLs** and, in the **Sign on URL** box, enter **https://percolate.com/app/login**:
105
105
106
-

106
+

107
+
6. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select the **Copy** icon to copy the **App Federation Metadata Url**. Save this URL.
107
108
108
-
In the **Sign-on URL** text box, type a URL:
109
-
`https://percolate.com/app/login`
109
+

110
110
111
-
6. On the **Set up Single Sign-On with SAML**page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
111
+
7. In the **Set up Percolate**section, copy the appropriate URLs, based on your requirements.
3.From the left side of menubar, click on **SSO** under **Organization**.
129
+
3.In the left pane, select **SSO** under **Organization**:
134
130
135
-

131
+

136
132
137
-
a. In the **Login URL** textbox, paste the value of **Login URL** which you have copied from Azure portal.
133
+
1. In the **Login URL** box, paste the **Login URL** value that you copied from the Azure portal.
138
134
139
-
b. In the **Entity ID** textbox, paste the value of **Azure AD Identifier** which you have copied from Azure portal.
135
+
1. In the **Entity ID** box, paste the **Azure AD Identifier** value that you copied from the Azure portal.
140
136
141
-
c. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal, copy its content, and then paste it into the **x509 certificates** box.
137
+
1. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal. Copy its content and paste it into the **x509 certificates** box.
142
138
143
-
d. In the **Email attribute** textbox, type **emailaddress**.
139
+
1. In the **Email attribute** box, enter **emailaddress**.
144
140
145
-
e. **Identity provider metadata URL** field is optional and if you have **App federation Metadata url** which you have copied from Azure portal, paste it in the **Identity provider metadata URL** textbox.
141
+
1. The **Identity provider metadata URL** box is an optional field. If you copied an **App Federation Metadata Url** from the Azure portal, you can paste it into this box.
146
142
147
-
f. Select **No** as **Should AuthNRequests be signed?**.
143
+
1. In the **Should AuthNRequests be signed?** list, select **No**.
148
144
149
-
g. Select **No** as **Enable SSO auto-Provisioning**.
145
+
1. In the **Enable SSO auto-provisioning** list, select **No**.
150
146
151
-
h. Click **Save**.
147
+
1. Select **Save**.
152
148
153
-
### Create an Azure AD test user
149
+
### Create an Azure AD test user
154
150
155
-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
151
+
In this section, you'll create a test user named Britta Simon in the Azure portal.
156
152
157
-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
153
+
1. In the Azure portal, select **Azure Active Directory** in the left pane, select **Users**, and then select **All users**:
158
154
159
-

155
+

160
156
161
-
2. Select **New user** at the top of the screen.
157
+
2. Select **New user** at the top of the screen:
162
158
163
-

159
+

164
160
165
-
3. In the User properties, perform the following steps.
161
+
3. In the **User** dialog box, take the following steps.
166
162
167
-

163
+

168
164
169
-
a. In the **Name**field enter **BrittaSimon**.
165
+
1. In the **Name**box, enter **BrittaSimon**.
170
166
171
-
b. In the **User name**field type brittasimon@yourcompanydomain.extension. For example, [email protected]
167
+
1. In the **User name**box, enter **BrittaSimon@\<yourcompanydomain>.\<extension>**. (For example, [email protected].)
172
168
173
-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
169
+
1. Select **Show Password**, and then write down the value that's in the **Password** box.
174
170
175
-
d. Click**Create**.
171
+
1. Select**Create**.
176
172
177
173
### Assign the Azure AD test user
178
174
179
-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Percolate.
175
+
In this section, you'll enable Britta Simon to use Azure AD single sign-on by granting her access to Percolate.
180
176
181
-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **Percolate**.
177
+
1. In the Azure portal, select **Enterprise applications**, select **All applications**, and then select **Percolate**.

196
192
197
-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
193
+
5. In the **Users and groups** dialog box, select **Britta Simon** in the users list, and then click the **Select** button at the bottom of the screen.
198
194
199
-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
195
+
6. If you expect a role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Click the **Select** button at the bottom of the screen.
200
196
201
-
7. In the **Add Assignment** dialog click the**Assign** button.
197
+
7. In the **Add Assignment** dialog box, select**Assign**.
202
198
203
-
### Create Percolate test user
199
+
### Create a Percolate test user
204
200
205
-
To enable Azure AD users to sign in to Percolate, they must be provisioned into Percolate. In Percolate, provisioning is a manual task.
201
+
To enable Azure AD users to sign in to Percolate, you need to add them to Percolate. You need to add them manually.
206
202
207
-
**To provision a user account, perform the following steps:**
203
+
To create a user account, take these steps:
208
204
209
-
1. Sign in to Percolate as an Administrator.
205
+
1. Sign in to Percolate as an admin.
210
206
211
-
2.From the left side of menubar, click on **Users** under **Organization** and navigate to **New users**.
207
+
2.In the left pane, select **Users** under **Organization**. Select **New users**:
212
208
213
-

209
+

214
210
215
-
3. On the **Create users** page, perform the following steps:
211
+
3. On the **Create users** page, take the following steps.
216
212
217
-

a. In **Email** text box, enter the email of user like[email protected].
215
+
1. In the **Email** box, enter the email address of the user. For example,[email protected].
220
216
221
-
b. In **Fullname** text box, enter the name of user like **Brittasimon**.
217
+
1. In the **Full name** box, enter the name of the user. For example, **Brittasimon**.
222
218
223
-
c. Click **Create users**.
219
+
1. Select **Create users**.
224
220
225
-
### Test single sign-on
221
+
### Test single sign-on
226
222
227
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
223
+
Now you need to test your Azure AD single sign-on configuration by using the Access Panel.
228
224
229
-
When you click the Percolate tile in the Access Panel, you should be automatically signed in to the Percolate for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
225
+
When you select the Percolate tile in the Access Panel, you should be automatically signed in to the Percolate instance for which you set up SSO. For more information, see [Access and use apps on the My Apps portal](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
230
226
231
-
## Additional Resources
227
+
## Additional resources
232
228
233
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
229
+
-[Tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
234
230
235
231
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
236
232
237
-
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
238
-
233
+
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
0 commit comments