You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/iprova-tutorial.md
+51-38Lines changed: 51 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
12
12
ms.subservice: saas-app-tutorial
13
13
ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
-
ms.devlang: na
16
15
ms.topic: tutorial
17
-
ms.date: 08/27/2019
16
+
ms.date: 03/12/2020
18
17
ms.author: jeedes
19
18
20
19
ms.collection: M365-identity-device-management
@@ -28,7 +27,7 @@ In this tutorial, you'll learn how to integrate iProva with Azure Active Directo
28
27
* Enable your users to be automatically signed-in to iProva with their Azure AD accounts.
29
28
* Manage your accounts in one central location - the Azure portal.
30
29
31
-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
30
+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
32
31
33
32
## Prerequisites
34
33
@@ -43,6 +42,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
43
42
44
43
* iProva supports **SP** initiated SSO
45
44
45
+
* Once you configure iProva you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46
+
46
47
## Adding iProva from the gallery
47
48
48
49
To configure the integration of iProva into Azure AD, you need to add iProva from the gallery to your list of managed SaaS apps.
@@ -60,13 +61,13 @@ Configure and test Azure AD SSO with iProva using a test user called **B.Simon**
60
61
61
62
To configure and test Azure AD SSO with iProva, complete the following building blocks:
62
63
63
-
1.**[Retrieve configuration information from iProva](#retrieve-configuration-information-from-iprova)** as a preparation for the next steps.
64
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
65
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67
-
1.**[Configure iProva SSO](#configure-iprova-sso)** - to configure the single sign-on settings on application side.
68
-
1.**[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of B.Simon in iProva that is linked to the Azure AD representation of user.
69
-
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
64
+
1.**[Retrieve configuration information from iProva](#retrieve-configuration-information-from-iprova)**- as a preparation for the next steps.
65
+
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
66
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68
+
1.**[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of B.Simon in iProva that is linked to the Azure AD representation of user.
69
+
1.**[Configure iProva Single Sign-On](#configure-iprova-single-sign-on)** - to configure the Single Sign-On settings on application side.
70
+
1.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
70
71
71
72
## Retrieve configuration information from iProva
72
73
@@ -96,19 +97,27 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
96
97
97
98
1. On the **Basic SAML Configuration** section, perform the following steps:
98
99
99
-

100
-
101
100
a. Fill the **Sign-on URL** box with the value that's displayed behind the label **Sign-on URL** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
102
101
103
102
b. Fill the **Identifier** box with the value that's displayed behind the label **EntityID** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
104
103
105
104
c. Fill the **Reply-URL** box with the value that's displayed behind the label **Reply URL** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
106
105
106
+
1. iProva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
107
+
108
+

109
+
110
+
1. In addition to above, iProva application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
In this section, you'll create a test user in the Azure portal called B.Simon.
114
123
@@ -120,7 +129,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
120
129
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
121
130
1. Click **Create**.
122
131
123
-
###Assign the Azure AD test user
132
+
## Assign the Azure AD test user
124
133
125
134
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to iProva.
126
135
@@ -138,6 +147,28 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
138
147
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
139
148
1. In the **Add Assignment** dialog, click the **Assign** button.
140
149
150
+
## Create iProva test user
151
+
152
+
1. Sign in to iProva by using the **Administrator** account.
153
+
154
+
2. Open the **Go to** menu.
155
+
156
+
3. Select **Application management**.
157
+
158
+
4. Select **Users** in the **Users and user groups** panel.
159
+
160
+
5. Select **Add**.
161
+
162
+
6. In the **Username** box, enter the username of user like `[email protected]`.
163
+
164
+
7. In the **Full name** box, enter a full name of user like **B.Simon**.
165
+
166
+
8. Select the **No password (use single sign-on)** option.
167
+
168
+
9. In the **E-mail address** box, enter the email address of user like `[email protected]`.
169
+
170
+
10. Scroll down to the end of the page, and select **Finish**.
171
+
141
172
## Configure iProva SSO
142
173
143
174
1. Sign in to iProva by using the **Administrator** account.
@@ -180,28 +211,6 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
180
211
181
212
18. You now return to the **Edit general settings** screen. Scroll down to the bottom of the page, and select **OK** to save your configuration.
182
213
183
-
### Create iProva test user
184
-
185
-
1. Sign in to iProva by using the **Administrator** account.
186
-
187
-
2. Open the **Go to** menu.
188
-
189
-
3. Select **Application management**.
190
-
191
-
4. Select **Users** in the **Users and user groups** panel.
192
-
193
-
5. Select **Add**.
194
-
195
-
6. In the **Username** box, enter the username of user like `[email protected]`.
196
-
197
-
7. In the **Full name** box, enter a full name of user like **B.Simon**.
198
-
199
-
8. Select the **No password (use single sign-on)** option.
200
-
201
-
9. In the **E-mail address** box, enter the email address of user like `[email protected]`.
202
-
203
-
10. Scroll down to the end of the page, and select **Finish**.
204
-
205
214
## Test SSO
206
215
207
216
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
@@ -212,8 +221,12 @@ When you click the iProva tile in the Access Panel, you should be automatically
212
221
213
222
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
214
223
215
-
-[What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
224
+
-[What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
216
225
217
226
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
218
227
219
-
-[Try iProva with Azure AD](https://aad.portal.azure.com/)
228
+
-[Try iProva with Azure AD](https://aad.portal.azure.com/)
229
+
230
+
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
231
+
232
+
-[How to protect iProva with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments